Establishing An Ike Policy For An Fcip Tunnel; Establishing An Ipsec Policy For An Fcip Tunnel - Brocade Communications Systems 8 Administrator's Manual

Supporting fabric os v6.4.0
Hide thumbs Also See for 8:
Table of Contents

Advertisement

3. Select the Security Policies tab.
4. Under Security Policies, select IPsec Policies.

Establishing an IKE policy for an FCIP tunnel

Use the following procedure to establish an IKE policy for an FCIP tunnel.
1. From the IKE tab of the IPsec Policies screen, select Create.
2. Policy Type provides a way to toggle between the IKE and IPsec Add Policy dialog box boxes.
3. Assign a policy number.
4. Select the Encryption Algorithm used in this policy.
5. Select an Authentication Algorithm for this policy.
6. Turn Perfect Forward Secrecy on or off.
7.
8. Set a Security Association Lifetime (in seconds).
9. Click OK.

Establishing an IPsec policy for an FCIP tunnel

Use the following procedure to establish an IPsec policy for an FCIP tunnel.
1. Select the IPsec tab.
2. Select Create.
3. Policy Type provides a way to toggle between the IKE and IPsec Add Policy dialog boxes.
Web Tools Administrator's Guide
53-1001772-01
DRAFT: BROCADE CONFIDENTIAL
The IPsec Policies window displays. The default view shows the IKE tab.
The Add Policy dialog box displays.
Make sure the Policy Type is set to IKE.
The Policy Number selector allows you to select a number between 1 and 32.
The choices are 3DES, AES-128, and AES_256.
The choices are SHA-1, MD5, and AES-XCBC.
The default is On. Perfect Forward Secrecy (PFS) provides additional security by means of a
Diffie-Hellman shared secret value. With PFS, if one key is compromised, previous and
subsequent keys are secure because they are not derived from previous keys.
Select a Diffie-Hellman Group association.
The choices are 1 (modp768) and 14 (modp2048).
The Security Association Lifetime is a time value in seconds. When this timer expires, the
security association (SA) is rekeyed. This limits the amount of time a given key is available to a
potential attacker.
The IPsec Policies window displays.
An Add Policy dialog box displays.
Make sure the Policy Type is set to IPSEC.
17
IPsec over FCIP
235

Advertisement

Table of Contents
loading

Table of Contents