Adding An Ipsec Selector - Brocade Communications Systems 8 Administrator's Manual

Supporting fabric os v6.4.0
Hide thumbs Also See for 8:
Table of Contents

Advertisement

Use the following procedure to add an IPsec transform policy.
1. Select the Transforms tab.
2. Select Add.
3. Enter a name in the Transform Name field.
4. Select the IPsec Mode.
5. Enter the SA Proposal name.
6. Select the IPsec Protection Type option.
7.
8. Optional: Enter a local and peer IP address.
9. Click OK.

Adding an IPsec selector

Selectors are used to apply transform policies to an IP flow. Flows are uni-directional. Selectors are
associated with a specific source IP address, a specific peer IP address, and a specific transform.
1. Select the Selectors tab.
2. Select Add.
3. Enter a name in the Selector Name field.
4. Select the Traffic Flow Direction (in or out).
5. Enter the IP address of the sender in the Source IP Address field.
6. Enter the IP address of the receiver in the Peer IP Address field.
7.
8. The Protocol Name selector allows you to select a specific protocol.
9. Click OK.
Web Tools Administrator's Guide
53-1001772-01
DRAFT: BROCADE CONFIDENTIAL
Process indicates a data packet is processed using IPsec encryption, IKE authentication, or
both, using encapsulation security protocol (ESP) processing, or authentication header (AH)
protocol processing.
The Transforms screen displays.
The Add Transform dialog box displays.
The choices are Transport or Tunnel.
Select the IKE Policy Name option.
IKE policies need to be created before adding a transform policy. If there are no names to
select from, you must create an IKE policy.
The Selectors screen displays.
The Add Selector dialog box displays.
IPsec policies are unidirectional, and must be applied separately to inbound and outbound
flows.
Enter the Transform Name value.
IPsec over management ports
17
239

Advertisement

Table of Contents
loading

Table of Contents