No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - VPN

AR650, AR1600, and AR6100 V300R003

This document describes VPN features on the device and provides configuration procedures and configuration examples.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
(Optional) Configuring Rapid Switchover and Revertive Switching of an IKE Peer

(Optional) Configuring Rapid Switchover and Revertive Switching of an IKE Peer

Context

To improve network reliability, two devices can be deployed at the headquarters to connect to the branch gateway. In an IPSec policy, two IP addresses or domain names of the remote IKE peer can be configured on the branch gateway. The branch gateway first attempts to use the first configured IP address or domain name to establish an IKE connection with the headquarters gateway. If establishing an IKE connection fails or the dead peer detection (DPD) fails, the branch gateway uses the second IP address or domain name to establish an IKE connection.

If the IP address of the first IKE peer is unreachable in the scenario that two IP addresses are configured, the branch gateway uses the second IP address to establish an IKE connection only when establishing an IKE connection fails or DPD fails. It takes a long time, and traffic cannot be switched back to the faulty gateway when it recovers.

You can use the Network Quality Analysis (NQA) or Bidirectional Forwarding Detection (BFD) to detect the status of the IP address of an IKE peer and to make sure whether the IP address of the IKE peer is valid according to the detection result. When the IP address of one IKE peer is invalid, the traffic can be quickly switched to another IKE peer. This ensures that when one headquarters gateway fails, the traffic can be quickly switched to another headquarters gateway. You can also configure revertive switching of an IKE peer to ensure that traffic can be switched back to the originally restored headquarters gateway.

Prerequisites

  • If the NQA test instance status is used to determine whether the remote address of an IKE peer is valid, ensure that the NQA test instance has been created. The device supports only association between IPSec and NQA of ICMP type. For details on how to configure an NAQ test instance of ICMP type, see Configuring an ICMP Test Instance.
  • If the BFD session instance status is used to determine whether the remote address of an IKE peer is valid, ensure that the BFD session has been created. For details on how to configure a BFD session, see Configuring Single-Hop BFD.

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run ike peer peer-name

    An IKE peer is created and the IKE peer view is displayed.

  3. Run remote-address [ vpn-instance vpn-instance-name ] { ip-address | host-name host-name } track { nqa admin-name test-name | bfd-session session-name } { up | down }

    The device is configured to determine whether the remote address of an IKE peer is valid according to the NQA test instance or BFD session status.

    By default, the device is configured to not determine whether the remote address of an IKE peer is valid according to the NQA test instance or BFD session status.

  4. (Optional) Run switch-back enable

    Revertive switching is enabled for the IKE peer.

    By default, revertive switching of an IKE peer is disabled.

Download
Updated: 2019-04-12

Document ID: EDOC1100041799

Views: 31718

Downloads: 45

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next