Huawei AR1200 series Configuration Manual page 10

Enterprise routers
Hide thumbs Also See for AR1200 series:
Table of Contents

Advertisement

Huawei AR1200 Series Enterprise Routers
Configuration Guide - VPN
5.1 IPSec Overview..............................................................................................................................................284
5.2 IPSec Features Supported by the AR1200.....................................................................................................285
5.3 Establishing an IPSec Tunnel Manually.........................................................................................................286
5.3.1 Establishing the Configuration Task.....................................................................................................286
5.3.2 Defining Protected Data Flows..............................................................................................................287
5.3.3 Configuring an IPSec Proposal..............................................................................................................288
5.3.4 Configuring an IPSec Policy.................................................................................................................288
5.3.5 Applying an IPSec Policy to an Interface..............................................................................................290
5.3.6 Checking the Configuration...................................................................................................................291
5.4 Establishing an IPSec Tunnel Through IKE Negotiation...............................................................................291
5.4.1 Establishing the Configuration Task.....................................................................................................291
5.4.2 Defining Protected Data Flows..............................................................................................................293
5.4.3 (Optional) Configuring an IKE Proposal...............................................................................................293
5.4.4 Configuring an IKE Peer.......................................................................................................................294
5.4.5 Configuring an IPSec Proposal..............................................................................................................296
5.4.6 Configuring an IPSec Policy.................................................................................................................297
5.4.7 Configuring an IPSec Policy Template.................................................................................................298
5.4.8 (Optional) Setting Optional Parameters................................................................................................299
5.4.9 (Optional) Configuring Route Injection................................................................................................301
5.4.10 Applying an IPSec policy to an interface............................................................................................301
5.4.11 Checking the Configuration.................................................................................................................302
5.5 Establishing an IPSec Tunnel Using an IPSec Tunnel Interface....................................................................302
5.5.1 Establishing the Configuration Task.....................................................................................................302
5.5.2 Configuring an IPSec Profile.................................................................................................................303
5.5.3 Configuring an IPSec Tunnel Interface.................................................................................................304
5.5.4 Checking the Configuration...................................................................................................................306
5.6 Establishing an IPSec Tunnel Using the Efficient VPN Policy.....................................................................306
5.6.1 Establishing the Configuration Task.....................................................................................................306
5.6.2 Configuring Client Mode.......................................................................................................................307
5.6.3 Configuring Network Mode..................................................................................................................310
5.6.4 Verifying the Configuration..................................................................................................................313
5.7 Maintaining IPSec..........................................................................................................................................313
5.7.1 Displaying the IPSec Configuration......................................................................................................313
5.7.2 Clearing IPSec Information...................................................................................................................314
5.8 Configuration Examples.................................................................................................................................315
5.8.1 Example for Establishing an SA Manually...........................................................................................315
5.8.2 Example for Configuring IKE Negotiation Using Default Settings......................................................319
5.8.3 Example for Configuring IKE Negotiation...........................................................................................325
5.8.5 Example for Establishing an SA Using Efficient VPN in Client Mode................................................335
6 DSVPN Configuration............................................................................................................. 344
Issue 01 (2012-04-20)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Contents
ix

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ar3200 series

Table of Contents