265
To do…
Command…
Remarks
3.
Specify the IPsec proposals
for the IPsec profile to
reference.
proposal
proposal-name
&<1-6>
Required.
By default, an IPsec profile
references no IPsec proposals.
4.
Specify the IKE peer for the
IPsec profile to reference.
ike-peer
peer-name
Required.
An IPsec profile cannot reference
any IKE peer that is already
referenced by an IPsec policy,
and vice versa.
5.
Enable and configure the PFS
feature for the IPsec profile.
pfs
{
dh-group1
|
dh-group2
|
dh-group5
|
dh-group14
}
Optional.
By default, the PFS feature is not
used.
For more information, see
"
."
6.
Set the SA lifetime.
sa duration
{
time-based
seconds
|
traffic-based
kilobytes
}
Optional.
By default, the SA lifetime of an
IPsec profile equals the current
global SA lifetime.
7.
Return to system view.
quit
—
8.
Set the global SA lifetime.
ipsec sa global-duration
{
time-
based
seconds
|
traffic-based
kilobytes
}
Optional.
3600 seconds for time-based SA
lifetime by default
1,843,200 kilobytes for traffic-
based SA lifetime by default.
Configuring an IPsec tunnel interface
An IPsec tunnel interface uses IPsec as the encapsulation protocol.
To configure an IPsec tunnel interface, complete the following tasks:
1.
Create a tunnel interface, and set the tunnel mode to IPsec over IPv4.
2.
Specify the source address or source interface of the IPsec tunnel interface, which is used as the
local address in IKE negotiation.
3.
Configure the destination addresses of the tunnel interface for the local peer to initiate an IKE
negotiation. If you want the local peer to act only as an IKE negotiation responder, omit this
configuration.
4.
Apply an IPsec profile to the IPsec tunnel interface.
After the link layer of the IPsec tunnel interface comes up, packets routed to the tunnel interface are
protected by IPsec. To ensure that the link layer of the IPsec tunnel interface comes up, make sure that the
following requirements are met:
•
The source address of the tunnel interface is the IP address of the local physical interface that
connects to the remote.
•
The IPsec tunnel interfaces of the IPsec tunnel are configured with proper IPsec profiles.