No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

AR500, AR510, and AR530 V200R007 Commands Reference

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
ipsec policy-template

ipsec policy-template

Function

The ipsec policy-template command creates an IPSec policy template and displays the IPSec policy template view.

The undo ipsec policy-template command deletes an IPSec policy template group or an IPSec policy template from the group.

By default, no IPSec policy template is created.

Format

ipsec policy-template template-name seq-number

undo ipsec policy-template template-name [ seq-number ]

Parameters

Parameter

Description

Value

template-name

Specifies the name of an IPSec policy template.

The value is a string of 1 to 15 case-sensitive characters without question marks (?) or spaces.

seq-number

Specifies the sequence number of an IPSec policy template. A smaller sequence number indicates a higher priority of the IPSec template.

The value is an integer that ranges from 1 to 10000.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

Negotiated IPSec parameters are defined in the IPSec policy template view. The initiator determines optional parameters, and the responder accepts the parameters delivered by the initiator. If an IPSec policy template is configured at the local end, the local end can only function as the responder to receive negotiation requests.

An IPSec policy template can be used to configure multiple IPSec policies, reducing the workload of establishing multiple IPSec tunnels. An IPSec policy template can be applicable to specific scenarios, for example, scenario where the remote IP address is variable or unknown (IP address obtained using PPPoE) and the remote peers are allowed to initiate negotiation to the local end.

ACLs in this mode are optional. If no ACL is configured, the responder uses the ACL configured on the initiator to protect data flows.

Follow-up Procedure

After creating an IPSec policy template, you can create an IPSec policy by referencing this template in the ipsec policy policy-name seq-number isakmp template template-name.

Precautions

Each IPSec policy template group can contain only one IPSec policy template.

The IPSec policy template name must be different from the IPSec policy name.

Example

# Create an IPSec policy template template1 with the sequence number of 100.

<Huawei> system-view
[Huawei] ipsec policy-template template1 100
Translation
Download
Updated: 2019-05-29

Document ID: EDOC1000097293

Views: 52769

Downloads: 102

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next