Vpn Configuration Task List; Creating An Ipsec Transformation Profile; Creating An Ipsec Policy Profile - Patton electronics SmartNode Series Software Configuration Manual

Software for smartnode series
Hide thumbs Also See for SmartNode Series:
Table of Contents

Advertisement

SmartWare Software Configuration Guide
VPN configuration task list
To configure a VPN connection, perform the following tasks:
Creating an IPsec transformation profile
Creating an IPsec policy profile
Creating/modifying an outgoing ACL profile for IPsec
Configuration of an IP Interface and the IP router for IPsec
Displaying IPsec configuration information
Debugging IPsec
Creating an IPsec transformation profile
The IPsec transformation profile defines which authentication and/or encryption protocols, which authentica-
tion and/or encryption algorithms shall be applied.
Procedure: To create an IPsec transformation profile
Mode: Configure
mac-sha1-96 }Enables authentication and defines the authentication protocol and the hash algorithm
Step
1
node(cfg)#profile ipsec-transform name
2
node(pf-ipstr)[name]#esp-encryption {
optional
aes-cbc | des-cbc | 3des-cbc } [key-length]
3
node(pf-ipstr)[name]#{ ah-authentication
optional
| esp-authentication } {hmac-md5-96 |
hmac-sha1-96 }
Use no in front of the above commands to delete a profile or a configuration entry.
Example: Create an IPsec transformation profile
The following example defines a profile for AES-encryption at a key length of 128.
node(cfg)#profile ipsec-transform AES_128
node(pf-ipstr)[AES_128]#esp-encryption aes-cbc 128
Creating an IPsec policy profile
The IPsec policy profile supplies the keys for the encryption and/or the authenticators for the authentication,
the security parameters indexes (SPIs), and IP address of the peer of the secured communication. Furthermore,
the profile defines which IPsec transformation profile to apply and whether transport or tunnel mode shall be
most effective.
The SPI identifies a secured communication channel. The IPsec component needs the SPI to select the suitable
key or authenticator. Inbound and outbound channels can have the same SPI, but the channels in the same
direction—inbound or outbound—must have unique SPIs. The SPI is not encrypted and can be monitored.

VPN configuration task list

Command
32 • VPN configuration
Purpose
Creates the IPsec transformation profile name
Enables encryption and defines the encryp-
tion algorithm and the key length
Supported key lengths see section
tion"
on page 361
Enables authentication and defines the
authentication protocol and the hash algo-
rithm
"Encryp-
363

Advertisement

Table of Contents
loading

This manual is also suitable for:

Smartware release 5.1

Table of Contents