580
C
HAPTER
40: C
ONFIGURING
IPS
EC
[RouterB-Serial0]
ipsec policy use1
[RouterB-Serial0]
ip address 202.38.162.1 255.255.255.0
o
Configure the route.
[RouterB]
ip route-static 10.1.1.0 255.255.255.0 202.38.163.1
After the configuration is complete and the security tunnel between Router A and
Router B is established, the data stream between Subnet 10.1.1.x and Subnet
10.1.2.x will be transmitted with encryption.
Creating an SA in IKE
Negotiation Mode
Establish a security tunnel between Router A and Router B to perform security
protection for the data streams between PC-A represented subnet (10.1.1.x) and
PC-B represented subnet (10.1.2.x). The security protocol adopts ESP protocol,
algorithm adopts DES, and authentication algorithm adopts sha1-hmac-96. See
Figure 174 for an illustration of the configuration.
Prior to configuring, you should ensure that Router A and Router B can interwork
at the network layer through a serial interface.
1
Configure Router A:
a
Configure an access list and define the data stream from Subnet 10.1.1x to
Subnet 10.1.2x.
[RouterA]
acl 101
[RouterA-acl-101]
rule permit ip source 10.1.1.0 0.0.0.255
destination 10.1.2.0 0.0.0.255
[RouterA-acl-101]
rule deny ip source any destination any
b
Create the IPSec proposal view named trans1
[RouterA]
ipsec proposal tran1
c
Adopt tunnel mode as the message-encapsulating form
[RouterA-ipsec-proposal-tran1]
encapsulation-mode tunnel
d
Adopt ESP protocol as security protocol
[RouterA-ipsec-proposal-tran1]
transform esp-new
e
Select authentication algorithm and encryption algorithm
[RouterA-ipsec-proposal-tran1]
esp-new encryption-algorithm des
[RouterA-ipsec-proposal-tran1]
esp-new authentication-algorithm
sha1-hmac-96
f
Create a security policy with negotiation mode as isakmp
[RouterA]
ipsec policy policy1 10 isakmp
g
Set remote addresses
[RouterA-ipsec-policy-policy1-10]
tunnel remote 202.38.162.1
h
Quote IPSec proposal
[RouterA-ipsec-policy-policy1-10]
proposal tran1
i
Quote access list
[RouterA-ipsec-policy-policy1-10]
security acl 101
j
Exit to system view
[RouterA-ipsec-policy-policy1-10]
quit
k
Enter serial interface view
Summary of Contents for 3036
Page 1: ...http www 3com com 3Com Router Configuration Guide Published March 2004 Part No 10014299 ...
Page 4: ...VPN 615 RELIABILITY 665 QOS 681 DIAL UP 721 ...
Page 6: ...2 ABOUT THIS GUIDE ...
Page 7: ...I GETTING STARTED Chapter 1 3Com Router Introduction Chapter 2 3Com Router User Interface ...
Page 8: ...4 ...
Page 16: ...12 CHAPTER 1 3COM ROUTER INTRODUCTION ...
Page 34: ...30 ...
Page 60: ...56 CHAPTER 3 SYSTEM MANAGEMENT ...
Page 98: ...94 CHAPTER 6 DISPLAY AND DEBUGGING TOOLS ...
Page 110: ...106 ...
Page 114: ...110 CHAPTER 8 INTERFACE CONFIGURATION OVERVIEW ...
Page 158: ...154 CHAPTER 10 CONFIGURING WAN INTERFACE ...
Page 168: ...164 ...
Page 188: ...184 CHAPTER 13 CONFIGURING PPPOE CLIENT ...
Page 192: ...188 CHAPTER 14 CONFIGURING SLIP Router ip route static 0 0 0 0 0 0 0 0 10 110 0 1 ...
Page 248: ...244 CHAPTER 16 CONFIGURING LAPB AND X 25 ...
Page 320: ...316 ...
Page 330: ...326 CHAPTER 20 CONFIGURING IP ADDRESS ...
Page 362: ...358 CHAPTER 21 CONFIGURING IP APPLICATION ...
Page 374: ...370 CHAPTER 23 CONFIGURING IP COUNT ...
Page 406: ...402 CHAPTER 25 CONFIGURING DLSW ...
Page 408: ...404 ...
Page 452: ...448 CHAPTER 29 CONFIGURING OSPF ...
Page 482: ...478 CHAPTER 30 CONFIGURING BGP ...
Page 494: ...490 CHAPTER 31 CONFIGURING IP ROUTING POLICY ...
Page 502: ...498 ...
Page 508: ...504 CHAPTER 33 IP MULTICAST ...
Page 514: ...510 CHAPTER 34 CONFIGURING IGMP ...
Page 526: ...522 CHAPTER 36 CONFIGURING PIM SM ...
Page 528: ...524 ...
Page 532: ...528 CHAPTER 37 CONFIGURING TERMINAL ACCESS SECURITY ...
Page 550: ...546 CHAPTER 38 CONFIGURING AAA AND RADIUS PROTOCOL ...
Page 590: ...586 CHAPTER 40 CONFIGURING IPSEC ...
Page 599: ...IX VPN Chapter 42 Configuring VPN Chapter 43 Configuring L2TP Chapter 44 Configuring GRE ...
Page 600: ...596 ...
Page 638: ...634 CHAPTER 43 CONFIGURING L2TP ...
Page 649: ...X RELIABILITY Chapter 45 Configuring a Standby Center Chapter 46 Configuring VRRP ...
Page 650: ...646 ...
Page 666: ...662 ...
Page 670: ...666 CHAPTER 47 QOS OVERVIEW ...
Page 700: ...696 CHAPTER 49 CONGESTION MANAGEMENT ...
Page 706: ...702 CHAPTER 50 CONGESTION AVOIDANCE ...
Page 707: ...XII DIAL UP Chapter 51 Configuring DCC Chapter 52 Configuring Modem ...
Page 708: ...704 ...
Page 762: ...758 CHAPTER 52 CONFIGURING MODEM ...