v
Restrictions and guidelines: IPsec configuration···························································································· 154
Implementing ACL-based IPsec····················································································································· 154
ACL-based IPsec tasks at a glance ······································································································· 154
Configuring an ACL ································································································································ 155
Configuring an IPsec transform set ········································································································ 158
Configuring a manual IPsec policy ········································································································· 160
Configuring an IKE-based IPsec policy ·································································································· 162
Applying an IPsec policy to an interface ································································································ 165
Enabling ACL checking for de-encapsulated packets ············································································ 165
Configuring IPsec anti-replay ················································································································· 166
Configuring IPsec anti-replay redundancy ····························································································· 166
Binding a source interface to an IPsec policy ························································································ 167
Enabling QoS pre-classify ······················································································································ 168
Configuring the DF bit of IPsec packets ································································································· 168
Configuring IPsec RRI ···························································································································· 169
Configuring IPsec for IPv6 routing protocols ·································································································· 170
IPsec protection for IPv6 routing protocols tasks at a glance ································································ 170
Configuring a manual IPsec profile ········································································································ 170
Applying the IPsec profile to an IPv6 routing protocol ············································································ 171
Configuring the global IPsec SA lifetime and idle timeout·············································································· 172
Configuring IPsec fragmentation ···················································································································· 172
Setting the maximum number of IPsec tunnels ····························································································· 173
Enabling logging for IPsec packets ················································································································ 173
Configuring SNMP notifications for IPsec ······································································································ 173
Display and maintenance commands for IPsec ····························································································· 174
IPsec configuration examples ························································································································ 175
Example: Configuring a manual mode IPsec tunnel for IPv4 packets ··················································· 175
Example: Configuring an IKE-based IPsec tunnel for IPv4 packets ······················································ 177
Example: Configuring IPsec for RIPng ··································································································· 180
Example: Configuring IPsec RRI ············································································································ 183
Configuring IKE ························································································· 188
About IKE ······················································································································································· 188
Benefits of IKE ······································································································································· 188
Relationship between IPsec and IKE ····································································································· 188
IKE negotiation process ························································································································· 188
IKE security mechanism ························································································································· 190
Protocols and standards ························································································································ 190
FIPS compliance ············································································································································ 191
IKE tasks at a glance ····································································································································· 191
Prerequisites for IKE configuration················································································································· 191
Configuring an IKE profile ······························································································································ 192
Creating an IKE profile ··························································································································· 192
Configuring peer IDs for the IKE profile ································································································· 192
Specifying the IKE keychain or PKI domain ··························································································· 192
Configuring the IKE phase 1 negotiation mode ······················································································ 193
Specifying IKE proposals for the IKE profile ·························································································· 193
Configuring the local ID for the IKE profile ····························································································· 194
Specifying an inside VPN instance for the IKE profile ············································································ 194
Configuring optional features for the IKE profile ···················································································· 194
Configuring an IKE proposal ·························································································································· 195
Configuring an IKE keychain ·························································································································· 197
Configuring the global identity information ····································································································· 198
Configuring the IKE keepalive feature ··········································································································· 198
Configuring the IKE NAT keepalive feature ··································································································· 199
Configuring global IKE DPD ··························································································································· 199
Enabling invalid SPI recovery ························································································································ 200
Setting the maximum number of IKE SAs ······································································································ 200
Configuring an IKE IPv4 address pool ··········································································································· 201
Configuring SNMP notifications for IKE ········································································································· 201
Display and maintenance commands for IKE ································································································ 202
IKE configuration examples ··························································································································· 202