HP FlexNetwork 10500 Series Security Configuration Manual page 362

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

<SwitchB> system-view
[SwitchB] interface Vlan-interface1
[SwitchB-Vlan-interface1] ip address 2.2.2.2 255.255.255.0
[SwitchB-Vlan-interface1] quit
# Configure IPv4 advanced ACL 3101 to identify the traffic between Switch B and Switch A.
[SwitchB] acl advanced 3101
[SwitchB-acl-ipv4-adv-3101] rule 0 permit ip source 2.2.2.2 0 destination 1.1.1.0 0
[SwitchB-acl-ipv4-adv-3101] quit
# Create an IPsec transform set named tran1.
[SwitchB] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[SwitchB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[SwitchB-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[SwitchB-ipsec-transform-set-tran1] esp encryption-algorithm des-cbc
[SwitchB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[SwitchB-ipsec-transform-set-tran1] quit
# Create an IKEv2 keychain named keychain1.
[SwitchB] ikev2 keychain keychain1
# Create an IKEv2 peer named peer1.
[SwitchB-ikev2-keychain-keychain1] peer peer1
# Specify the peer IP address 1.1.1.1/24.
[SwitchB-ikev2-keychain-keychain1-peer-peer1] address 1.1.1.1 24
# Specify the peer ID, which is the IP address 1.1.1.1.
[SwitchB-ikev2-keychain-keychain1-peer-peer1] identity address 1.1.1.1
# Specify the plaintext abcde as the pre-shared key to be used with the peer.
[SwitchB-ikev2-keychain-keychain1-peer-peer1] pre-shared-key plaintext abcde
[SwitchB-ikev2-keychain-keychain1-peer-peer1] quit
[SwitchB-ikev2-keychain-keychain1] quit
# Create an IKEv2 profile named profile1.
[SwitchB] ikev2 profile profile1
# Specify the local authentication method as pre-shared key.
[SwitchB-ikev2-profile-profile1] authentication-method local pre-share
# Specify the remote authentication method as pre-shared key.
[SwitchB-ikev2-profile-profile1] authentication-method remote pre-share
# Specify the IKEv2 keychain keychain1.
[SwitchB-ikev2-profile-profile1] keychain keychain1
# Specify the peer ID that the IKEv2 profile matches. The peer ID is the IP address 1.1.1.1/24.
[SwitchB-ikev2-profile-profile1] match remote identity address 1.1.1.1 255.255.255.0
[SwitchB-ikev2-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name use1 and the sequence number 10.
[SwitchB] ipsec policy use1 10 isakmp
# Specify the remote IP address 1.1.1.1 for the IPsec tunnel.
[SwitchB-ipsec-policy-isakmp-use1-10] remote-address 1.1.1.1
# Specify ACL 3101 to identify the traffic to be protected.
[SwitchB-ipsec-policy-isakmp-use1-10] security acl 3101
348

Advertisement

Table of Contents
loading

Table of Contents