IKE Configuration
Example
Example for Configuring
Network requirements
IKE
An IPSec tunnel is established through IKE automatic negotiation between
■
gateways Router A and Router B so that Host A and Host B communicate
securely.
Router A is configured with an IKE proposal with sequence number of 10 and
■
MD5 authentication algorithm. Router B has only the default IKE proposal.
The two routers use the pre-shared key authentication method.
■
Network diagram
Figure 555 Network diagram for IKE configuration
Security gateway
Router A
Host A
Configuration procedure
1 Configure Router A
# Configure an IKE peer.
<RouterA> system-view
[RouterA] ike peer peer
[RouterA-ike-peer-peer] pre-shared-key abcde
[RouterA-ike-peer-peer] remote-address 2.2.2.2
[RouterA-ike-peer-peer] quit
# Create an IKE proposal 10.
[RouterA] ike proposal 10
# Set the authentication algorithm to MD5.
[RouterA-ike-proposal-10] authentication-algorithm md5
# Set the authentication method to the pre-shared key.
[RouterA-ike-proposal-10] authentication-method pre-share
# Set the ISAKMP SA lifetime to 5,000 seconds.
S 2 /0
1.1.1.1 /16
Internet
IKE Configuration Example
Security gateway
Router B
S 2/2
2.2 .2.2/ 16
Host B
1909
Need help?
Do you have a question about the MSR 50 Series and is the answer not in the manual?
Questions and answers