Implementing Acl-Based Ipsec; Configuring An Acl - HP MSR Series Configuration Manual

Hpe flexnetwork msr router series
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

Implementing ACL-based IPsec

Use the following procedure to implement ACL-based IPsec:
1.
Configure an ACL for identifying data flows to be protected. To use IPsec to protect VPN traffic,
you do not need to specify the VPN parameters in the ACL rules.
2.
Configure IPsec transform sets to specify the security protocols, authentication and encryption
algorithms, and the encapsulation mode.
3.
Configure an IPsec policy to associate data flows with the IPsec transform sets, specify the SA
negotiation mode, the peer IP addresses (the start and end points of the IPsec tunnel), the
required keys, and the SA lifetime.
An IPsec policy is a set of IPsec policy entries that have the same name but different sequence
numbers. In the same IPsec policy, an IPsec policy entry with a smaller sequence number has
a higher priority.
4.
Apply the IPsec policy to an interface.
Complete the following tasks to configure ACL-based IPsec:
Tasks at a glance
(Required.)
(Required.)
(Required.) Configure an IPsec policy (use either method):
Configuring a manual IPsec policy
Configuring an IKE-based IPsec policy
(Required.)
(Optional.)
Enabling ACL checking for de-encapsulated packets
(Optional.)
Configuring IPsec anti-replay
(Optional.)
Configuring IPsec anti-replay redundancy
(Optional.)
Binding a source interface to an IPsec policy
(Optional.)
Enabling QoS pre-classify
(Optional.)
Enabling logging of IPsec packets
(Optional.)
Configuring the DF bit of IPsec packets
(Optional.)
Configuring IPsec RRI
(Optional.)
Configuring SNMP notifications for IPsec

Configuring an ACL

IPsec uses ACLs to identify the traffic to be protected.
Keywords in ACL rules
An ACL is a collection of ACL rules. Each ACL rule is a deny or permit statement. A permit statement
identifies a data flow protected by IPsec, and a deny statement identifies a data flow that is not
protected by IPsec. IPsec compares a packet against the ACL rules and processes the packet
according to the first rule it matches.
Each ACL rule matches both the outbound traffic and the returned inbound traffic. Suppose
there is a rule rule 0 permit ip source 1.1.1.0 0.0.0.255 destination 2.2.2.0 0.0.0.255. This
rule matches both traffic from 1.1.1.0 to 2.2.2.0 and traffic from 2.2.2.0 to 1.1.1.0.
Configuring an ACL
Configuring an IPsec transform set
Applying an IPsec policy to an interface
292

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents