HP VSR1000 Security Configuration Manual page 237

Virtual services router
Table of Contents

Advertisement

[DeviceB-ike-keychain-keychain1] pre-shared-key address 1.1.1.1 255.255.255.0 key
simple 123456TESTplat&!
[DeviceB-ike-keychain-keychain1] quit
# Create an IKE profile named profile1.
[DeviceB] ike profile profile1
# Specify IKE keychain keychain1
[DeviceB-ike-profile-profile1] keychain keychain1
# Configure the local ID with the identity type as IP address and the value as 2.2.2.2.
[DeviceB-ike-profile-profile1] local-identity address 2.2.2.2
# Configure a peer ID with the identity type as IP address and the value as 1.1.1.1/24.
[DeviceB-ike-profile-profile1] match remote identity address 1.1.1.1 255.255.255.0
[DeviceB-ike-profile-profile1] quit
# Create an IPsec policy named use1, with the sequence number as 10 and the IPsec SA setup
mode as IKE.
[DeviceB] ipsec policy use1 10 isakmp
# Specify the remote IP address 1.1.1.1 for the IPsec tunnel.
[DeviceB-ipsec-policy-isakmp-use1-10] remote-address 1.1.1.1
# Reference ACL 3101 to identify the traffic to be protected.
[DeviceB-ipsec-policy-isakmp-use1-10] security acl 3101
# Reference IPsec transform set tran1 for the IPsec policy.
[DeviceB-ipsec-policy-isakmp-use1-10] transform-set tran1
# Specify IKE profile profile1 for the IPsec policy.
[DeviceB-ipsec-policy-isakmp-use1-10] ike-profile profile1
[DeviceB-ipsec-policy-isakmp-use1-10] quit
# Apply IPsec policy use1 to interface GigabitEthernet 1/0.
[DeviceB-GigabitEthernet1/0] ipsec apply policy use1
# Configure a static route to the subnet where Host A resides.
[DeviceB] ip route-static 10.1.1.0 255.255.255.0 1.1.1.1
Verifying the configuration
When there is traffic between subnets 10.1.1.0/24 and 10.1.2.0/24, IKE negotiation is triggered.
# Display the IKE proposal configuration on Device A and Device B. Because no IKE proposal is
configured, the command displays the default IKE proposal.
[DeviceA] display ike proposal
Priority Authentication Authentication Encryption
----------------------------------------------------------------------------
default
PRE-SHARED-KEY
[DeviceB] display ike proposal
Priority Authentication Authentication Encryption
----------------------------------------------------------------------------
default
PRE-SHARED-KEY
# Display the IKE SA on Device A.
[DeviceA] display ike sa
method
algorithm
SHA1
method
algorithm
SHA1
Diffie-Hellman Duration
algorithm
AES-CBC-128
Group 1
Diffie-Hellman Duration
algorithm
AES-CBC-128
Group 1
227
group
(seconds)
86400
group
(seconds)
86400

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents