Common IPsec Tunnel Scenario
-
Example for Configuring the Point-to-Point IPsec Tunnel in IKE IPsec Policy Mode
-
To establish an IPsec tunnel in IKE mode, you need to configure the necessary parameter for the IKE negotiation, and then the IKE negotiation automatically creates and maintains the SA.
-
Example for Configuring the IPsec Tunnel in IKE IPsec Policy Template Mode
-
The NetEngine 8000 F is mainly to establish IPsec tunnels with the Base Transceiver Station (BTS). Therefore, mobile devices on the network of the base station can access an internal network. You can configure IPsec tunnels for multiple BTSs in IPsec policy template mode, therefore adding or reducing BTSs conveniently. The IPsec policy template is configured on the NetEngine 8000 F to receive connections passively; however, the IPsec policy is configured on the device of the BTS to initiate connections.
-
Example for Configuring IPsec Tunnels Between NetEngine 8000 Fs Using an IPsec Policy Template
-
You can use an IPsec policy template to configure IPsec tunnels for multiple mobile devices, thereby adding or reducing mobile devices conveniently. The IPsec policy template is configured on the NetEngine 8000 F to receive connections passively, and the IPsec policy is configured on the peer device to initiate connections.