264
Task Remarks
Enabling packet information pre-extraction on the IPsec tunnel interface
Optional
Applying a QoS policy to an IPsec tunnel interface
Optional
Enabling the encryption engine
Optional
Configuring the IPsec anti-replay function
Optional
Configuring an IPsec profile
As described previously, an IPsec policy is uniquely identified by its name and sequence number. An
IPsec policy group is a collection of IPsec policies with the same name but different sequence numbers.
In an IPsec policy group, an IPsec policy with a smaller sequence number has a higher priority. After an
IPsec policy group is applied to an interface, for each packet arriving at the interface, the system checks
the IPsec policies of the IPsec policy group in the ascending order of sequence numbers. One IPsec
tunnel is established for each data flow to be protected, and multiple IPsec tunnels may exist on an
interface.
An IPsec profile is similar to an IPsec policy. The difference is that an IPsec profile is uniquely identified
by its name, and it does not support ACL configuration. An IPsec profile defines the IPsec proposal to be
used for protecting data flows and specifies the parameters for IKE negotiation. After an IPsec profile is
applied to an IPsec tunnel interface, only one IPsec tunnel is set up to protect all data flows that are
routed to the tunnel.
IPsec profiles can be applied to only DVPN interfaces and IPsec tunnel interfaces. The IPsec tunnel
established using an IPsec profile protects all IP data routed to the tunnel interface.
Before configuring an IPsec profile, complete the following tasks:
•
IPsec proposal configuration. For more information, see "
."
•
IKE peer configuration. For more information, see "
The parameters for the local and remote ends must match.
NOTE:
•
During an IKE negotiation based on an IPsec profile, the source and destination addresses of the
IPsec tunnel interface are used as the local and remote addresses;
local-address
and
remote-
address
configured for IKE negotiation do not take effect.
•
If you do not configure the destination address of the IPsec tunnel interface, the local peer can only
be an IKE negotiation responder; it cannot initiate an IKE negotiation.
•
DVPN is a technology when VPN is established between enterprise branches that use dynamic
addresses to access the public network. For more information, see
Layer 3—IP Services Configuration
Guide.
To configure an IPsec profile:
To do…
Command…
Remarks
1.
Enter system view.
system-view
—
2.
Create an IPsec profile and
enter its view.
ipsec
profile
profile-name
Required.
By default, no IPsec profile exists.