1894
C
100: IPS
HAPTER
EC
C
ONFIGURATION
10.1.1.0/24 (represented by Host A) and subnet 10.1.2.0/24 (represented by
Host B).
The security protocol to be used is ESP, encryption algorithm is DES, and
■
authentication algorithm is SHA1-HMAC-96.
Network diagram
See
Figure
551.
Configuration procedure
1 Configure Router A
# Define an ACL to permit data flows from subnet 10.1.1.0/24 to subnet
10.1.2.0/24.
<RouterA> system-view
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 dest
ination 10.1.2.0 0.0.0.255
[RouterA-acl-adv-3101] rule deny ip source any destination any
[RouterA-acl-adv-3101] quit
# Configure a static route to Host B.
[RouterA] ip route-static 10.1.2.0 255.255.255.0 serial 2/1
# Create an IPSec proposal named tran1.
[RouterA] ipsec proposal tran1
# Specify the encapsulation mode as tunnel.
[RouterA-ipsec-proposal-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterA-ipsec-proposal-tran1] transform esp
# Specify the algorithms for the proposal.
[RouterA-ipsec-proposal-tran1] esp encryption-algorithm des
[RouterA-ipsec-proposal-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-proposal-tran1] quit
# Configure the IKE peer.
[RouterA] ike peer peer
[RouterA-ike-peer-peer] pre-share-key abcde
[RouterA-ike-peer-peer] remote-address 2.2.3.1
# Create an IPSec policy, specifying to use the IKE negotiation mode.
[RouterA] ipsec policy map1 10 isakmp
# Apply the IPSec proposal.
[RouterA-ipsec-policy-isakmp-map1-10] proposal tran1
Need help?
Do you have a question about the MSR 50 Series and is the answer not in the manual?