279
--- 172.17.17.1 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 4/8/15 ms
Similarly, view the information on Router A. (Omitted)
Configuring IPsec for RIPng example
IPsec configurations for protecting RIPng, OSPFv3, and IPv6 BGP are similar. For more information, see
Layer 3
—
IP Routing Configuration Guide
.
Network requirements
As shown in
, Router A, Router B, and Router C are connected. They learn IPv6 routing
information through RIPng.
•
RIPng packets exchanged between the routers are transmitted through an IPsec tunnel.
•
The security protocol to be used is ESP, encryption algorithm is DES, and authentication algorithm
is SHA1-HMAC-96.
Perform the following configuration tasks:
•
Configure basic RIPng parameters.
•
Configure a manual IPsec policy.
•
Apply the IPsec policy to a RIPng process to protect RIPng packets in this process or to an interface
to protect RIPng packets traveling through the interface.
Figure 98
Network diagram for configuring IPsec for RIPng packets
For information about RIPng configuration, see
Layer 3
—
IP Routing Configuration Guide
.
Configuration procedure
1.
Configure Router A.
# Assign an IPv6 address to each interface. (Omitted)
# Create a RIPng process and enable it on GigabitEthernet 1/0/1.
<RouterA> system-view
[RouterA] ripng 1
[RouterA-ripng-1] quit
[RouterA] interface gigabiethernet 1/0/1
[RouterA-GigabitEthernet1/0/1] ripng 1 enable
[RouterA-GigabitEthernet1/0/1] quit
# Create an IPsec proposal named
tran1
, and set the encapsulation mode to transport mode, the
security protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1-HMAC-
96.
[RouterA] ipsec proposal tran1