Got it

【AR Interconnection Configuration Guide】Example for Establishing an IPSec Tunnel Between a Branch Gateway (AR) and Headquarters Gateway (Cisco Rou

Latest reply: Jun 24, 2021 18:54:59 127 1 1 0 0

Networking Requirements

On a network shown in Figure Establishing an IPSec tunnel between a branch gateway (AR) and headquarters gateway (Cisco router) using VT interfaces, AR router RouterA functions as the branch gateway and Cisco router RouterB functions as the headquarters gateway. They communicate over the Internet.

The enterprise wants to protect traffic transmitted over the Internet between the enterprise branch and headquarters. An IPSec tunnel can be established between the headquarters gateway and branch gateway to protect communication between the headquarters and branch over the Internet. If a large amount of data flows need to be protected by IPSec, it is recommended that the IPSec tunnel be established using virtual tunnel (VT) interfaces. There is no need to create ACL rules to define traffic characteristics to be protected.

Figure1 Establishing an IPSec tunnel between a branch gateway (AR) and headquarters gateway (Cisco router) using VT interfaces

3_en-us_image_0177894426.vsd

Data Plan

Before the configuration, plan data according to Table Data plan for interconnection between the RouterA and RouterB. The data in Table Data plan for interconnection between the RouterA and RouterB is used for reference only.

Table1 Data plan for interconnection between the RouterA and RouterB

RouterA Public Network Address

1.1.2.10

RouterA Tunnel Interface Address

10.2.1.2

RouterA Private Network Address

10.1.1.1

RouterB Public Network Address

1.1.1.10

RouterB Tunnel Interface Address

10.2.1.1

RouterB Private Network Address

10.1.2.1

Parameters for IPSec Phase 1 (IKE Negotiation Phase)

IKE version: v1

Negotiation mode: main

Authentication method: pre-shared key

Pre-shared key: huawei@123

Encryption algorithm: aes-cbc-128

Authentication algorithm: sha1

DH group: group5

DPD detection: enabled

Parameters for IPSec Phase 2 (IPSec Negotiation Phase)

Security protocol: ESP

Encapsulation mode: tunnel

Encryption algorithm: aes-128

Authentication algorithm: sha1

Lifetime: 3600s (default value)

PFS: disabled



andersoncf1
MVE Author Created Jun 24, 2021 18:54:59

Thanks for sharing knowledge with us.
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.