Configuring IPSec aggressive mode on the USG6000

3

Configuring IPSec tunnel-based link backup on the USG6000
Tunnel-based link backup applies to a scenario where IPSec tunnels are established between multiple public network egresses at one end and the remote end. The configuration procedure differs only a little bit with the common IPSec configuration procedure.
The configuration
procedure and roadmap are as follows:
1. Complete basic configurations, including setting IP addresses and assigning interfaces to security zones.
2. Create a tunnel interface and assign the tunnel interface to a security zone.
3. Configure a route (usually a static route) to the Internet on the NGFW.
4. Create an ACL to define the data flow to be protected.
5. Configure the security policy.
6. Configure an IPSec proposal.
7. Configure an IKE proposal.
8. Configure an IKE peer.
9. Configure an IPSec policy.
10. Apply the IPSec policy.
Operation steps
Here provides only key configurations related to tunneling. For other basic policy configurations, see complete configuration examples.

Key configuration steps on USG_A (the end with multiple egresses):
1. Configure a tunnel interface.
[NGFW_A] interface tunnel 0
[NGFW_A-tunnel0] tunnel-protocol ipsec
[NGFW_A-tunnel0] ip address 10.1.0.2 24
[NGFW_A] firewall zone untrust
[NGFW_A-zone-untrust] add interface tunnel 0
[NGFW_A] ip route-static 10.4.0.0 255.255.255.0 tunnel 0 //Configure the route to the peer intranet to pass through the tunnel interface.
[NGFW_A] ip route-static 4.4.4.4 32 1.1.1.254
[NGFW_A] ip route-static 4.4.4.4 32 2.2.2.254
[NGFW_A] ip route-static 4.4.4.4 32 3.3.3.254 //Configure equal-cost routes to the peer interface through three egresses.

[NGFW_A] acl 3000
[NGFW_A-acl-adv-3000] rule permit ip source 10.3.0.0 0.0.0.255 destination 10.4.0.0 0.0.0.255
[NGFW_A] ipsec proposal tran1
[NGFW_A-ipsec-proposal-tran1] encapsulation-mode tunnel
[NGFW_A-ipsec-proposal-tran1] transform esp
[NGFW_A-ipsec-proposal-tran1] esp authentication-algorithm sha2-256
[NGFW_A-ipsec-proposal-tran1] esp encryption-algorithm aes
[NGFW_A] ike proposal 10
[NGFW_A-ike-proposal-10] quit
[NGFW_A] ike peer b
[NGFW_A-ike-peer-b]ike-proposal 10
[NGFW_A-ike-peer-b]remote-address 4.4.4.4
[NGFW_A-ike-peer-b]pre-shared-key Test!123
[NGFW_A] ipsec policy map1 10 isakmp
[NGFW_A-ipsec-policy-isakmp-map1-10] security acl 3000
[NGFW_A-ipsec-policy-isakmp-map1-10] proposal tran1
[NGFW_A-ipsec-policy-isakmp-map1-10] ike-peer b
[NGFW_A-ipsec-policy-isakmp-map1-10] quit
[NGFW_A] interface tunnel 0 Apply IPSec policy map1 to the tunnel interface.
[NGFW_A-tunnel0] ipsec policy map1
[NGFW_A-tunnel0] quit
Configure NGFW_B.
[NGFW_B] ip route-static 10.3.0.0 255.255.255.0 4.4.4.254
[NGFW_B] ip route-static 10.1.0.2 255.255.255.255 4.4.4.254
[NGFW_B] acl 3000
[NGFW_B-acl-adv-3000] rule permit ip source 10.4.0.0 0.0.0.255 destination 10.3.0.0 0.0.0.255
[NGFW_B-acl-adv-3000] quit
[NGFW_B] ipsec proposal tran1
[NGFW_B-ipsec-proposal-tran1] encapsulation-mode tunnel
[NGFW_B-ipsec-proposal-tran1] transform esp
[NGFW_B-ipsec-proposal-tran1] esp authentication-algorithm sha2-256
[NGFW_B-ipsec-proposal-tran1] esp encryption-algorithm aes
[NGFW_B-ipsec-proposal-tran1] quit
[NGFW_B] ike proposal 10
[NGFW_B-ike-proposal-10] quit
[NGFW_B] ike peer a
[NGFW_B-ike-peer-a] ike-proposal 10
[NGFW_B-ike-peer-a] remote-address 10.1.0.2
[NGFW_B-ike-peer-a] pre-shared-key Test!123
[NGFW_B-ike-peer-a] quit
[NGFW_B] ipsec policy map1 10 isakmp
[NGFW_B-ipsec-policy-isakmp-map1-10] security acl 3000
[NGFW_B-ipsec-policy-isakmp-map1-10] proposal tran1
[NGFW_B-ipsec-policy-isakmp-map1-10] ike-peer a
[NGFW_B-ipsec-policy-isakmp-map1-10] quit
[NGFW_B] interface GigabitEthernet 1/0/1
[NGFW_B-GigabitEthernet1/0/1] ipsec policy map1

