An IPsec proposal is a combination of security protocols, algorithms, and packet encapsulation modes to implement IPsec protection. An IPsec policy determines the security protocols, algorithms, and packet encapsulation modes using the IPsec proposal.
During the configuration of an IPsec proposal, the same security protocol, authentication algorithm, encryption algorithm, and packet encapsulation mode must be configured at both ends of the tunnel to be established.
IPsec provides a high-quality and cryptology-based security for IP packets through AH and ESP security protocols.
The system view is displayed.
An IPsec proposal is created, and the IPsec proposal view is displayed.
A security protocol for data transmission is configured.
AH and ESP must be used independently. The rules for using them are as follows:
AH provides data source authentication, data integrity check, and the anti-replay function for the protected data.
ESP provides encryption, in addition to data source authentication, data integrity check, and anti-replay function, for the protected data.
Run ah authentication-algorithm { md5 | sha1 | sha2-256 | sha2-384 | sha2-512 }
An authentication algorithm used by AH is configured.
To help improve system security, do not use the MD5 or SHA1 authentication algorithm for the AH protocol.
Run esp authentication-algorithm { md5 | sha1 | sha2-256 | sha2-384 | sha2-512 }
An authentication algorithm used by ESP is configured.
To help improve system security, do not use the MD5 or SHA1 authentication algorithm for the ESP protocol.
Run esp encryption-algorithm { des | 3des | aes { 128 | 192 | 256 } | aes-gcm-128 { 128 | 192 | 256 } }
An encryption algorithm used by ESP is configured.
To help improve system security, do not use the DES or 3DES encryption algorithm for the ESP protocol.
A packet encapsulation mode is configured.
The configuration is committed.