HP VSR1000 Security Configuration Manual page 206

Virtual services router
Table of Contents

Advertisement

# Create a manual IPsec policy named map1, with the sequence number as 10.
[RouterA] ipsec policy map1 10 manual
# Apply ACL 3101.
[RouterA-ipsec-policy-manual-map1-10] security acl 3101
# Apply the IPsec transform set tran1.
[RouterA-ipsec-policy-manual-map1-10] transform-set tran1
# Specify the remote IP address of the IPsec tunnel as 2.2.3.1.
[RouterA-ipsec-policy-manual-map1-10] remote-address 2.2.3.1
# Configure inbound and outbound SPIs for ESP.
[RouterA-ipsec-policy-manual-map1-10] sa spi outbound esp 12345
[RouterA-ipsec-policy-manual-map1-10] sa spi inbound esp 54321
# Configure the inbound and outbound SA keys for ESP.
[RouterA-ipsec-policy-manual-map1-10] sa string-key outbound esp simple abcdefg
[RouterA-ipsec-policy-manual-map1-10] sa string-key inbound esp simple gfedcba
[RouterA-ipsec-policy-manual-map1-10] quit
# Apply the IPsec policy map1 to interface GigabitEthernet 2/0.
[RouterA] interface gigabitethernet 2/0
[RouterA-GigabitEthernet2/0] ip address 2.2.2.1 255.255.255.0
[RouterA-GigabitEthernet2/0] ipsec apply policy map1
[RouterA-GigabitEthernet2/0] quit
2.
Configure Router B:
# Configure IP addresses for interfaces. (Details not shown.)
# Define an ACL to identify data flows from subnet 10.1.2.0/24 to subnet 10.1.1.0/24.
<RouterB> system-view
[RouterB] acl number 3101
[RouterB-acl-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0
0.0.0.255
[RouterB-acl-adv-3101] quit
# Configure a static route to Host A. The command uses the direct next hop address (2.2.3.3) as
an example.
[RouterB] ip route-static 10.1.1.0 255.255.255.0 gigabitethernet 2/0 2.2.3.3
# Create an IPsec transform set named tran1.
[RouterB] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[RouterB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterB-ipsec-transform-set-tran1] protocol esp
# Specify the ESP encryption and authentication algorithms.
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Create a manual IPsec policy named use1, with the sequence number as 10.
[RouterB] ipsec policy use1 10 manual
# Apply ACL 3101.
[RouterB-ipsec-policy-manual-use1-10] security acl 3101
196

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents