|
Configure the next-hop service set for the IPSec tunnel.
|
- From the top of the configuration hierarchy, click Services.
- In the Service sets field, click Add new
entry.
- In the Service set name field, type the name of the service
set. The name can be any unique string.
- In the Service type choice field, select Next
hop service from the list.
- In the Nested configuration field, click Next
hop service.
- In the Inside service interface field, type the services
interface, including unit number, for the inside-service interface—for
example, sp-0/0/0.1001.
- Click OK.
- In the Nested configuration field, click Next
hop service.
- In the Outside service interface field, type the services
interface, including the unit number—for example, sp–0/0/0.2002.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services
- Set the inside-service interface:
set service-set service-set-name next-hop-service
inside-service-interface sp-0/0/0.1001
- Set the outside-service interface:
set service-set service-set-name next-hop-service
outside-service-interface sp-0/0/0.2001
|
|
Configure the local gateway for the IPSec service set.
|
- In the Ipsec vpn options field, click Configure.
- In the Local gateway box, type the IP address of the local
tunnel endpoint, in dotted decimal notation—for example, 1.1.1.1.
|
Set the local gateway address for the service set:
set service-set service-set-name ipsec-vpn-options
local-gateway 1.1.1.1
|
|
Configure IPSec rules to set the remote gateway on all traffic to 2.2.2.2.
Because the rule applies to all traffic, you must only configure the
action (or then statement) for the term.
|
- From the top of the configuration hierarchy, click Services>Ipsec-vpn.
- In the Rule field, click Add new entry.
- In the Rule name field, type the name of the rule. The
rule name can be any unique string.
- In the term field, click Add new entry.
- In the Term name field, type the name of the term. It can
be any unique string.
- To configure an action, click Then.
- In the Remote gateway field, type the remote gateway address,
in dotted decimal notation—for example, 2.2.2.2.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services ipsec-vpn
- Configure a rule with a term that sets the remote gateway
to 2.2.2.2:
set rule rule-name term term-name then
remote-gateway 2.2.2.2
|
|
Configure an security association with a static IKE key.
The IKE key is a preshared key and must be configured exactly the same
way at both the local and remote endpoints of the IPSec tunnel.
The IKE key is configured as ike policy and then applied using
the dynamic statement.
|
- From the top of the configuration hierarchy, select Services>Ipsec-vpn>Ike.
- In the Policy field, click Add new entry.
- In the Name box, type the name of the IKE policy. It can
be any unique string.
- Click Pre-shared key.
- In the Key choice field, select Ascii text from
the list.
- In the Ascii text box, enter the IKE key in plain text.
- Click OK.
- Navigate to the IPSec rule configured previously. From
the top of the configuration hierarchy, click Services>Ipsec-vp>rule-name >term term-name>then.
- Click Dynamic.
- In the Ike-policy box, type the name of the IKE policy
you configured.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services ipsec-vpn ike
- Configure the IKE pre-shared key in ASCII text format:
set policy policy-name pre-shared-key ascii-text ike-key
- Navigate to the IPSec rule configured previously. From
the top of the configuration hierarchy, enter
edit services ipsec-vpn rule-name term term-name then.
- Configure a dynamic security association that applies the
IKE policy:
set dynamic ike-policy policy-name
|
|
Configure the IPSec rule so that it acts on input traffic.
|
- From the top of the configuration hierarchy, click Services>Ipsec-vpn>Rule> rule-name.
- In the Match direction field, select Input from
the list.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services ipsec-vpn rule rule-name
- Set the match direction for the rule:
set match-direction input
|
|
Apply the IPSec rule to all traffic through the previously configured
service set.
|
- From the top of the configuration hierarchy, click Services>Service-set> service-set-name.
- In the Ipsec vpn rules choice field, select Ipsec
vpn rules from the list.
- In the Ipsec vpn rules field, click Add
new entry.
- In the Rule name box, type the name of the previously configured
IPSec rule.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services service-set service-set-name
- Apply the IPSec rule previously configured:
set ipsec-vpn-rules rule-name
|