To create a manual IPsec tunnel, you need to use the SPI, string-key, authentication-hex, or encryption-hex.
The system view is displayed.
An SA is created, and the SA view is displayed.
A security proposal is applied to the SA.
A security proposal must be configured before it can be associated with protocol packet flows.
One SA can use only one security proposal. If a security proposal has been applied to an SA, the SA can use another security proposal only after the original one is deleted.
An SPI is set.
The SPI uniquely identifies an SA. The inbound and outbound SPIs are set, and the inbound SPI on the local end must be the same as the outbound SPI on the peer end.
An authentication key for outgoing protocol packets on the local end must be identical with that for incoming protocol packets on the peer end.
If multiple authentication keys are configured, the latest one takes effect.
Updating keys periodically is recommended.
An encryption key is set.
The configuration is committed.