EasyManua.ls Logo

HPE FlexNetwork MSR Series - Page 241

HPE FlexNetwork MSR Series
547 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
228
Figure 69 Network diagram
Configuration prerequisites
Make sure Router A and Router B can reach each other.
Configure the security gateway Router A
1. Configure ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<RouterA> system-view
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0
0.0.0.255
[RouterA-acl-adv-3101] quit
2. Configure an IPsec transform set:
# Create IPsec transform set transform_a.
[RouterA] ipsec transform-set transform_a
# Configure the IPsec transform set to use the security protocol ESP, encryption algorithm DES,
and authentication algorithm SHA1.
[RouterA-ipsec-transform-set-transform_a] transform esp
[RouterA-ipsec-transform-set-transform_a] esp encryption-algorithm des
[RouterA-ipsec-transform-set-transform_a] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-transform_a] quit
3. Configure an IKEv2 proposal:
# Create IKEv2 proposal proposal_a.
[RouterA] ikev2 proposal proposal_a
# Configure the IKEv2 proposal to use the encryption algorithm AES-CBC-192, integrity
protection algorithm MD5, PRF algorithm MD5, and 1024-bit DH group.
[RouterA-proposal-proposal_a] encryption aes-cbc-192
[RouterA-proposal-proposal_a] integrity md5
[RouterA-proposal-proposal_a] prf md5
[RouterA-proposal-proposal_a] group 2
[RouterA-proposal-proposal_a] quit
4. Configure an IKEv2 policy:
# Create IKEv2 policy policy_a.
[RouterA] ikev2 policy policy_a
# Configure the IKEv2 policy to use IKEv2 proposal proposal_a.
[RouterA-policy-policy_a] proposal proposal_a
[RouterA-policy-policy_a] quit
5. Configure an IKEv2 keyring:

Table of Contents

Other manuals for HPE FlexNetwork MSR Series

Related product manuals