Ipsec Configuration; Ipsec Parameters - HP A7533A - Brocade 4Gb SAN Switch Base Administrator's Manual

Hp storageworks fabric os 6.2 administrator guide (5697-0016, may 2009)
Hide thumbs Also See for A7533A - Brocade 4Gb SAN Switch Base:
Table of Contents

Advertisement

Table 92
IPsec terminology (continued)
Term
ESP
IKE
MD5
SHA
MAC
HMAC
SA
The following limitations apply to using IPsec:
IPv6, NAT, and AH are not supported.
You can create a single secure tunnel only on a port; you cannot create a nonsecure tunnel on the same
port as a secure tunnel.
IPsec-specific statistics are not supported.
To change the configuration of a secure tunnel, you must delete the tunnel and re-create it.
Jumbo frames are not supported for IPsec.
There is no RAS message support for IPsec.
Only a single route is supported on an interface with a secure tunnel.
IPsec can be configured only on IPv4 based tunnels. Secure tunnels cannot be created on an HP
StorageWorks 400 Multi-Protocol Router or B-Series Multi-Protocol Router Blade if any IPv6 addresses
are defined on either ge0 or ge1.
Secure Tunnels cannot be defined with VLAN Tagged connections.

IPsec configuration

IPsec requires predefined configurations for IKE and IPsec. You can enable IPsec only when these
configurations are well-defined and properly created in advance.
The following describes the sequence of events that invokes the IPsec protocol.
1.
Traffic from an IPsec peer with the lower local IP address initiates the IKE negotiation process.
2.
IKE negotiates SAs and authenticates IPsec peers, and sets up a secure channel for negotiation of
phase 2 (IPsec) SAs.
3.
IKE negotiates SA parameters, setting up matching SAs in the peers. Some of the negotiated SA
parameters include encryption and authentication algorithms, Diffie-Hellman key exchange, and SA
lifetimes.
4.
Data is transferred between IPsec peers based on the IPsec parameters and keys stored in the SA
database.
5.
IPsec tunnel termination. SA lifetimes terminate through deletion or by timing out.
All of these steps require that the correct policies have been created. Because policy creation is an
independent procedure from FCIP tunnel creation, you must know which IPsec configurations have been
created. This ensures that you choose the correct configurations when you enable an IPsec tunnel.
Definition
Encapsulating Security Payload is the IPsec protocol that provides confidentiality, data
integrity and data source authentication of IP packets, and protection against replay
attacks.
Internet Key Exchange is defined in RFC 2407, RFC 2408 and RFC 2409. IKEv2 is
defined in RFC 4306. IKE uses a Diffie-Hellman key exchange to set up a shared session
secret, from which cryptographic keys are derived and communicating parties are
authenticated. The IKE protocol creates a security association (SA) for both parties.
Message Digest 5, like SHA- 1 , is a popular one-way hash function used for
authentication and data integrity.
Secure Hash Algorithm, like MD5, is a popular one-way hash function used for
authentication and data integrity.
Message Authentication Code is a key-dependent, one-way hash function used for
generating and verifying authentication data.
A stronger MAC because it is a keyed hash inside a keyed hash.
Security Association is the collection of security parameters and authenticated keys that
are negotiated between IPsec peers.
Fabric OS 6.2 administrator guide 461

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents