284
IPsec for RIPng configuration example
The IPsec configuration procedures for protecting OSPFv3 and IPv6 BGP are similar. For more
information about RIPng, OSPFv3, and IPv6 BGP, see
Layer 3
—
IP Routing Configuration Guide
.
Network requirements
As shown in
, Switch A, Switch B, and Switch C are connected. They learn IPv6 routing
information through RIPng.
Configure IPsec for RIPng so that RIPng packets exchanged between the switches are transmitted through
an IPsec tunnel. Configure IPsec to use the security protocol ESP, the encryption algorithm DES, and the
authentication algorithm SHA1-HMAC-96.
Figure 86
Network diagram
Configuration considerations
To meet the requirements, perform the following configuration tasks:
•
Configure basic RIPng parameters.
•
Configure a manual IPsec policy.
•
Apply the IPsec policy to a RIPng process to protect RIPng packets in this process or to an interface
to protect RIPng packets traveling through the interface.
Configuration procedure
1.
Configure Switch A
# Assign an IPv6 address to each interface. (Details not shown)
# Create a RIPng process and enable it on VLAN-interface 100.
<SwitchA> system-view
[SwitchA] ripng 1
[SwitchA-ripng-1] quit
[SwitchA] interface vlan-interface 100
[SwitchA-Vlan-interface100] ripng 1 enable
[SwitchA-Vlan-interface100] quit
# Create an IPsec proposal named
tran1
, and set the encapsulation mode to transport mode, the security
protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1-HMAC-96.
[SwitchA] ipsec proposal tran1
[SwitchA-ipsec-proposal-tran1] encapsulation-mode transport
[SwitchA-ipsec-proposal-tran1] transform esp
[SwitchA-ipsec-proposal-tran1] esp encryption-algorithm des
[SwitchA-ipsec-proposal-tran1] esp authentication-algorithm sha1
[SwitchA-ipsec-proposal-tran1] quit
# Create an IPsec policy named
policy001
, specify the manual mode for it, and set the SPIs of the
inbound and outbound SAs to 123456, and the keys for the inbound and outbound SAs using ESP to
abcdefg.