Only mandatory parameters, such as the Efficient VPN server IP address and pre-shared key, need to be configured on a remote device. Other parameters, such as authentication and encryption algorithms used in IKE negotiation, and the IPSec proposal, are preconfigured on the Efficient VPN server.
The system view is displayed.
An Efficient VPN policy in client mode is created and the Efficient VPN policy view is displayed.
By default, no Efficient VPN policy is created in the system.
When IKEv2 is used, the device does not support the network-plus parameter.
An ACL is referenced in the IPSec Efficient VPN policy.
By default, no ACL is referenced.
acl-number is an advanced ACL that has been created.
If an ACL is referenced, the rule can only match IP packets, that is, permit ip.
The remote device in client mode applies to the headquarters for an IP address to establish an IPSec tunnel with the Efficient VPN server. The source address in packets sent from the branch to the headquarters is the requested IP address, so ACLs are not required.
A peer address or a domain name in IKE negotiation is configured.
By default, no IP address or domain name is configured for the remote IKE peer during IKE negotiation.
To improve network reliability, two devices can be deployed at the headquarters to connect to the branch gateway. In an IPSec policy, two IP addresses or domain names of the remote IKE peer can be configured on the branch gateway. The branch gateway first attempts to use the first configured IP address or domain name to establish an IKE connection with the headquarters gateway. If establishing an IKE connection fails, the branch gateway uses the second IP address or domain name to establish an IKE connection.
The pre-shared key used by IKE peers to perform pre-shared key authentication is configured.
By default, no pre-shared key is configured on IKE peers.
The pre-shared key at the two ends must be the same.
A Diffie-Hellman group used in IKE negotiation is configured.
By default, group14 is used in IKE negotiation.
The security levels of the following Diffie-Hellman groups are in descending order of priority: group21 > group20 > group19 > group14.
The local ID type used in IKE negotiation is set.
By default, the IP address of the local end is used as the local ID.
The remote ID for IKE negotiation is configured.
By default, the remote ID for IKE negotiation is not configured.
A server-end service scheme is configured in an Efficient VPN policy.
By default, no server-end service scheme is configured in an Efficient VPN policy.
If an AAA service scheme is configured in the Efficient VPN policy, you need to specify AAA the service scheme configured on the server before the server can authorize the remote device. Meanwhile, you also need to specify the key-id parameter in the local-id-type command. If the key-id parameter is not specified, the configuration does not take effect. If authorization is performed using the service scheme used on the server, this step is not required.
A local IP address is configured.
By default, the local IP address is not configured.
The device is configured to use Perfect Forward Secrecy (PFS) in IPSec negotiation.
By default, PFS is not used in IPSec negotiation.
To improve the security of communication, you can configure the PFS to perform an additional DH exchange in the IKEv1 phase 2 or IKEv2 CREATE_CHILD_SA exchange. The additional DH exchange ensures security of the IPSec SA key.
The re-authentication interval is set.
By default, IKEv2 does not perform re-authentication.
In remote access, IPSec peers periodically send re-authentication packets, which reduces potential risks of attacks and improves IPSec network security.