H3c-technologies H3C Intelligent Management Center User Manual Page 1

Browse online or download User Manual for Safety H3c-technologies H3C Intelligent Management Center. H3C Technologies H3C Intelligent Management Center User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 213
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Administrator Guide

H3C Intelligent Management CenterIPsec VPN ManagerAdministrator Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com So

Page 2

iv Viewing the DVPN session information of a tunnel ························································································· 202Rese

Page 3 - Preface

90 a. Enter the number of the hub tunnel interface in the Hub Tunnel Number box. b. Enter the IP address of the hub tunnel interface in the Hub Tunn

Page 4 - Network topology icons

91 4. Configure additional settings: The additional settings are inherited from the VPN domain. You can modify theses settings for the GRE over IPsec

Page 5

92 Figure 38 DVPN network As shown in Figure 38, HubA, SpokeA, and SpokeB are VAM clients. The IMC Platform manages VAM ServerA, HubA, SpokeA, and S

Page 6 - Documentation feedback

93 4. Click Next. Configuring basic DVPN settings 1. Enter a name for the VPN domain in the Domain Name box. IVM uses a case-insensitive name and a

Page 7 - Contents

94 Configuring the VAM server A DVPN network can accommodate up to two VAM servers. One acts as the primary server, and the other acts as the backup

Page 8

95 An unselected query condition is not used for device query. b. Click Query. All the devices matching the query conditions are displayed at the up

Page 9

96 − Permit RADIUS Client—Select this option to enable the VAM server to receive and send RADIUS packets. { Local—Enables local authentication on VA

Page 10

97 12. Select a tunnel source interface from the Tunnel Source Interface list. The Tunnel Source Interface list displays the interfaces that IVM obta

Page 11 - 1 IPsec VPN Manager overview

98 b. Enter the DPD interval in seconds in the DPD Interval(s) box. When the local end sends an IPsec packet, it checks the time the last IPsec packe

Page 12 - IVM features

99 A window appears for you to select spokes by view through step 2 or by query through step 3. 2. Add spokes by view: a. Click the By View tab. Th

Page 13 - 2 Quick start guide

1 1 IPsec VPN Manager overview IPsec VPN Manager (IVM) is IMC's service component for managing Layer 3 Virtual Private Networks that are built us

Page 14 - IVM navigation menu options

100 c. Select devices in the Devices Found list and click the Add selected icon to add the devices to the Selected Devices list, or click the Add a

Page 15 - Desktop mode

101 h. Enter the number of the tunnel interface. This setting corresponds to the CLI command interface tunnel number. i. Select a tunnel source inte

Page 16 - IVM home page

102 a. Enter a DPD name in the DPD Name box. b. Enter the DPD interval in seconds in the DPD Interval(s) box. When the local end sends an IPsec pac

Page 17

103 You only need to deploy DVPN settings because VAM clients exchange VAM packets to establish DVPN tunnels. DVPN settings include VAM server setting

Page 18

104 5 Building VPN networks with IVM and BIMS This chapter describes using IVM and BIMS to build IPsec VPN, GRE over IPsec VPN, and DVPN networks in w

Page 19

105 Figure 40 Building an IPsec VPN network Adding IPsec devices After you add IPsec devices to the IMC Platform, IVM automatically manages the IPse

Page 20

106 Configure basic VPN domain settings 1. Enter a name for the VPN domain in the Domain Name box. IVM uses a case-insensitive name and a type to un

Page 21

107 You can configure the IPsec proposal through step 3, or import an IPsec proposal template through step 4. 3. Configure the IPsec proposal: a. Se

Page 22 - IVM quick start wizard

108 a. Click the Import icon next to the proposal number. The Select IKE Proposals window appears. This window automatically filters IKE proposal t

Page 23 - Common operations

109 To remove a device from the Selected Devices list, select a device in the Selected Devices list and click the Remove Selected icon . d. Click OK.

Page 24 - Sorting a list

2 • IPsec proposal management—Manages IPsec proposals that define security parameters for IPsec SA negotiation, including the security protocol, encr

Page 25

110 2. Enter query conditions in the Device Name, Serial Number, and Device IP boxes, which support fuzzy query. 3. Click Query. 4. Select spoke d

Page 26 - Configuring SNMP

111 A window appears. b. Enter a new IP address. c. Click OK. Configuring IPsec tunnels You can configure an IPsec tunnel when you add it, or modify

Page 27 - Configuring SSH

112 3. Click a VPN domain name to enter the VPN domain page. 4. Click the Device parameters icon for an existing IPsec tunnel. 5. Configure the e

Page 28 - Configuring CWMP

113 2. Click OK. Configuring device parameters The Device Parameters page provides CA domain and protected traffic flow settings. A CA domain includ

Page 29 - 3 Managing IVM

114 { Operator—Operator used to match TCP and UDP ports on the hub. Operators include Equals, Less than, Greater than, Not Equals, and Range. { Port

Page 30 - Managing IPsec devices

115 e. Go to step 6. 5. Import an IPsec proposal that has been configured on a hub device in the current VPN domain: a. Click the import icon nex

Page 31 - Querying IPsec devices

116 The parameters in the IKE proposal template are automatically filled in the IKE proposal configuration page. e. Go to step 6. 5. Import an IKE

Page 32 - Import IMC devices to IVM

117 { This setting corresponds to the following CLI command when the IPsec policy template is enabled: ipsec policy policy-name seq-number isakmp tem

Page 33

118 A menu appears for you to check tunnel settings: { View Hub's Current Configuration { View Spoke's Current Configuration { View IVM&a

Page 34 - Setting tunnel traps

119 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > VPN Domains. 3. Click Add in the VPN Domain List to add a GRE ov

Page 35

3 2 Quick start guide Accessing IVM IMC provides the following IVM access modes: • Classic—Log in to the classic IMC interface. Operators access IVM

Page 36 - Configuration procedure

120 If you select YES, the hub device only receives negotiation requests from peers, without initiating IKE negotiation. The IPsec policy template fea

Page 37

121 c. Select the IPsec proposal template in the IPsec Proposal List. d. Click OK. The parameters in the IPsec proposal template are automatically

Page 38 - Managing IPsec tunnels

122 a. Select a hub device. b. Select spoke devices. c. Configure interfaces for GRE over IPsec tunnels. d. Configure GRE over IPsec tunnels 6. C

Page 39 - Viewing the tunnel list

123 − Device Reachability—Select Reachable or Unreachable. An unselected query condition is not used for device query. b. Click Query. All the devi

Page 40 - Viewing IPsec tunnel details

124 A window appears. c. Enter a new name for the hub interface. d. Click OK. e. To copy the name and address of the hub interface to another tunn

Page 41

125 The Basic Information tab provides the following basic settings: { IKE Negotiation Mode—Select Main or Aggressive mode for phase-1 IKE negotiati

Page 42

126 { ID Type—Name or IP. If the ID type is Name, the Hub IKE Gateway Name and Spoke IKE Gateway Name are also displayed. { Encapsulation Mode—Tunn

Page 43 - Managing IPsec proposals

127 d. Click OK. To modify the hub subnet, click the Modify icon and enter new settings in the window. To delete the hub subnet, select it and clic

Page 44 - Querying IPsec proposals

128 b. Enter the complete name or part of the name of the IPsec proposal template you want to query, and click Query. c. Select the IPsec proposal t

Page 45 - Adding an IPsec proposal

129 You can add, modify, and delete IKE proposal templates in IKE Proposals. For more information about IKE proposal templates, see "Managing IKE

Page 46 - Managing IKE proposals

4 IVM navigation tree Figure 3 shows the navigation tree. To expand the IVM navigation tree: 1. Click the Service tab. 2. From the navigation tree,

Page 47 - Querying IKE proposals

130 { This setting corresponds to the following CLI command when the IPsec policy template is not enabled: ipsec policy policy-name seq-number isakmp

Page 48 - Adding an IKE proposal

131 a. Enter the number of the hub tunnel interface in the Hub Tunnel Number box. b. Enter the IP address of the hub tunnel interface in the Hub Tun

Page 49 - Modifying an IKE proposal

132 4. Configure additional settings: The additional settings are inherited from the VPN domain. You can modify theses settings for the GRE over IPse

Page 50 - IPsec security parameters

133 Figure 43 DVPN network As shown in Figure 43, HubA, SpokeA, and SpokeB are VAM clients. ServerA and HubA have static IP addresses, Spoke A is pr

Page 51

134 d. Configure the hub. e. Configure spokes. The following sections describe these tasks. 4. Click Next. Configuring basic DVPN settings 1. Ente

Page 52

135 7. Click Next to configure the VAM server. Configuring the VAM server A DVPN network can accommodate up to two VAM servers. One acts as the pri

Page 53

136 − Device Reachability—Select Reachable or Unreachable. An unselected query condition is not used for device query. b. Click Query. All the devi

Page 54

137 − Permit RADIUS Client—Select this option to enable the VAM server to receive and send RADIUS packets. { Local—Enables local authentication on V

Page 55

138 12. Select a tunnel source interface from the Tunnel Source Interface list. The Tunnel Source Interface list displays the interfaces that IVM obt

Page 56 - Retires

139 b. Enter the DPD interval in seconds in the DPD Interval(s) box. When the local end sends an IPsec packet, it checks the time the last IPsec pack

Page 57 - Modifying monitor settings

5 Navigation menu option Task Options Configure BIMS and IVM parameters. DVPN Security Configuration View and modify the DVPN configuration templates

Page 58

140 a. Click Select BIMS Spokes. A window appears for you to select spokes. b. Enter query conditions in the Device Name, Serial Number, and Device

Page 59

141 This setting corresponds to the CLI command interface tunnel number. i. Select a tunnel source interface from the Tunnel Source Interface list. T

Page 60

142 b. Enter the DPD interval in seconds in the DPD Interval(s) box. When the local end sends an IPsec packet, it checks the time the last IPsec pack

Page 61 - VPN domain topology types

143 and spokes, and tunnel, routing, and IPsec settings for all VAM clients. If client authentication is needed, deploy AAA authentication settings to

Page 62

144 6 IVM service report The IVM service report function is implemented through the report function of the IMC Platform. The IMC Platform uses report

Page 63

145 { Begin Time—Set the statistics collection start time. Click the field to select the time in the calendar that appears. The valid format is YYYY-

Page 64

146 { Begin Time—Set the statistics collection start time. Click the field to select the time in the calendar that appears. The valid format is YYYY-

Page 65 - Tunnel information

147 { End Time—Set the statistics collection end time. Click the field to select the time in the calendar that appears. The valid format is YYYY-MM-D

Page 66

148 3. Click OK. The IPsec tunnel receive rate report appears. Figure 47 IPsec tunnel receive rate report Parameter description: { Statistical

Page 67

149 The IPsec tunnel outbound drop rate report appears. Figure 48 IPsec tunnel outbound drop rate report Parameter description: { Statistical Ran

Page 68 - Right-click menu of a device

6 Application Task IP Tunnels Query, view, and monitor IPsec tunnels. IPsec Proposals Query, view, add, modify, and delete IPsec proposals. IKE Prop

Page 69

150 Figure 49 IPsec tunnel inbound drop rate report Parameter description: { Statistical Range—IPsec tunnels involved in the report. { From/To—S

Page 70

151 b. Enter the full template name or part of the template name. This option supports fuzzy matching. c. In the Query Template area, select VPN S

Page 71

152 7. (Optional.) Set the time when a report becomes invalid. Then, the IMC Platform does not generate any scheduled report. Click the field to sele

Page 72

153 − Quarterly—Options include Begin time, One month after begin time, Two months after begin time, and End time. − Half Yearly—Options include Beg

Page 73

154 7 Maintaining VPNs This chapter describes how to maintain the IPsec VPN, GRE over IPsec, and DVPN domains. For information about how to add VPN d

Page 74

155 address for fuzzy query. For example, you can enter 192.168 to query all devices that have an IP address starting with 192.168. − Device IP List

Page 75

156 Modifying an IPsec VPN domain An IPsec VPN domain contains IPsec and IKE settings for tunnels in the domain. IPsec tunnels in a VPN domain inherit

Page 76

157 { ID Type—Select the identity type used by the IKE peers. Options are IP and Name. The ID type must be Name when NAT traversal is enabled, and mu

Page 77

158 − Security Protocol—Select the security protocol to be used by the IPsec proposal. Options are AH, ESP, and AH + ESP. − AH AuthN—This parameter

Page 78

159 { ESP Encryption—This parameter appears only when ESP or AH + ESP is selected for Security Protocol. Select the encryption algorithm to be used b

Page 79

7 Figure 6 24-Hour IPsec Tunnel Trend Click TopN on the top right corner of the graph to view more IPsec tunnel statistics, including the following

Page 80

160 The IKE Proposal List displays all the IKE proposals that use the same authentication method as is specified for the VPN domain by the IKE Authent

Page 81

161 3. Click the name of the IPsec VPN domain you want to query. 4. Click Basic Query on the upper right side of the Query Tunnels area. You can p

Page 82

162 3. Click the name of an IPsec VPN domain. The Tunnel List displays all tunnels in the IPsec VPN domain. 4. Select the tunnels you want to unde

Page 83

163 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > VPN Domains. The VPN Domain List displays all VPN domains. 3.

Page 84

164 { Number of Virtual Spokes—Enter the number of virtual spokes. IVM automatically creates a tunnel for each virtual spoke. { Interface Name—Ente

Page 85

165 − Device Name—Modify the name of the virtual spoke. − Interface Name—Modify the name of the spoke interface. − Interface IP—Modify the IP add

Page 86

166 The import file must meet the following requirements: • The file format must be .txt. • The first line must be the column titles. The other line

Page 87

167 7. Click Select Hub. The Select Devices dialog box appears. 8. Select a device as the hub and click OK. 9. Click Import from File. The Impo

Page 88

168 Modifying a GRE over IPsec VPN domain A GRE over IPsec VPN domain contains IPsec and IKE settings for tunnels in the domain. GRE over IPsec tunnel

Page 89

169 { ID Type—Select the identity type used by the IKE peers. Options are IP and Name. The ID type must be Name when NAT traversal is enabled, and mu

Page 90

8 Figure 7 Top 5 Devices by Average Active IPsec Tunnels VPN Domain Traffic Trend graph As shown in Figure 8, the graph shows the transmit and recei

Page 91

170 The Add IPsec Proposal page appears. 2. Enter a name for the IPsec proposal. You can configure the IPsec proposal through step 3 or import an IP

Page 92

171 { AH Authentication—This parameter appears only when AH or AH + ESP is selected for Security Protocol. Select the authentication algorithm to be

Page 93

172 4. Import an IKE proposal template: a. Click the Import the security proposal from the template icon next to the Proposal Num. field. The Se

Page 94

173 Performing a basic query 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > VPN Domains.

Page 95

174 To undeploy GRE over IPsec tunnels: 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > V

Page 96

175 undeploy the undeployment failed tunnel and then change the status of the tunnel from Undeployment Failed to Undeployed. To change the deployment

Page 97

176 2. Specify the following parameters for the virtual spokes: { Device Name—Enter the name of the virtual spoke. If you specify multiple spokes wi

Page 98

177 a. Click the Modify Spoke Device Info icon next to a virtual spoke name. The Modify Virtual Spoke Settings window appears. b. Modify the fol

Page 99

178 Importing GRE over IPsec tunnels from a file You can bulk import GRE over IPsec tunnels from a file to IVM. The file contains the hub and spoke in

Page 100

179 Column title Description Remarks GRE Spoke Tunnel Number Number of the GRE tunnel on the hub side, in the range 0 to 1023. Optional. GRE Hub Tu

Page 101 - Building a DVPN network

9 VPN Domain Tunnel Counts pie chart As shown in Figure 9, IVM displays the numbers of IPsec tunnels in different types of VPN domains in a pie chart.

Page 102 - Adding DVPN domains

180 5. Select the column number or Do not select from the file for each of the following column titles in the file: { Spoke Device Type { Spoke Dev

Page 103

181 2. From the navigation tree, select IPsec VPN Manager > Automatic Discovery. The page for selecting a VAM server appears. 3. Select the DVPN

Page 104 - Configuring the VAM server

182 c. Select a device in the Devices Found list and click the Add selected icon to add the device to the Selected Devices list. d. To remove a de

Page 105

183 To modify global DVPN settings: 1. Modify the name of the domain in the Domain Name field. The domain name must be unique in IVM. 2. Modify th

Page 106

184 4. If the security template requires the VAM server to authenticate VAM clients, enter the ISP domain name in the ISP Domain Name field, and sele

Page 107

185 4. Modify the private IP address of hub 1 in the Private IP Address box. The VAM server uses private IP addresses to identify VAM clients. Hub 1

Page 108 - { area area-id

186 { VPN Name—Name of the DVPN, configured in global DVPN settings. { Routing Protocol—Routing protocol used by DVPN, which is OSPF, iBGP, or eBGP

Page 109

187 { area area-id { network ip-address wildcard-mask 9. Add a BGP network in the BGP Network List if the routing protocol used by DVPN is iBGP or

Page 110

188 If the authentication method is RADIUS, whether to include the domain name in the entered username depends on the Username Format setting in RADIU

Page 111

189 The default setting is inherited from the security template. 5. Enter a pre-shared key in the Pre-Shared Key box. The default setting is inherite

Page 112 - { Deploying DVPN settings

Copyright © 2013-2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Page 113

10 Figure 10 Top 5 VPN Domains by Traffic Top 5 IPsec Tunnels by Receive Rate As shown in Figure 11, IVM displays the top 5 IPsec tunnels with the h

Page 114

190 bgp as-number network ip-address mask IVM automatically configures the relationships between BGP peers. 10. Click OK to complete DVPN domain mod

Page 115 - Adding IPsec VPN domains

191 − View DVPN sessions—Select this option to view the DVPN sessions. For more information, see "Viewing the DVPN sessions of a VAM client.&quo

Page 116

192 To add a spoke to a DVPN network in which the hub device has a fixed IP address but the spoke devices have no fixed IP addresses or reside behind

Page 117 - Configuring an IKE proposal

193 To delete DVPN configuration from a device 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources

Page 118 - Adding IPsec tunnels

194 The configuration page of the DVPN domain appears. The page contains two tabs: Device Information and Tunnel Connectivity Audit. By default, the D

Page 119 - Selecting spoke devices

195 { Device IP—IP address of the spoke. { Device Type—Type of the device, BIMS or Routers. BIMS indicates that the device is managed by IMC BIMS.

Page 120

196 − Device Status—Select a status from the list to query devices in that status. The Device Status list includes Unmanaged, Unknown, Normal, Warnin

Page 121 - Configuring IPsec tunnels

197 The configuration page of the DVPN domain appears. The page contains two tabs: Device Information and Tunnel Connectivity Audit. By default, the D

Page 122

198 A window appears, displaying all DVPN sessions of the VAM client. Each session represents a DVPN tunnel established on the VAM client. DVPN Sessi

Page 123

199 a. Select View DVPN sessions from the shortcut menu. The DVPN Session List window appears. b. Select the DVPN sessions you want to reset. c.

Page 124

11 As shown in Figure 12, IVM displays the top 5 IPsec tunnels with the highest transmit rate in a specified VPN domain or in all VPN domains in a lis

Page 125

200 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > VPN Domains. The VPN Domain List displays all VPN domains. 3.

Page 126

201 Deleting audited DVPN tunnels You can manually delete a spoke-spoke tunnel from the Tunnel List on the Tunnel Connectivity Audit tab of a DVPN dom

Page 127 - Deploying IPsec tunnels

202 The VPN Domain List displays all VPN domains. 3. Click the name of the DVPN domain. The configuration page of the DVPN domain appears. The page

Page 128

203 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > VPN Domains. The VPN Domain List displays all VPN domains. 3.

Page 129

12 Figure 14 Top 5 IPsec Tunnels by Outbound Drop Rate Highlighted IPsec Devices As shown in Figure 15, IVM displays the top 10 IPsec devices with t

Page 130 - Configuring GRE settings

13 Figure 16 IVM quick start wizard Common operations Navigating a list If a list spans multiple pages, use the following aids to navigate the list:

Page 131

14 Figure 17 Navigating the IPsec device list Sorting a list Sort a list by every field that contains a Sort icon in the column label. • When the

Page 132 - Selecting a hub device

15 Determining network scenarios For security and confidentiality purposes, enterprises and organizations build VPNs over IPsec to secure Layer 3 comm

Page 133

16 Figure 20 IMC components For a static network scenario, deploy the following components: • IMC Platform—Manages the hub and all spokes. • IMC I

Page 134 - { Configuring GRE

17 [Hub] snmp-agent community read public [Hub] snmp-agent community write private For more information about the SNMP configuration, see the configur

Page 135

18 Configuring CWMP CPE WAN Management Protocol (CWMP), also known as the TR-069 protocol, can be configured manually or through DHCP Option 43. This

Page 136

19 3 Managing IVM IVM provides various management functions. The procedures for configuring VPNs are complicated and vary with the VPN technology used

Page 137

Preface The H3C IMC IVM Administrator Guide includes 7 chapters, which describe the management and deployment of IPsec-based VPNs, such as IPsec VPN,

Page 138

20 4. Click Query. The VPN Domain List displays all VPN domains that match the query criterion. Click Reset to clear the query criterion and display

Page 139

21 − Synchronizing icon ( )—The Synchronizing icon indicates the synchronization is in progress. − Failure icon ( )—The Failure icon indicates the

Page 140 - Configuring a GRE tunnel

22 4. Click Query. The IPsec Device List displays all IPsec devices matching the query criteria. Click Reset to clear the query criteria and display

Page 141

23 − Location—Enter the location of the device.IVM supports fuzzy matching for this filed. For example, if you enter Lab, all the devices with locati

Page 142

24 7. Select one or more BIMS devices you want to import. 8. Click OK. The Device List displays information about the selected devices, including

Page 143

25 To set tunnel traps for a device: 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > IPsec

Page 144

26 5. Configure the following parameters: { Slot Number—This field displays the slot number of the encryption card. For example, 3/0 indicates that

Page 145

27 { Traffic-based Lifetime (KB)—Specify the maximum traffic that the SA can process, in kilobytes. { Time-based Lifetime (s)—Specify the amount of

Page 146

28 The Registration Information Details window appears. Registration Information Details contents { Device Name—Name of the VAM client. { Interval

Page 147

29 Viewing the tunnel list 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > IPsec Resources > IPsec Tunnels.

Page 148

Convention Description CAUTION An alert that calls attention to important information that if not understood or followed can result in data loss, dat

Page 149

30 Viewing IPsec tunnel details You can only view detailed information about IPsec tunnels in Ready state. To view an IPsec tunnel details: 1. Clic

Page 150

31 4. Click Back to return to the Tunnel List. Enabling/disabling monitoring of IPsec tunnels By default, IVM monitors all IPsec tunnels. You can ma

Page 151

32 { Action—Tunnel event, tunnel setup or disconnect. { Local IP—Local end IP address of the IPsec tunnel. { Remote IP—Remote end IP address of t

Page 152 - Deploying DVPN settings

33 Managing IPsec proposals Basic concepts An IPsec proposal defines a set of security parameters for IPsec SA negotiation, including security protoco

Page 153

34 • Transport mode—IPsec protects only the IP payload. It uses only the IP payload to calculate the AH or ESP header, and inserts the calculated hea

Page 154 - 6 IVM service report

35 Viewing the IPsec proposal details 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > Security Proposals >

Page 155

36 Modifying an IPsec proposal 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > Security Proposals > IPsec P

Page 156

37 { Pre-shared key—Two IKE peers use the pre-configured shared key for identity authentication. { CA—Two IKE peers use digital certificates issued

Page 157

38 4. Click Query. The IKE Proposal List displays all IKE Proposals that match the query criterion. Click Reset to clear the query criterion and dis

Page 158

39 { ISAKMP SA Lifetime—ISAKMP SA lifetime in seconds. The value range is 60 to 604800 and the default is 86400. Since DH computation can be time-con

Page 159

Documents Purposes H3C IMC Centralized Deployment Guide with Local Database Provides a complete guide to IMC platform and component centralized deploy

Page 160 - Scheduled report

40 Viewing the DVPN security configuration list A DVPN security configuration contains VAM security parameters and IPsec security parameters. Securit

Page 161

41 authentication services for IKE peers. The main mode is applied in scenarios that require high security levels, while the aggressive mode is used i

Page 162

42 To be considered a match, two IKE proposals must have the same encryption algorithm, authentication method, authentication algorithm, and DH group.

Page 163

43 { ID Type—Select the ID type for ISAKMP SA phase 1 negotiation. Options are IP and Name. When the negotiation mode is Main, the ID type can only b

Page 164 - 7 Maintaining VPNs

44 7. To delete IPsec proposals, select the IPsec proposals, click Delete, and then click OK on the confirmation dialog box that appears. 8. To add

Page 165

45 2. From the navigation tree, select IPsec VPN Manager > Options. The BIMS Service Settings tab displays all BIMS service parameters. 3. Conf

Page 166 - Modifying the basic settings

46 Parameter type Parameter Description Retires Enter the number of SNMPv3 retires. The value range is 1 to 20. 5. Modify the Telnet template: a.

Page 167 - Modifying IPsec proposals

47 Modifying monitor settings 1. Click the Service tab. 2. From the navigation tree, select IPsec VPN Manager > Options. 3. Click the Monitor

Page 168

48 Monitoring tunnels and VPN domains IVM monitors and collects index data from IPsec tunnels and VPN domains in real time. It uses the collected data

Page 169 - Deleting IPsec proposals

49 Figure 21 IPsec tunnel monitoring statistics Tunnel monitor indexes: • IPsec Tunnel Receive Rate (bps)—Displays the average receive rate (in bp

Page 170 - Querying IPsec tunnels

Obtaining documentation Access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top n

Page 171 - Undeploying IPsec tunnels

50 • IPsec Tunnel Outbound Dropped Packets—Displays the number of dropped packets within every 5 minutes in the outbound direction of the IPsec tunne

Page 172 - Deleting IPsec tunnels

51 Figure 22 VPN domain monitoring data Managing VPN domain topologies IVM allows you to view the topology of the VPN domains to locate network prob

Page 173 - Adding virtual spokes

52 Figure 23 HTML5-type VPN domain topology Figure 24 Applet-type VPN domain topology

Page 174

53 Access the VPN domain topology page You can access the VPN domain topology page from the VPN Domain List page, the IPsec Device List page, or the N

Page 175

54 All the VPN domains in IVM are listed under the Topology > VPN Domain Topology node in the left navigation tree. Double click a VPN domain name

Page 176

55 Alarm level Color Meaning Major Orange The highest alarm level is Major on the device. Minor Yellow The highest alarm level is Minor on the dev

Page 177

56 Figure 26 IPsec VPN tunnel information IPsec VPN tunnel information: • Link Name—Tunnel name. • Hub Device—Hub device name. • Hub Interface—I

Page 178

57 Figure 27 GRE over IPsec tunnel information A GRE over IPsec tunnel has the following information different from an IPsec VPN tunnel: • GRE Hub

Page 179

58 • Tunnel Status—State of the DVPN tunnel during the last polling interval. • Hub Private IP—Private IP address used by the hub client to register

Page 180

59 Figure 31 IPsec tunnel topology • Display Protected Subnets—Select this option to display the protected subnets in the VPN domain topology, as s

Page 181

i Contents 1 IPsec VPN Manager overview ··············································································································

Page 182 - Deleting IKE proposals

60 Figure 33 Right-click menu of a VPN domain topology VPN domain topology right-click menu options: • Device Label—Provides options that allows yo

Page 183 - Performing an advanced query

61 4 Building VPN networks with IVM This chapter describes using IVM to build IPsec VPN, GRE over IPsec VPN, and DVPN networks in which the hub and sp

Page 184 - GRE over IPsec tunnel

62 Figure 35 Building an IPsec VPN network Adding IPsec devices After you add IPsec devices to the IMC Platform, IVM automatically manages the IPsec

Page 185

63 Configure basic VPN domain settings 1. Enter a name for the VPN domain in the Domain Name box. IVM uses a case-insensitive name and a type to uni

Page 186

64 You can configure the IPsec proposal through step 3, or import an IPsec proposal template through step 4. 3. Configure the IPsec proposal: a. Sel

Page 187

65 The Select IKE Proposals window appears. This window automatically filters IKE proposal templates that do not match the IKE Authentication method s

Page 188

66 3. Add a hub by query: a. Click the Advanced tab, which provides the following query conditions: − Device IP—Enter the IPv4 address of a device.

