- Community Home
- >
- Networking
- >
- Security e-Series
- >
- GRE over IPSEC assistance needed
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-28-2016 03:16 PM
07-28-2016 03:16 PM
GRE over IPSEC assistance needed
would the below work on comware 5 kit? In addition switchA would have opsf running that would redistribute the static for local LAN on switch B. The commands might not be precisely as they are on comware switches, I don't have anything to test it on at the moment.
SWITCH A
ike peer vpnpeer
pre-shared-key simple password
remote-address 10.102.2.2
local-address 10.102.2.1
#
ipsec proposal tran1
esp authentication-algorithm sha1
esp encryption-algorithm aes 256
#
ipsec policy test 1 isakmp
security acl 3030
ike-peer vpnpeer
proposal tran1
#
acl 3030
rule 0 permit ip source 10.102.2.1 0 dest 10.102.2.2 0
#
int vlan 100
ip add 10.102.2.1 24
ipsec policy test
#
int tun1
ip add 1.1.1.1 24
source vlan-interface 100
destination 10.102.2.2
servie loopack group 1
#
int e1/0/1
port service-loopback-service group 1
#
service loopback group 1 type tunnel
#
ip static-route 10.200.200.0 24 tunn1
SIWTCH B
ike peer vpnpeer
pre-shared-key simple password
remote-address 10.102.2.1
local-address 10.102.2.2
#
ipsec proposal tran1
esp authentication-algorithm sha1
esp encryption-algorithm aes 256
#
ipsec policy test 1 isakmp
security acl 3030
ike-peer vpnpeer
proposal tran1
#
acl 3030
rule 0 permit ip source 10.102.2.2 0 dest 10.102.2.1 0
#
int vlan 100
ip add 10.102.2.2 24
ipsec policy test
#
int tun1
ip add 1.1.1.2 24
source vlan-interface 100
destination 10.102.2.1
servie loopack group 1
#
int e1/0/1
port service-loopback-service group 1
#
service loopback group 1 type tunnel
#
ip static-route 0.0.0.0/0 tunnel1
#
vlan 200
description local LAN
#
int vlan 200
ip add 10.200.200.1 24