491
IPsec SAs. As long as the source interface is up, the negotiated IPsec SAs will not be removed and
will keep working, regardless of link failover.
After an IPsec policy is applied to a service interface and IPsec SAs have been established, if you
bind the IPsec policy to a source interface, the existing IPsec SAs are deleted.
Only an IKE-based IPsec policy can be bound to a source interface.
An IPsec policy can be bound to only one source interface. If you execute this command multiple
times, the most recent configuration takes effect.
A source interface can be bound to multiple IPsec policies.
As a best practice, use a stable interface, such as a Loopback interface, as a source interface.
Examples
# Bind the IPsec policy
map
to source interface Loopback 11.
<Sysname> system-view
[Sysname] ipsec policy map local-address loopback 11
Related commands
ipsec
{
ipv6-policy
|
policy
}
ipsec { ipv6-policy-template | policy-template }
Use
ipsec
{
ipv6-policy-template
|
policy-template
} to create an IPsec policy template entry and
enter its view, or enter the view of an existing IPsec policy template entry.
Use
undo
ipsec
{
ipv6-policy-template
|
policy-template
} to delete the specified IPsec policy
template.
Syntax
ipsec
{
ipv6-policy-template
|
policy-template
}
template-name
seq-number
undo
ipsec
{
ipv6-policy-template
|
policy-template
}
template-name
[
seq-number
]
Default
No IPsec policy templates exist.
Views
System view
Predefined user roles
network-admin
Parameters
ipv6-policy-template
: Specifies an IPv6 IPsec policy template.
policy-template
: Specifies an IPv4 IPsec policy template.
template-name
: Specifies a name for the IPsec policy template, a case-insensitive string of 1 to 63
characters.
seq-number
: Specifies a sequence number for the IPsec policy template entry, in the range of 1 to
65535. A smaller number indicates a higher priority.
Usage guidelines
The configurable parameters for an IPsec policy template are similar to the parameters that you use
when you configure an IKE-based IPsec policy. However, all parameters except for the IPsec
transform sets and the IKE peer are optional for an IPsec policy template.