Page 189

67 b. Collapse a view. All devices for the view are displayed at the upper right of the window. c. Select devices in the Devices Found list and cli

Page 190 - Managing DVPN domains

68 e. Click OK. To replace a spoke device, click the Select Spokes icon for that spoke device, and repeat step 2 or 3 to select a new spoke device.

Page 191

69 Configuring IPsec tunnels You can configure an IPsec tunnel when you add it, or modify an existing IPsec tunnel. The two configuration methods have

Page 192 - Modifying a DVPN domain

ii Querying IPsec proposals ··························································································································

Page 193 - Modifying the VAM server

70 { Basic Information { Device Parameters { Security Proposals { Spoke Additional Settings { Hub Advanced Settings { Spoke Advanced Settings Co

Page 194 - Modifying basic hub settings

71 Configuring device parameters The Device Parameters page provides CA domain and protected traffic flow settings. A CA domain includes certificate

Page 195

72 { Port number—A port or a port range protected by IPsec on the hub. { IP Address/Mask at the Spoke Side—Spoke network protected by IPsec. { Op

Page 196

73 5. Import an IPsec proposal that has been configured on a hub device in the current VPN domain: a. Click the import icon next to the hub propos

Page 197

74 e. Go to step 6. 5. Import an IKE proposal that has been configured on a hub device in the current VPN domain: a. Click the import icon next t

Page 198

75 ipsec policy policy-name seq-number isakmp template template-name The policy-name and seq-number arguments have the same functions as those in the

Page 199

76 { View Hub's Current Configuration { View Spoke's Current Configuration { View IVM's Configuration for Hub { View IVM's Con

Page 200

77 3. Click Add in the VPN Domain List to add a GRE over IPsec VPN domain by completing the following settings: a. Configure basic settings − Confi

Page 201

78 If you select YES, the hub device only responds to negotiation requests from peers, without initiating IKE negotiation. The IPsec policy template f

Page 202

79 c. Select the IPsec proposal template in the IPsec Proposal List. d. Click OK. The parameters in the IPsec proposal template are automatically

Page 203 - Managing spokes by group

iii Configuring existing GRE over IPsec tunnels ···································································································· 1

Page 204 - Querying DVPN groups

80 a. Select a hub device. b. Select spoke devices. c. Configure interfaces for GRE over IPsec tunnels. d. Configure GRE over IPsec tunnels 6. Cl

Page 205 - Adding spokes to a group

81 − Device Reachability—Select Reachable or Unreachable. An unselected query condition is not used for device query. b. Click Query. All the devic

Page 206 - Removing spokes from a group

82 − Device Label—Enter a device label. You can enter an incomplete label for fuzzy query. For example, you can enter db to query all devices that ha

Page 207

83 d. Click OK. e. To copy the name and address of the hub interface to another tunnel, click the Clone this interface to all subsequent hubs icon .

Page 208

84 { NAT Traversal—Select YES or NO. Only aggressive mode supports NAT traversal. { IKE Authentication—Select the authentication method Pre-Shared

Page 209

85 { Encapsulation Mode—Tunnel or Transport. If NAT traversal is enabled, the encapsulation mode must be Tunnel. This setting cannot be modified. You

Page 210

86 To modify the hub subnet, click the Modify icon and enter new settings in the window. To delete the hub subnet, select it and click Delete. 4.

Page 211

87 b. Enter the complete name or part of the name of the IPsec proposal template you want to query, and click Query. c. Select the IPsec proposal te

Page 212

88 You can add, modify, and delete IKE proposal templates in IKE Proposals. For more information about IKE proposal templates, see "Managing IKE

Page 213

89 { This setting corresponds to the following CLI command when the IPsec policy template is not enabled: ipsec policy policy-name seq-number isakmp

Comments to this Manuals

No comments