This section describes how to apply an IPsec policy to a tunnel interface to implement security protection on different data flows.
If an IPsec policy is applied to an interface through IKE negotiation, an SA is not established immediately. IKE starts to negotiate an IPsec SA only when the data flow that matches a certain IPsec policy is sent from the interface.
The system view is displayed.
A VSM HA backup group is created, and its view is displayed.
The configuration is committed.
Return to the system view.
A VSM HA service instance group is created, and its view is displayed.
The VSM HA backup group is bound to the VSM HA service instance group.
The configuration is committed.
Return to the system view.
A tunnel interface is created, and the tunnel interface view is displayed.
You need to create a tunnel interface first. An IPSec policy can be applied only to a tunnel interface, but not to a physical interface.
IPsec is configured on the tunnel interface.
Run the ip address ip-address mask command to configure an IP address for the tunnel interface.
Run the ip address unnumbered interface interface-type interface-number command to configure the tunnel interface to borrow an IP address from another interface.
If an available IP address exists on a device, run the first command to configure an IP address for the tunnel interface. The second command is run only when no available IP address exists on a device.
An IPsec policy is applied to the interface.
Generally, an IPsec profile can be applied to only one interface. In a scenario where multiple mGRE tunnels of a DSVPN share the same source, if you need to apply the same IPsec profile to multiple tunnel interfaces for IPsec tunnel sharing, specify the share parameter when running this command.
The share parameter can be used only in this scenario. In addition, mGRE tunnels with the same source address must be configured with different keys. In addition, you need to run the tunnel-protocol gre p2mp command and the source [ source-ip-address | { interface-name | interface-type interface-number } ] command on the tunnel interface.
DSVPN is supported only on the NetEngine 8000 F1A.
Automatic IPsec service route generation is enabled.
When a security policy is used to establish IPsec tunnels, you may not know the IPsec service route information of the remote end (such as the IP address and interface of the remote end). Therefore, static routes cannot be configured manually. In this case, run the ipsec generate-service-route command to enable the function of automatic IPsec service route generation.
When IPsec tunnels are established using an IPsec policy template, IPsec service routes will be generated during the IPsec negotiation. If you want to generate IPsec service routes by configuring static routes, you can run the undo ipsec generate-service-route command to disable the function of automatic IPsec service route generation first.
The configuration is committed.