No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Interoperation Configuration Guide

AR Router

This document provides cases for connecting AR enterprise routers to devices of other vendors.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Networking Requirements

Networking Requirements

On a network shown in Figure 18-2, AR router RouterA functions as the branch gateway and Cisco router RouterB functions as the headquarters gateway. They communicate over the Internet.

The enterprise wants to protect traffic transmitted over the Internet between the enterprise branch and headquarters. An IPSec tunnel can be established between the headquarters gateway and branch gateway to protect communication between the headquarters and branch over the Internet. If a large amount of data flows need to be protected by IPSec, it is recommended that the IPSec tunnel be established using virtual tunnel (VT) interfaces. There is no need to create ACL rules to define traffic characteristics to be protected.

Figure 18-2  Establishing an IPSec tunnel between a branch gateway (AR) and headquarters gateway (Cisco router) using VT interfaces

Updated: 2019-05-17

Document ID: EDOC1100034005

Views: 23775

Downloads: 464

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next