VPN configuration task list
363
SmartWare Software Configuration Guide
32 • VPN configuration
VPN configuration task list
To configure a VPN connection, perform the following tasks:
•
Creating an IPsec transformation profile
•
Creating an IPsec policy profile
•
Creating/modifying an outgoing ACL profile for IPsec
•
Configuration of an IP Interface and the IP router for IPsec
•
Displaying IPsec configuration information
•
Debugging IPsec
Creating an IPsec transformation profile
The IPsec transformation profile defines which authentication and/or encryption protocols, which authentica-
tion and/or encryption algorithms shall be applied.
Procedure:
To create an IPsec transformation profile
Mode:
Configure
mac-sha1-96 }Enables authentication and defines the authentication protocol and the hash algorithm
Use
no
in front of the above commands to delete a profile or a configuration entry.
Example: Create an IPsec transformation profile
The following example defines a profile for AES-encryption at a key length of 128.
node(cfg)#profile ipsec-transform AES_128
node(pf-ipstr)[AES_128]#esp-encryption aes-cbc 128
Creating an IPsec policy profile
The IPsec policy profile supplies the keys for the encryption and/or the authenticators for the authentication,
the
security parameters indexes
(SPIs), and IP address of the peer of the secured communication. Furthermore,
the profile defines which IPsec transformation profile to apply and whether transport or tunnel mode shall be
most effective.
The SPI identifies a secured communication channel. The IPsec component needs the SPI to select the suitable
key or authenticator. Inbound and outbound channels can have the same SPI, but the channels in the same
direction—inbound or outbound—must have unique SPIs. The SPI is not encrypted and can be monitored.
Step
Command
Purpose
1
node
(cfg)#profile ipsec-transform
name
Creates the IPsec transformation profile
name
2
optional
node
(pf-ipstr)[
name
]#esp-encryption {
aes-cbc | des-cbc | 3des-cbc } [
key-length
]
Enables encryption and defines the encryp-
tion algorithm and the key length
Supported key lengths see section
“Encryp-
tion”
on page 361
3
optional
node
(pf-ipstr)[
name
]#{ ah-authentication
| esp-authentication } {hmac-md5-96 |
hmac-sha1-96 }
Enables authentication and defines the
authentication protocol and the hash algo-
rithm