
Key Management (IKE)
298
IPLink Software Configuration Guide
26 • VPN configuration
Creating/modifying an outgoing ACL profile for IPSEC
This is basically the same as for manual keyed IPSEC connections (
“Creating an IPsec policy profile”
on
page 290). Make sure that your ACL allows traffic from and to UDP port 500 in plaintext to allow ISAKMP
messages to be exchanged.
Configuration of an IP interface and the IP router for IPSEC
This is exactly the same as for manual keyed IPSEC connections (
“Creating an IPsec policy profile”
on
page 290).
Policy matching
Normally, if an initial ISAKMP message is received from the network, the system tries to find the correspond-
ing ISAKMP IPSEC policy by matching the received source-ip address with the peer IP address of an IPSEC
policy.
However, in applications with dynamic IP addressing, a Fully Qualified Domain Name (FQDN) might be
specified as the peer, rather than using an IP address. In this case, it is not possible to find the correct policy
using the source-ip address. To solve this problem, you specify the same protection-group ID in the ISAKMP
IPSEC policy profiles for all of the peers. The peers should all use the same remote policy. In this case, if the
system receives an initial IKE packet, it will search for an ISAKMP IPSEC policy profile, which has the same
protection-group ID as the policy that created the ISAKMP packet.
Sample configuration snippet
Below you see a sample of the minimal required settings to be added to a configuration file in order to establish
an IKE IPSEC connection:
profile acl WAN_Out
permit 1 esp any any
permit 2 ah any any
permit 3 udp any any eq 500
permit 4 ip any 10.0.0.0 0.255.255.255 ipsec-policy VPN
permit 5 ip any any
profile ipsec-transform IPSEC_3DES_192
esp-encryption 3des-cbc 192
profile isakmp-transform ISAKMP_3DES_192
encryption 3des-cbc 192
authentication-algorithm sha1
9
optional
node(pf- ipsik)
[<
name>
]#
protection-
group <group>
If required, you can specify a protection group.
The protection-group is a proprietary feature and
is not compatible with third-party devices. There-
fore do not configure it for connections to third
party devices.
Step
Command
Purpose