234
Figure 70 Network diagram
Configuration prerequisites
Make sure Router A and Router B can reach each other.
Make sure both Router A and Router B have the CA certificates for certificate signing and
authentication and have obtained a local certificate for IKEv2 negotiation.
Configuring the security gateway Router A
1. Configure PKI:
# Create PKI entity entity_a.
<RouterA> system-view
[RouterA] pki entity entity_a
[RouterA-pki-entity-entity_a] quit
# Configure PKI domain domain_a, the PKI domain used for certificate signing.
[RouterA] pki domain domain_a
[RouterA-pki-domain-domain_a] certificate request entity entity_a
[RouterA-pki-domain-domain_a] crl check disable
[RouterA-pki-domain-domain_a] quit
# Import the CA certificate for certificate signing in offline mode.
[RouterA] pki import-certificate ca domain domain_a der filename aaa_ca.crt
Is the finger print correct?(Y/N):y
# Import the local certificate in offline mode.
[RouterA] pki import-certificate local domain domain_a p12 filename sec001.docm.pfx
# Create PKI entity entity_b.
[RouterA] pki entity entity_b
[RouterA-pki-entity-entity_b] quit
# Configure PKI domain domain_b, the PKI domain used for certificate authentication.
[RouterA] pki domain domain_b
[RouterA-pki-domain-domain_b] certificate request entity entity_b
[RouterA-pki-domain-domain_b] crl check disable
[RouterA-pki-domain-domain_b] quit
# Import the CA certificate for certificate signing in offline mode.
[RouterA] pki import-certificate ca domain domain_b der filename bbb_ca.crt
Is the finger print correct?(Y/N):y
2. Configure ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0
0.0.0.255