Ipsec Policy Local-Address - HPE FlexFabric 7900 Series Security Command Reference

Hide thumbs Also See for FlexFabric 7900 Series:
Table of Contents

Advertisement

Default
No IPsec policy is created.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
policy: Specifies an IPv4 IPsec policy.
policy-name: Specifies a name for the IPsec policy, a case-insensitive string of 1 to 63 characters.
seq-number: Specifies a sequence number for the IPsec policy, in the range of 1 to 65535.
isakmp: Establishes IPsec SAs through IKE negotiation.
manual: Establishes IPsec SAs manually.
Usage guidelines
When you create an IPsec policy, you must specify the SA setup mode (isakmp or manual).
When you enter the view of an existing IPsec policy, you do not need to specify the SA setup
mode.
You cannot change the SA setup mode of an existing IPsec policy.
An IPsec policy is a set of IPsec policy entries that have the same name but different sequence
numbers. In the same IPsec policy, an IPsec policy entry with a smaller sequence number has a
higher priority.
With the seq-number argument specified, the undo command deletes the specified IPsec
policy entry. Without this argument, the undo command deletes all entries of the specified
IPsec policy.
Examples
# Create an IPsec policy entry, and specify the IPsec policy name as policy1, the sequence number
as 100, and the IPsec SA setup mode as IKE, and enter the IPsec policy view.
<Sysname> system-view
[Sysname] ipsec policy policy1 100 isakmp
[Sysname-ipsec-policy-isakmp-policy1-100]
# Create an IPsec policy entry, and specify the IPsec policy name as policy1, the sequence number
as 101, and the IPsec SA setup mode as manual, and enter the IPsec policy view.
<Sysname> system-view
[Sysname] ipsec policy policy1 101 manual
[Sysname-ipsec-policy-manual-policy1-101]
Related commands
display ipsec policy
ipsec apply

ipsec policy local-address

Use ipsec policy local-address to bind an IPsec policy to a source interface.
Use undo ipsec policy local-address to remove the bindings of IPsec policies and source
interfaces.
195

Advertisement

Table of Contents
loading

Table of Contents