08-IPsec Configuration

HomeSupportConfigure & DeployConfiguration ExamplesH3C Routers Easy and Effortless Routing Feature Configuration Examples-6W10008-IPsec Configuration
01-MER Routers Main Mode IPsec VPN Setup Configuration Examples

MER Routers

Main Mode IPsec VPN Setup Configuration Examples

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2024 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.



Introduction

The following information provides an example for setting up an IPsec VPN between MER routers through main mode IKE negotiation. This configuration example is applicable to scenarios where both the WAN interfaces on the headquarters and branch gateway routers use fixed public addresses.

Prerequisites

The following information applies to Comware 7-based MER router series. Procedures and information in the examples might be slightly different depending on the software or hardware version of the routers.

The configuration examples were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

The following information is provided based on the assumption that you have basic knowledge of IPsec.

Example: Setting up an IPsec VPN through main mode IKE negotiation

Network configuration

As shown in Figure 1, Router A is the gateway of the headquarters and Router B is the gateway of the branch. Router A and Router B each use a single WAN interface with a fixed public address to connect to the Internet. The headquarters and the branch communicate with each other over the Internet.

To protect data flows between the headquarters and the branch, establish an IPsec tunnel between the gateway routers Router A and Router B. The specific requirements are as follows:

·     Configure Router A and Router B to use preshared key 123456TESTplat&! for authentication.

·     Use the main mode IKE negotiation.

·     Specify the encryption algorithm as 3DES-CBC and the authentication algorithm as MD5.

·     Specify the encapsulation mode as the tunnel mode and the security protocol as ESP.

Figure 1 Network diagram

 

 

Analysis

To configure IPsec VPN, complete the following configurations on Router A and Router B:

1.     Configure basic WAN and LAN settings.

a.     Specify the IP address and gateway of the WAN interface on each router.

b.     Edit the default IP address of VLAN-interface 1 on each router.

2.     Add an IPsec policy.

Because the WAN interface on each router uses a fixed IP address to connect to the Internet, configure the IPsec policy to use main mode for phase 1 IKE negotiation.

Software versions used

This configuration example was created and verified on R6749P14 of the MER8300 router.

Restrictions and guidelines

·     Editing the default IP address of VLAN1 will cause Web connection failure. You must use the new IP address to log in to the Web interface again.

·     If your network uses dual-WAN or multiple-WAN access, configure a static route on each router to direct the traffic destined for the peer internal network to the WAN interface specified in the IPsec policy.

·     Make sure both sides of the IPsec tunnel use the same preshared key, security protocol, encryption algorithm, authentication algorithm, and encapsulation mode.

Procedures

Configuring Router A

Editing the IP address of VLAN-interface 1

# Change the IP address of VLAN-interface 1 to 10.1.1.1/24. The configuration steps are as follows:

1.     From the left navigation pane, select Network > LAN Settings.

2.     Click the LAN Settings tab.

3.     Click the edit icon in the Operation column for VLAN1.

4.     In the Interface IP address field, enter 10.1.1.1.

5.     In the Subnet mask field, enter 255.255.255.0.

6.     Use the default settings for the other parameters, and click Apply.

Figure 2 Editing the LAN configuration

 

Configuring WAN1 to connect to the Internet

# In this example, select the single-WAN scenario for Router A, and set the connection mode of the selected WAN interface to fixed IP. The configuration steps are as follows:

1.     On the Web interface of the device, select Network > WAN Settings from the navigation pane.

2.     On the Scene tab, select Single-WAN scenario, select WAN1 for Line1, and then click Apply.

3.     Click the WAN Settings tab.

4.     Click the Edit icon in the Operation column for WAN1.

5.     In the Connection mode field, select Fixed IP.

6.     In the IP Address field, enter 2.2.2.1.

7.     In the Subnet mask field, enter 255.255.255.0.

8.     In the Gateway field, enter 2.2.2.254.

9.     Use the default settings for other parameters. Click Apply.

Figure 3 Configuring the WAN scenario

 

Figure 4 Editing WAN settings

 

Configuring the IPsec policy

# Specify the network mode as headquarters gateway and the IKE negotiation mode as main mode. The configuration steps are as follows:

1.     From the navigation pane, select Virtual Network > IPsec VPN.

2.     Click Add. On the page that opens, configure the following parameters:

¡     Specify the name as map1.

¡     Select WAN1 in the Interface field.

¡     Select Headquarters gateway in the Network mode field.

¡     Enter 123456TESTplat&! in the Preshared key field.

Figure 5 Configuring the IPsec policy

 

3.     Click Show advanced settings. On the page that opens, configure the following parameters:

¡     In the Negotiation mode field, select Main mode.

¡     In the Local ID field, select IP address, and then enter 2.2.2.1.

¡     In the DPD field, select Enable, and set the DPD retry interval to 30 seconds. (This feature is disabled by default. To monitor the availability of the IPsec tunnel in time, enable this feature.)