Other related questions:
Whether the IPSec in L2TP over IPSec mode can use the main mode on the USG6000
The IPSec can use the main mode. The VPN client can use the main mode for interconnection on the USG NGFWC20SPC700.

GRE over IPSec configuration on the USG6000
GRE over IPSec VPN configuration on the USG6000 Configuration procedure: 1. Complete basic interface configuration, for example, configuring the IP address and adding the physical port to the related zone. 2. Enable the inter-zone security policy. 2. Configure the IPSec tunnel. Set the source and destination addresses of the sensitive traffic carried by the IPSec tunnel to the source and destination addresses of the GRE tunnel. 2. Configure the GRE tunnel. Set the source and destination addresses of the GRE tunnel to the source and destination addresses of the sensitive traffic carried by the IPSec tunnel. Configuration example: Topology: Network A-----(10.1.1.1) NGFW_A-----INTERNET-----NGFW_B (10.1.2.1)------Network B Note: a. Network A (10.1.1.0/24) and network B (10.1.2.0/24) can mutually access each other. b. The public IP address of NGFW_A is 1.1.3.1, the public IP address of NGFW_B is 1.1.5.1, and the public route is accessible. c. The GRE over IPSec tunnel established between NGFW_A and NGFW_B can satisfy the IPSec security requirements and also transmit broadcast or multicast packets based on GRE. 1. Complete basic interface configuration, for example, configuring the IP address and adding the interface to the related zone. 2. Configure the IPSec. //Configure IPSec sensitive traffic.// [USG_A]acl 3000 [USG_A-acl-adv-3000]rule 5 permit ip source 1.1.3.1 0.0.0.0 destination 1.1.5.1 0.0.0.0 [USG_B]acl 3000 [USG_B-acl-adv-3000]rule 5 permit ip source 1.1.5.1 0.0.0.0 destination 1.1.3.1 0.0.0.0 //Configure the IKE proposal and IPSec proposal. Adopt the default parameters.// [USG_A-1]ike proposal 1 [USG_A-1-ike-proposal-1]quit [USG_A-1]ipsec proposal 1 [USG_A-1-ipsec-proposal-1]quit [USG_B-1]ike proposal 1 [USG_B-1-ike-proposal-1]quit [USG_B-1]ipsec proposal 1 [USG_B-1-ipsec-proposal-1]quit //Configure the IKE peer.// [USG_A-1]ike peer 1 [USG_A-1-ike-peer-1]pre-shared-key 123456 [USG_A-1-ike-peer-1]ike-proposal 1 [USG_A-1-ike-peer-1]remote-address 1.1.5.1 [USG_B-1]ike peer 1 [USG_B-1-ike-peer-1]pre-shared-key 123456 [USG_B-1-ike-peer-1]ike-proposal 1 [USG_B-1-ike-peer-1]remote-address 1.1.3.1 //Configure IPSec policies.// [USG_A-1]ipsec policy p1 1 isakmp [USG_A-1-ipsec-policy-isakmp-1-1] security acl 3000 [USG_A-1-ipsec-policy-isakmp-1-1]Ike peer 1 [USG_A-1-ipsec-policy-isakmp-1-1]proposal 1 [USG_A-1-ipsec-policy-isakmp-1-1]local-address 1.1.3.1 [USG_A-1-ipsec-policy-isakmp-1-1] interface GigabitEthernet1/0/1 [USG_A-1-GigabitEthernet1/0/1] ipsec policy p1 auto-neg [USG_B-1]ipsec policy p1 1 isakmp [USG_B-1-ipsec-policy-isakmp-1-1]security acl 3000 [USG_B-1-ipsec-policy-isakmp-1-1]Ike peer 1 [USG_B-1-ipsec-policy-isakmp-1-1]proposal 1 [USG_B-1-ipsec-policy-isakmp-1-1]local-address 1.1.5.1 [USG_B-1-ipsec-policy-isakmp-1-1] interface GigabitEthernet1/0/1 [USG_B-1-GigabitEthernet1/0/1] ipsec policy p1 auto-neg 3. Configure the GRE tunnel. [USG_A-1]interface Tunnel 0 [USG_A-1-Tunnel0] ip address 10.3.1.1 255.255.255.0 [USG_A-1-Tunnel0]tunnel-protocol gre [USG_A-1-Tunnel0] source 1.1.3.1 [USG_A-1-Tunnel0] destination 1.1.5.1 [USG_B-1]interface Tunnel 0 [USG_B-1-Tunnel0] ip address 10.3.1.2 255.255.255.0 [USG_B-1-Tunnel0]tunnel-protocol gre [USG_B-1-Tunnel0] source 1.1.5.1 [USG_B-1-Tunnel0] destination 1.1.3.1 4. Add the GRE tunnel to the security zone and configure a tunnel route. [USG_A-1]firewall zone untrust [USG_A-1-zone-untrust]add interface Tunnel 0 [USG_A-1]ip route-static ip route-static 10.1.2.0 255.255.255.0 Tunnel0 [USG_B-1]firewall zone untrust [USG_B-1-zone-untrust]add interface Tunnel 0 [USG_B-1]ip route-static ip route-static 10.1.1.0 255.255.255.0 Tunnel0

