306
[SwitchB-ipsec-policy-isakmp-use1-10] local-address 2.2.3.1
[SwitchB-ipsec-policy-isakmp-use1-10] remote-address 2.2.2.1
# Apply the IKE profile
profile1
.
[SwitchB-ipsec-policy-isakmp-use1-10] ike-profile profile1
[SwitchB-ipsec-policy-isakmp-use1-10] quit
# Apply the IPsec policy
use1
to interface VLAN-interface 1.
[SwitchB] interface vlan-interface 1
[SwitchB-Vlan-interface1] ipsec apply policy use1
# Specify a service module or an Ethernet interface module for forwarding the traffic on the
interface.
[SwitchB-Vlan-interface1] service slot 3
[SwitchB-Vlan-interface1] quit
Verifying the configuration
# Initiate a connection from Switch A to Switch B to trigger IKE negotiation. After IPsec SAs are
successfully negotiated by IKE, the traffic between the two switches is IPsec protected.
Configuring an IKE-based IPsec tunnel for IPv6 packets
Network requirements
As shown in
, establish an IPsec tunnel between Switch A and Switch B to protect the data
flows in between. Configure the IPsec tunnel as follows:
•
Specify the encapsulation mode as tunnel, the security protocol as ESP, the encryption
algorithm as 128-bit AES, and the authentication algorithm as HMAC-SHA1.
•
Set up SAs through IKE negotiation.
Figure 90 Network diagram
Configuration procedure
1.
Configure Switch A:
# Configure an IPv6 address for VLAN-interface 1.
<SwitchA> system-view
[SwitchA] interface vlan-interface 1
[SwitchA-Vlan-interface1] ipv6 address 111::1/64
[SwitchA-Vlan-interface1] quit
# Configure an ACL to identify data flows between Switch A and Switch B.
[SwitchA] acl ipv6 number 3101
[SwitchA-acl6-adv-3101] rule 0 permit ip source 111::1/64 destination 222::1/64
[SwitchA-acl6-adv-3101] quit
# Create an IPsec transform set named
tran1
.
[SwitchA] ipsec transform-set tran1
# Specify the encapsulation mode as
tunnel
.
[SwitchA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as
ESP
.
[SwitchA-ipsec-transform-set-tran1] protocol esp
Summary of Contents for 10500 series
Page 326: ...312 No duration limit for this SA ...