¡     In the Algorithm suite field, select Customize.

¡     In the Authentication algorithm field, select MD5.

¡     In the Encryption algorithm field, select 3DES-CBC.

¡     Use the default settings for other parameters.

Figure 6 IKE settings

 

4.     Click the IPsec settings tab, and then configure the following parameters:

¡     In the Algorithm combination field, select Customize.

¡     In the Security protocol field, select ESP.

¡     In the ESP authentication algorithm field, select MD5.

¡     In the encryption algorithm field, select encryption algorithm.

¡     In the Encapsulation mode field, select Tunnel.

¡     Use the default settings for other parameters.

5.     Click Back to basic settings to go back to the Add IPsec Policy page.

Figure 7 IPsec settings

 

Configuring Router B

Editing the IP address of VLAN-interface 1

# Edit the IP address of VLAN-interface 1 to 10.1.2.1/24. The configuration steps are as follows:

1.     From the left navigation pane, select Network > LAN Settings.

2.     Click the LAN Settings tab.

3.     Click the edit icon in the Operation column for VLAN1.

4.     In the Interface IP address field, enter 10.1.2.1.

5.     In the Subnet mask field, enter 255.255.255.0.

6.     Use the default settings for other parameters, and then click Apply.

Figure 8 Editing LAN settings

 

Configuring WAN1 to connect to the Internet

# In this example, select the single-WAN scenario for Router B, and set the connection mode of the selected WAN interface to fixed IP. The configuration steps are as follows:

1.     On the Web interface of the device, select Network > WAN Settings from the navigation pane.

2.     On the Scene tab, select Single-WAN scenario, select WAN1 for Line1, and then click Apply.

3.     Click the WAN Settings tab.

4.     Click the Edit icon in the Operation column for WAN1.

5.     In the Connection mode field, select Fixed IP.

6.     In the IP Address field, enter 2.2.3.1.

7.     In the Subnet mask field, enter 255.255.255.0.

8.     In the Gateway field, enter 2.2.3.254.

9.     Use the default settings for other parameters. Click Apply.

Figure 9 Configuring the WAN scenario

 

Figure 10 Editing WAN settings

 

Configuring the IPsec policy

# Specify the network mode as branch gateway and the IKE negotiation mode as main mode. The configuration steps are as follows:

1.     From the navigation pane, select Virtual Network > IPsec VPN.

2.     Click Add. On the page that opens, configure the following parameters:

¡     Specify the name as map1.

¡     Select WAN1 in the Interface field.

¡     Select Branch gateway in the Network mode field.

¡     Enter 2.2.2.1 in the Peer gateway address field.

¡     Enter 123456TESTplat&! in the Preshared key field.

¡     In the Protected data flows area, select IP as the protocol to be protected, enter 10.1.2.0/24 in the Local subnet/mask filed and 10.1.1.0/24 in the Peer subnet/mask field, and then click the + icon.

Figure 11 Configuring the IPsec policy

 

3.     Click Show advanced settings. On the page that opens, configure the following parameters:

¡     In the Negotiation mode field, select Main mode.

¡     In the Local ID field, select IP address, and then enter 2.2.3.1.

¡     In the Remote ID field, select IP address, and then enter 2.2.2.1.

¡     In the DPD field, select Enable, and set the DPD retry interval to 30 seconds. (This feature is disabled by default. To monitor the availability of the IPsec tunnel in time, enable this feature.)

¡     In the Algorithm suite field, select Customize.

¡     In the Authentication algorithm field, select MD5.

¡     In the Encryption algorithm field, select 3DES-CBC.

¡     Use the default settings for other parameters.

Figure 12 IKE settings

 

4.     Click the IPsec settings tab, and then configure the following parameters:

¡     In the Algorithm combination field, select Customize.

¡     In the Security protocol field, select ESP.

¡     In the ESP authentication algorithm field, select MD5.

¡     In the ESP encryption algorithm field, select 3DES-CBC.

¡     In the Encapsulation mode field, select Tunnel.

¡     Use the default settings for other parameters.

5.     Click Back to basic settings to go back to the Add IPsec Policy page.

Figure 13 IPsec settings

 

Verifying the configuration

1.     Verify that Host A can ping Host B successfully.

C:\Users\abc>ping 10.1.2.2

Ping 10.1.2.2 (10.1.2.2): 56 data bytes, press CTRL_C to break

56 bytes from 10.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms

56 bytes from 10.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms

56 bytes from 10.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms

56 bytes from 10.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms

56 bytes from 10.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms

 

--- Ping statistics for 10.1.2.2 ---

5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss

round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms

C:\Users\abc>

2.     On the Web interface of a router, navigate to the Virtual Network > IPsec VPN > Monitor information page to view IPsec tunnel information. Status Up indicates successful establishment of the IPsec tunnel.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网