H3C Technologies H3C Intelligent Management Center User Manual

Page 8

Advertising
background image

ii

Querying IPsec proposals ····································································································································· 34

 

Viewing the IPsec proposal details ······················································································································ 35

 

Adding an IPsec proposal ···································································································································· 35

 

Modifying an IPsec proposal ······························································································································· 36

 

Deleting IPsec proposals ······································································································································· 36

 

Managing IKE proposals ··············································································································································· 36

 

Viewing the IKE proposal list ······························································································································· 37

 

Querying IKE proposals ········································································································································ 37

 

Viewing the IKE proposal details ························································································································· 38

 

Adding an IKE proposal ······································································································································· 38

 

Modifying an IKE proposal ·································································································································· 39

 

Deleting IKE proposals ·········································································································································· 39

 

Managing DVPN security configuration ······················································································································ 39

 

Viewing the DVPN security configuration list ····································································································· 40

 

Modifying a DVPN security configuration ·········································································································· 42

 

Configuring IVM service parameters ··························································································································· 44

 

Modifying BIMS server parameters ····················································································································· 44

 

Modifying BIMS device parameters ···················································································································· 45

 

Modifying monitor settings ··································································································································· 47

 

Monitoring tunnels and VPN domains ························································································································· 48

 

Viewing the IPsec tunnel monitoring statistics ····································································································· 48

 

Viewing the VPN domain monitoring data ········································································································ 50

 

Managing VPN domain topologies ····························································································································· 51

 

VPN domain topology types ································································································································ 51

 

Access the VPN domain topology page ············································································································· 53

 

Viewing the VPN domain topology ····················································································································· 54

 

4 Building VPN networks with IVM ·························································································································· 61

 

Building an IPsec VPN network ···································································································································· 61

 

Adding IPsec devices ············································································································································ 62

 

Adding IPsec VPN domains ································································································································· 62

 

Adding IPsec tunnels ············································································································································· 65

 

Configuring existing IPsec tunnels ······················································································································· 69

 

Deploying IPsec tunnels ········································································································································ 75

 

Building a GRE over IPsec VPN network ····················································································································· 76

 

Adding IPsec devices ············································································································································ 76

 

Adding GRE over IPsec VPN domains ················································································································ 76

 

Adding GRE over IPsec tunnels ···························································································································· 79

 

Configuring existing GRE over IPsec tunnels ······································································································ 84

 

Deploying GRE over IPsec tunnels ······················································································································· 91

 

Building a DVPN network ············································································································································· 91

 

Adding IPsec devices ············································································································································ 92

 

Adding DVPN domains ········································································································································ 92

 

5 Building VPN networks with IVM and BIMS ······································································································ 104

 

Building an IPsec VPN network ·································································································································· 104

 

Adding IPsec devices ·········································································································································· 105

 

Adding IPsec VPN domains ······························································································································· 105

 

Adding IPsec tunnels ··········································································································································· 108

 

Configuring existing IPsec tunnels ····················································································································· 111

 

Deploying IPsec tunnels ······································································································································ 117

 

Building a GRE over IPsec VPN network ··················································································································· 118

 

Adding IPsec devices ·········································································································································· 118

 

Adding GRE over IPsec VPN domains ·············································································································· 118

 

Adding GRE over IPsec tunnels ·························································································································· 121

 

Advertising