EasyManuals Logo

Huawei AR1200 Series Configuration Guide

Huawei AR1200 Series
392 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #10 background imageLoading...
Page #10 background image
5.1 IPSec Overview..............................................................................................................................................284
5.2 IPSec Features Supported by the AR1200.....................................................................................................285
5.3 Establishing an IPSec Tunnel Manually.........................................................................................................286
5.3.1 Establishing the Configuration Task.....................................................................................................286
5.3.2 Defining Protected Data Flows..............................................................................................................287
5.3.3 Configuring an IPSec Proposal..............................................................................................................288
5.3.4 Configuring an IPSec Policy.................................................................................................................288
5.3.5 Applying an IPSec Policy to an Interface..............................................................................................290
5.3.6 Checking the Configuration...................................................................................................................291
5.4 Establishing an IPSec Tunnel Through IKE Negotiation...............................................................................291
5.4.1 Establishing the Configuration Task.....................................................................................................291
5.4.2 Defining Protected Data Flows..............................................................................................................293
5.4.3 (Optional) Configuring an IKE Proposal...............................................................................................293
5.4.4 Configuring an IKE Peer.......................................................................................................................294
5.4.5 Configuring an IPSec Proposal..............................................................................................................296
5.4.6 Configuring an IPSec Policy.................................................................................................................297
5.4.7 Configuring an IPSec Policy Template.................................................................................................298
5.4.8 (Optional) Setting Optional Parameters................................................................................................299
5.4.9 (Optional) Configuring Route Injection................................................................................................301
5.4.10 Applying an IPSec policy to an interface............................................................................................301
5.4.11 Checking the Configuration.................................................................................................................302
5.5 Establishing an IPSec Tunnel Using an IPSec Tunnel Interface....................................................................302
5.5.1 Establishing the Configuration Task.....................................................................................................302
5.5.2 Configuring an IPSec Profile.................................................................................................................303
5.5.3 Configuring an IPSec Tunnel Interface.................................................................................................304
5.5.4 Checking the Configuration...................................................................................................................306
5.6 Establishing an IPSec Tunnel Using the Efficient VPN Policy.....................................................................306
5.6.1 Establishing the Configuration Task.....................................................................................................306
5.6.2 Configuring Client Mode.......................................................................................................................307
5.6.3 Configuring Network Mode..................................................................................................................310
5.6.4 Verifying the Configuration..................................................................................................................313
5.7 Maintaining IPSec..........................................................................................................................................313
5.7.1 Displaying the IPSec Configuration......................................................................................................313
5.7.2 Clearing IPSec Information...................................................................................................................314
5.8 Configuration Examples.................................................................................................................................315
5.8.1 Example for Establishing an SA Manually...........................................................................................315
5.8.2 Example for Configuring IKE Negotiation Using Default Settings......................................................319
5.8.3 Example for Configuring IKE Negotiation...........................................................................................325
5.8.4 Example for Establishing an IPSec Tunnel Using an IPSec Tunnel Interface......................................331
5.8.5 Example for Establishing an SA Using Efficient VPN in Client Mode................................................335
5.8.6 Example for Establishing an SA Using Efficient VPN in Network Mode............................................340
6 DSVPN Configuration............................................................................................................. 344
Huawei AR1200 Series Enterprise Routers
Configuration Guide - VPN Contents
Issue 01 (2012-04-20) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
ix

Table of Contents

Other manuals for Huawei AR1200 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Huawei AR1200 Series and is the answer not in the manual?

Huawei AR1200 Series Specifications

General IconGeneral
BrandHuawei
ModelAR1200 Series
CategoryNetwork Router
LanguageEnglish

Related product manuals