Connection Between Two Private Networks Using IPSec VPN (IKEv2)
Connection Between Two Private Networks Using IPSec VPN (IKEv2)
htm
Webhelp
Search
You are here: Cookbook > VPN > Connection between Two Private Networks Using IPSec VPN (IKEv2)
* Note: This topology uses laboratory environment. In this recipe, 10.10.1.0/24 represents public network.
Configuration Steps
Device A
hostname(config-if-eth0/1)# exit
hostname(config-if-eth0/2)# exit
1 of 7 23/04/20, 10:23 AM
Connection between Two Private Networks Using IPSec VPN (IKEv2) https://docs.hillstonenet.com/en/Content/Cookbook/cb26-ipsec_ikev2.htm
hostname(config-ikev2-proposal)# group 2
hostname(config-ikev2-proposal)# exit
hostname(config-ikev2-ipsec-proposal)#protocol esp
hostname(config-ikev2-ipsec-proposal)#hash sha
hostname(config-ikev2-ipsec-proposal)#encryption 3des
hostname(config-ikev2-ipsec-proposal)#exit
hostname(config-ikev2-peer)# ikev2-profile 1
hostname(config-ikev2-profile)# exit
hostname(config-ikev2-peer)# exit
hostname(config)#
2 of 7 23/04/20, 10:23 AM
Connection between Two Private Networks Using IPSec VPN (IKEv2) https://docs.hillstonenet.com/en/Content/Cookbook/cb26-ipsec_ikev2.htm
Name: Headquarters_to_Branch_P1
Encryption: 3des
PRF: sha
Hash: sha
Group: 2
Lifetime: 86400
Name: Headquarters_to_Branch_P2
Protocol: esp
Encryption: 3des
Hash: sha
Group: 0
Lifetime: 28800
Lifesize: 0
hostname(config-ikev2-tunnel)# exit
hostname(config)#
Step 5 : Binding the tunnel interface to the IPsec VPN IKEv2 tunnel
hostname(config-if-tun1)# exit
hostname(config)#
hostname(config-vrouter)# exit
3 of 7 23/04/20, 10:23 AM
Connection between Two Private Networks Using IPSec VPN (IKEv2) https://docs.hillstonenet.com/en/Content/Cookbook/cb26-ipsec_ikev2.htm
Device B
hostname(config-if-eth0/1)# exit
hostname(config-if-eth0/2)# exit
hostname(config-ikev2-proposal)# group 2
hostname(config-ikev2-proposal)# exit
hostname(config-ikev2-ipsec-proposal)#protocol esp
hostname(config-ikev2-ipsec-proposal)#hash sha
hostname(config-ikev2-ipsec-proposal)#encryption 3des
hostname(config-ikev2-ipsec-proposal)#exit
4 of 7 23/04/20, 10:23 AM
Connection between Two Private Networks Using IPSec VPN (IKEv2) https://docs.hillstonenet.com/en/Content/Cookbook/cb26-ipsec_ikev2.htm
hostname(config-ikev2-peer)# ikev2-profile 1
hostname(config-ikev2-profile)# exit
hostname(config-ikev2-peer)# exit
hostname(config)#
Name: Branch_to_Headquarters_P1
Encryption: 3des
PRF: sha
Hash: sha
Group: 2
Lifetime: 86400
Name: Branch_to_Headquarters_P2
Protocol: esp
Encryption: 3des
Hash: sha
Group: 0
Lifetime: 28800
Lifesize: 0
5 of 7 23/04/20, 10:23 AM
Connection between Two Private Networks Using IPSec VPN (IKEv2) https://docs.hillstonenet.com/en/Content/Cookbook/cb26-ipsec_ikev2.htm
hostname(config-ikev2-tunnel)# auto-connect
hostname(config-ikev2-tunnel)# exit
Step 5 : Binding the tunnel interface to the IPsec VPN IKEv2 tunnel.
hostname(config-if-tun1)# exit
hostname(config-vrouter)# exit
hostname(config)#
Step 7: Results
1.With the command show ikev2 ike-sa, you can see that the first phase of IPsec VPN has been successfully
established.
Total: 1
L-time - Lifetime
================================================================================
--------------------------------------------------------------------------------
6 of 7 23/04/20, 10:23 AM
Connection between Two Private Networks Using IPSec VPN (IKEv2) https://docs.hillstonenet.com/en/Content/Cookbook/cb26-ipsec_ikev2.htm
================================================================================
2.With the command show ikev2 ipsec-sa, you can see that the second phase of IPsec VPN has been
successfully established.
Total: 1
================================================================================
--------------------------------------------------------------------------------
================================================================================
7 of 7 23/04/20, 10:23 AM