Updated on 2024-10-11 GMT+08:00

Huawei USG6600 Series

This section uses a Huawei USG6600 series firewall running V100R001C30SPC300 as an example to describe how to configure VPN.

Assume that the subnets of the data center are 192.168.3.0/24 and 192.168.4.0/24, the subnets of the VPC are 192.168.1.0/24 and 192.168.2.0/24, and the public IP address of the IPsec tunnel egress in the VPC is 1.1.1.1, which can be obtained from the local gateway parameters of the IPsec VPN in the VPC.

Procedure

  1. Log in to the CLI of the firewall.
  2. Check firewall version information.
    display version 
    17:20:502017/03/09
    Huawei Versatile Security Platform Software
    Software Version: USG6600 V100R001C30SPC300(VRP (R) Software, Version 5.30)
  3. Create an access control list (ACL) and bind it to the target VPN instance.
    acl number 3065 vpn-instance vpn64
    rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    q 
  4. Create an IKE proposal.
    ike proposal 64 
    dh group5 
    authentication-algorithm sha1 
    integrity-algorithm hmac-sha2-256 
    sa duration 3600 
    q
  5. Create an IKE peer and bind it to the created IKE proposal. The peer IP address is 1.1.1.1.
    ike peer vpnikepeer_64
    pre-shared-key ******** (******** specifies the pre-shared key.)
    ike-proposal 64
    undo version 2
    remote-address vpn-instance vpn64 1.1.1.1
    sa binding vpn-instance vpn64
    q
  6. Create an IPsec proposal.
    IPsec proposal IPsecpro64
    encapsulation-mode tunnel
    esp authentication-algorithm sha1
    q
  7. Create an IPsec policy, and bind the IKE policy and IPsec proposal to it.
    IPsec policy vpnIPsec64 1 isakmp
    security acl 3065
    pfs dh-group5
    ike-peer vpnikepeer_64
    proposal IPsecpro64
    local-address xx.xx.xx.xx
    q
  8. Apply the IPsec policy to the corresponding sub-interface.
    interface GigabitEthernet0/0/2.64
    IPsec policy vpnIPsec64
    q
  9. Test the connectivity.

    After you perform the preceding operations, you can test the connectivity between your ECSs in the cloud and the hosts in your data center. For details, see the following figure.