Can the interface on the AR be configured with IPSec when it dynamically obtains an IP address

19

The interface can be configured with IPSec when it dynamically obtains an IP address. When the local interface is configured with a dynamic IP address and the remote interface is configured with a fixed IP address, you can configure an IPSec policy template on the remote end to implement IPSec.
The 3G interface is used as an example. IKE negotiation is used. The key configuration is as follows:
Interface with a dynamic IP address
#
ike peer peer_3g_1 v1
pre-shared-key cipher %^%#JvZxR2g8c;a9~FPN~n'$7`DEV&=G(=Et02P/%\*!%^%# //Set the preshared key to huawei.
remote-address 10.5.39.160 //Specify the fixed IP address for the remote end.
#
ipsec proposal ipsec //Use default security parameters.
#
ipsec policy ipsec 1 isakmp //Configure an IPSec policy.
security acl 3000
ike-peer peer_3g_1
proposal ipsec
#
interface Cellular0/0/0
ipsec policy ipsec //Apply the IPSec policy to the 3G interface. Other configurations of the 3G interface are not mentioned.
#
acl 3000 //Configure an ACL. IPSec protects the packets matching the ACL.
...
#

Interface with a fixed IP address
#
ipsec proposal ipsec
#
ike peer peer_3g_2 v1 //The remote interface is configured with a dynamic IP address, so there is no need to specify an IP address for the remote interface.
pre-shared-key cipher %^%#K{JG:rWVHPMnf;5\|,GW(Luq'qi8BT4nOj%5W5=)%^%# //Set the pre-shared key to huawei.
#
ipsec policy-template temp 1 //Configure an IPSec policy template.
ike-peer peer_3g_2
proposal ipsec
#
ipsec policy ipsec 1 isakmp template temp //Bind the IPSec policy to the IPSec policy template.
#
interface GigabitEthernet 1/0/0 //The interface uses a fixed IP address.
ipsec policy ipsec
ip address 10.5.39.160 255.255.255.255
#

Other related questions:
Can the interface on the AR be configured with IPSec when it dynamically obtains an IP address
The interface can be configured with IPSec when it dynamically obtains an IP address. When the local interface is configured with a dynamic IP address and the remote interface is configured with a fixed IP address, you can configure an IPSec policy template on the remote end to implement IPSec. The 3G interface is used as an example. IKE negotiation is used. The key configuration is as follows: Interface with a dynamic IP address # ike peer peer_3g_1 v1 pre-shared-key cipher %^%#JvZxR2g8c;a9~FPN~n'$7`DEV&=G(=Et02P/%\*!%^%# //Set the preshared key to huawei. remote-address 10.5.39.160 //Specify the fixed IP address for the remote end. # ipsec proposal ipsec //Use default security parameters. # ipsec policy ipsec 1 isakmp //Configure an IPSec policy. security acl 3000 ike-peer peer_3g_1 proposal ipsec # interface Cellular0/0/0 ipsec policy ipsec //Apply the IPSec policy to the 3G interface. Other configurations of the 3G interface are not mentioned. # acl 3000 //Configure an ACL. IPSec protects the packets matching the ACL. ... # Interface with a fixed IP address # ipsec proposal ipsec # ike peer peer_3g_2 v1 //The remote interface is configured with a dynamic IP address, so there is no need to specify an IP address for the remote interface. pre-shared-key cipher %^%#K{JG:rWVHPMnf;5\|,GW(Luq'qi8BT4nOj%5W5=)%^%# //Set the pre-shared key to huawei. # ipsec policy-template temp 1 //Configure an IPSec policy template. ike-peer peer_3g_2 proposal ipsec # ipsec policy ipsec 1 isakmp template temp //Bind the IPSec policy to the IPSec policy template. # interface GigabitEthernet 1/0/0 //The interface uses a fixed IP address. ipsec policy ipsec ip address 10.5.39.160 255.255.255.255 #

Method used to configure IPSec through an interface with a dynamic IP address on the AR
Huawei AR routers support IPSec networking where one side has a dynamic IP address and the other side has a fixed IP address. There is no difference on the configuration method between different versions and models. For details about the configuration, see "Does the Interface with a Dynamic IP Address Support IPSec?" of "IPSec Configuration" in Configuration Guide - VPN.

Can a downstream terminal connected to an AR obtain an IP address through DHCP
A downstream terminal connected to the AR obtain an IP address through DHCP in either of the following situations: - The AR is configured with the DHCP server function. By default, an AR is not configured with the DHCP server function. - Another DHCP server exists on the network and there is a reachable route from the terminal to the DHCP server. Otherwise, the downstream terminal connected to the AR cannot obtain an IP address through DHCP.

How do I check IP addresses that are dynamically obtained by an AR
On the AR, you can run the following command to check the IP address that is dynamically obtained. - If IP addresses are assigned based on the interface address pool, run the display ip pool interface interface-pool-name used command. If the IP addresses are assigned based on the global address pool, run the display ip pool name ip-pool-name used command. You can know the IP address assigned to each client based on the mapping between IP addresses and MAC addresses.

Viewing IP addresses of STAs that are obtained dynamically
On an AC or a Fat AP, run the following command to view STA IP addresses that are dynamically obtained: - If the IP addresses are assigned from an interface address pool, run the display ip pool interface interface-pool-name used command. If the IP addresses are assigned from a global address pool, run the display ip pool name ip-pool-name used command. - To view access information about all STAs, run the display station all command. You can know the IP address assigned to each STA based on the mapping between IP addresses and MAC addresses.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top