Defining The Ipsec Configuration - Brocade Communications Systems RFS6000 System Reference Manual

Provides centralized wireless lan (wlan) configuration and management
Hide thumbs Also See for RFS6000:
Table of Contents

Advertisement

NOTE
Though the controller can adopt a Mobility 7131 model access point, a Mobility 7131 cannot provide
IPSec support and should not be used in IPSec supported configurations.

Defining the IPSec configuration

Use the IPSec VPN Configuration tab to view the attributes of existing VPN tunnels and modify the
security association lifetime and keep alive intervals used to maintain the sessions between VPN
peers. From the Configuration tab, transform sets can be created as existing sets, modified or
deleted.
Brocade Mobility RFS6000 and RFS7000 System Reference Guide
53-1001858-01
With manually established security associations, there is no negotiation with the peer. Both
sides must specify the same transform set. If you change a transform set definition, the
change is only applied to Crypto Map entries that reference the transform set. The change is
not applied to existing security associations, but is used in subsequent negotiations to
establish new security associations.
Create Crypto Map entries
When IKE is used to establish security associations, the IPSec peers can negotiate the settings
they use for the new security associations. Therefore, specify lists (such as lists of acceptable
transforms) within the Crypto Map entry.
Apply Crypto Map sets to Interfaces
Assign a Crypto Map set to each interface through which IPSec traffic flows. The security
appliance supports IPSec on all interfaces. Assigning the Crypto Map set to an interface
instructs the security appliance to evaluate all the traffic against the Crypto Map set and use
the specified policy during connection or SA negotiation. Assigning a Crypto Map to an
interface also initializes run-time data structures (such as the SA database and the security
policy database). Reassigning a modified Crypto Map to the interface resynchronizes the
run-time data structures with the Crypto Map configuration. With the controller, a Crypto Map
cannot get applied to more than one interface at a time.
Monitor and maintain IPSec tunnels
New configuration changes only take effect when negotiating subsequent security
associations. If you want the new settings to take immediate effect, clear the existing security
associations so they will be re-established with the changed configuration.
For manually established security associations, clear and reinitialize the security associations
or the changes will not take effect.
For more information on configuring IPSec VPN, refer to the following:
Defining the IPSec configuration
Defining the IPSec VPN remote configuration
Configuring IPSEC VPN authentication
Configuring Crypto Maps
Viewing IPSec security associations
Configuring IPSec VPN
6
405

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs7000

Table of Contents