Configuring An Ipsec Transform Set - HP 5920 Series Configuration Manual

Hide thumbs Also See for 5920 Series:
Table of Contents

Advertisement

Configuring an IPsec transform set

An IPsec transform set, part of an IPsec policy, defines the security parameters for IPsec SA negotiation,
including the security protocol, encryption algorithms, and authentication algorithms.
Changes to an IPsec transform set affect only SAs negotiated after the changes. To apply the changes to
existing SAs, execute the reset ipsec sa command to clear the SAs so that they can be set up by using the
updated parameters.
To configure an IPsec transform set:
Step
1.
Enter system view.
2.
Create an IPsec
transform set and enter
its view.
3.
Specify the security
protocol for the IPsec
transform set.
4.
Specify the security
algorithms.
Command
system-view
ipsec transform-set transform-set-name
protocol { ah | ah-esp | esp }
(In non-FIPS mode.) Specify the
encryption algorithm for ESP:
esp encryption-algorithm { 3des-cbc
| aes-cbc-128 | aes-cbc-192 |
aes-cbc-256 | des-cbc | null } *
(In FIPS mode.) Specify the
encryption algorithm for ESP:
esp encryption-algorithm
{ aes-cbc-128 | aes-cbc-192 |
aes-cbc-256 } *
(In non-FIPS mode.) Specify the
authentication algorithm for ESP:
esp authentication-algorithm { md5
| sha1 } *
(In FIPS mode.) Specify the
authentication algorithm for ESP:
esp authentication-algorithm sha1
(In non-FIPS mode.) Specify the
authentication algorithm for AH:
ah authentication-algorithm { md5 |
sha1 } *
(In FIPS mode.) Specify the
authentication algorithm for AH:
ah authentication-algorithm sha1
227
Remarks
N/A
By default, no IPsec transform set
exists.
Optional.
By default, the IPsec transform set
uses ESP as the security protocol.
Configure at least one command.
By default, no security algorithm is
specified.
You can specify security algorithms
for a security protocol only when
the security protocol is used by the
transform set. For example, you
can specify the ESP-specific
security algorithms only when you
select ESP or AH-ESP as the security
protocol.
If you use ESP in FIPS mode, you
must specify both the ESP
encryption algorithm and the ESP
authentication algorithm.
You can specify multiple
algorithms by using one command,
and the algorithm specified earlier
has a higher priority.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

5900 series

Table of Contents