293
Configure Switch A and Switch B to use the default IKE proposal for the IKE negotiation to set up the IPsec
SA. Configure the two switches to use the pre-shared key authentication method.
Figure 86
Network diagram
Configuration procedure
Make sure Switch A and Switch B can reach each other.
1.
Configure Switch A:
# Assign an IP address to VLAN-interface 1.
<SwitchA> system-view
[SwitchA] interface vlan-interface 1
[SwitchA-vlan-interface1] ip address 1.1.1.1 255.255.0.0
[SwitchA-vlan-interface1] quit
# Configure ACL 3101 to identify traffic between Switch A and Switch B.
[SwitchA] acl number 3101
[SwitchA-acl-adv-3101] rule 0 permit ip source 1.1.1.1 0 destination 2.2.2.2 0
[SwitchA-acl-adv-3101] quit
# Create IPsec transform set
tran1
.
[SwitchA] ipsec transform-set tran1
# Set the packet encapsulation mode to
tunnel
.
[SwitchA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use the ESP protocol for the IPsec transform set.
[SwitchA-ipsec-transform-set-tran1] protocol esp
# Specify the encryption and authentication algorithms.
[SwitchA-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-192
[SwitchA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[SwitchA-ipsec-transform-set-tran1] quit
# Create IKE keychain
keychain1
.
[SwitchA] ike keychain keychain1
# Specify
12345zxcvb!@#$%ZXCVB
as the plaintext pre-shared key.
[SwitchA-ike-keychain-keychain1] pre-shared-key address 2.2.2.2 255.255.0.0 key
simple 12345zxcvb!@#$%ZXCVB
[SwitchA-ike-keychain-keychain1] quit
# Create IKE profile
profile1
.
[SwitchA] ike profile profile1
# Specify IKE keychain
keychain1
.
[SwitchA-ike-profile-profile1] keychain keychain1
# Configure a peer ID with the identity type of IP address and the value of
2.2.2.2
.
[SwitchA-ike-profile-profile1] match remote identity address 2.2.2.2 255.255.0.0
[SwitchA-ike-profile-profile1] quit
# Create an IKE-based IPsec policy entry with the name
map1
and the sequence number 10.
[SwitchA] ipsec policy map1 10 isakmp