Configuration of L2TP over IPSec on the USG6000
Configuration of L2TP over IPSec on the USG6000 Configuration procedure: 1. Complete basic interface configuration, security policy configuration, and route configuration. 2. Configure and apply the IPSec. Note that the source and destination addresses of the data flow protected by the IPSec are the source and destination addresses of the sensitive traffic transmitted over the external interfaces of two gateways. 3. Configure the L2TP and L2TP tunnel source. For details, click Huawei Security Forum USG6000 L2TP over IPSec Configuration Cases. Procedure 1. Configure the IP address of each interface, and add the interfaces to the security zone. The specific configuration procedure is not described here. 2. Enable the inter-zone security policy. e map_temp [NGFW_A] interface GigabitEthernet 1/0/1 [NGFW_A-GigabitEthernet 1/0/1] ipsec policy map1 [NGFW_B] ipsec policy map1 10 isakmp [NGFW_B-ipsec-policy-isakmp-map1-10] security acl 3000 [NGFW_B-ipsec-policy-isakmp-map1-10] proposal tran1 [NGFW_B-ipsec-policy-isakmp-map1-10] ike-peer b [NGFW_B] interface GigabitEthernet 1/0/1 [NGFW_B-GigabitEthernet1/0/1] ipsec policy map1 5. Configure the L2TP. A. (LNS end) Configure the L2TP. [NGFW_A] user-manage user l2tpuser //Configure the L2TP user. [NGFW_A-localuser-l2tpuser] password Password1 [NGFW_A-localuser-l2tpuser] quit [NGFW_A] l2tp enable //Enable the L2TP. [NGFW_A] aaa [NGFW_A-aaa] ip pool 0 192.168.0.2 192.168.0.99 //Configure the IP address pool. [NGFW_A] interface Virtual-Template 1 //Configure the virtual template interface. [NGFW_A-Virtual-Template1] ppp authentication-mode pap [NGFW_A-Virtual-Template1] ip address 1.1.1.2 255.255.255.0 [NGFW_A-Virtual-Template1] remote address pool 0 //Set the virtual interface to reference the address pool used to allocate addresses to the peer end. [NGFW_A] l2tp-group 1 //Create the L2TP group. [NGFW_A-l2tp1] allow l2tp virtual-template 1 [NGFW_A-l2tp1] tunnel password cipher Pass1234 B. Configure the L2TP. # Configure the L2TP user. [NGFW_B] user-manage user l2tpuser [NGFW_B-localuser-l2tpuser] password Password1 [NGFW_B-localuser-l2tpuser] quit Configure the L2TP. [NGFW_B] l2tp enable [NGFW_B] interface Virtual-Template 1 [NGFW_B-Virtual-Template1] ppp authentication-mode pap [NGFW_B-Virtual-Template1] quit [NGFW_B] interface GigabitEthernet 1/0/3 [NGFW_B-GigabitEthernet1/0/3] pppoe-server bind virtual-template 1 [NGFW_B-GigabitEthernet1/0/3] quit [NGFW_B] l2tp-group 1 [NGFW_B-l2tp1] tunnel password cipher Pass1234 [NGFW_B-l2tp1] start l2tp ip 1.1.3.1 fullusername l2tpuser [NGFW_B-l2tp1] quit

Configuring IPSec NAT traversal on the USG
Run the nat traversal command on the IKE peers at the two sides of the gateway to implement IPSec NAT traversal.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top