Got it

【AR Interconnection Configuration Guide】Example for Establishing a DSVPN Over IPSec Tunnel Between a Branch Gateway (AR) and Headquarters Gateway

Latest reply: Jun 25, 2021 17:41:07 124 1 1 0 0

Networking Requirements

A large-sized enterprise has the headquarters (Hub) and multiple branches (Spoke1, Spoke2, and other Spokes) located in different areas, and the branches connect to public networks using dynamic IP addresses. This example uses two branches. The Hub is a Cisco router, and Spoke1 and Spoke2 are AR routers.

The enterprise requires that VPN connections between branches should be achieved and data transmitted between the headquarters and a branch, and between branches should be encrypted.

Figure1 Networking for establishing DSVPN over IPSec tunnels between AR routers and Cisco router

2_en-us_image_0177894407.vsd

Data Plan

Before the configuration, plan data according to Table Data plan for interconnection between the AR and Cisco router. The data in Table Data plan for interconnection between the AR and Cisco router is used for reference only.

Table1 Data plan for interconnection between the AR and Cisco router

Spoke1 Public Network Address

1.1.2.10

Spoke1 Tunnel Interface Address

10.2.1.2

Spoke1 Private Network Address

10.1.1.1

Spoke2 Public Network Address

1.1.3.10

Spoke2 Tunnel Interface Address

10.2.1.3

Spoke2 Private Network Address

10.1.2.1

Cisco Public Network Address

1.1.1.10

Cisco Tunnel Interface Address

10.2.1.1

Cisco Private Network Address

10.1.0.1

NHRP Parameters

DSVPN domain: 1000

NHRP authentication key: huawei12

NHRP branch registration interval: 1800s

NHRP headquarters hold time: 3600s

Parameters for IPSec Phase 1 (IKE Negotiation Phase)

IKE version: v1

Negotiation mode: main

Authentication method: pre-shared key

Pre-shared key: huawei@123

Encryption algorithm: aes-cbc-128

Authentication algorithm: sha1

DH group: group5

Lifetime: 28800s

DPD detection: enabled

Parameters for IPSec Phase 2 (IPSec Negotiation Phase)

Security protocol: ESP

Encapsulation mode: transport

Encryption algorithm: aes-128

Authentication algorithm:sha1

Lifetime: 3600s (default value)

PFS: enabled



andersoncf1
MVE Author Created Jun 25, 2021 17:41:07

Thanks for sharing knowledge. This is important
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.