IPsec can protect various data flows. In practice, you need to define data flows through an advanced ACL and apply the ACL in a security policy. Therefore, data flows are protected.
Data flows to be protected are defined through advanced ACLs. For data flows that require different security levels, different advanced ACLs must be created.
According to ACL rules, IPsec identifies which packets need or do not need security protection. Data flows matching advanced ACLs (permit) are processed by IPsec for protection before being sent. Data flows that do not match advanced ACLs are dropped directly. In addition, if data flows should have been encrypted but actually not, they are considered as attack data flows and discarded.
The system view is displayed.
The advanced ACL view is displayed.
Configure a rule for the advanced ACL.
It is recommended that you configure symmetrical ACL rules at two ends. Symmetrical ACL rules at two ends are not essential but are easier and not prone to errors in actual applications.
When multiple initiators negotiate with the same responder, the ACL rules of each initiator cannot overlap those of any other initiator. If rules overlap, some overlapping traffic cannot be properly encrypted, causing services to be compromised.
During IKEv2 negotiation, intersection ACL rules take effect. If multiple rules are defined in an ACL, the rule that is defined first is used preferentially.
IPsec processes the data stream to be protected as follows:
If packets match the ACL rule with the permit action, the packets are encrypted and sent to the peer end through tunnels.
If packets match no ACL rule, the packets are dropped.
If a nonexistent ACL or an ACL in which no rule is defined applies to a security policy, packets are dropped.
To configure the source and destination port numbers in the ACL of the protected data flow, you must use the eq parameter, rather than the lt, gt, range, or neq parameter.
The configuration is committed.