Configuring Ike; Fips Compliance; Overview; Ike Security Mechanism - HP 5500 HI Series Configuration Manual

Security
Hide thumbs Also See for 5500 HI Series:
Table of Contents

Advertisement

Configuring IKE

This feature is applicable only to the switches in FIPS mode. For more information about FIPS mode, see
"Configuring

FIPS compliance

The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode (see

Overview

Built on a framework defined by the Internet Security Association and Key Management Protocol
(ISAKMP), Internet Key Exchange (IKE) provides automatic key negotiation and SA establishment services
for IPsec, simplifying the application, management, configuration and maintenance of IPsec
dramatically.
Instead of transmitting keys directly across a network, IKE peers transmit keying materials between them,
and calculate shared keys respectively. Even if a third party captures all exchanged data for calculating
the keys, it cannot calculate the keys.

IKE security mechanism

IKE has a series of self-protection mechanisms and supports secure identity authentication, key
distribution, and IPsec SA establishment on insecure networks.
Data authentication
Data authentication involves two concepts:
Identity authentication—Mutual identity authentication between peers. Two authentication methods
are available: pre-shared key authentication and PKI-based digital signature authentication (RSA
signature).
Identity protection—Encrypts the identity information with the generated keys before sending the
information.
DH
The Diffie-Hellman (DH) algorithm is a public key algorithm. With this algorithm, two peers can
exchange keying material and then use the material to calculate the shared keys. Due to the decryption
complexity, a third party cannot decrypt the keys even after intercepting all keying materials.
PFS
The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. By making
sure keys have no derivative relations, it guarantees a broken key brings no threats to other keys. For IPsec,
PFS is implemented by adding an additional key exchange at IKE negotiation phase 2.
FIPS."
"Configuring
288
FIPS") and non-FIPS mode.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents