Example Of An End-To-End Transport Tunnel Mode - Brocade Communications Systems 1606 Administrator's Manual

Fabric os administrator's guide v6.4.0 (53-1001763-01, june 2010)
Hide thumbs Also See for 1606:
Table of Contents

Advertisement

7
Management interface security

Example of an End-to-End Transport Tunnel mode

This example illustrates securing traffic between two systems using AH protection with MD5 and
configure IKE with pre-shared keys. The two systems are a switch, BROCADE300 (IPv4 address
10.33.74.13), and an external host (10.33.69.132).
NOTE
A backslash ( \ ) is used to skip the return character so you can continue the command on the next
line without the return character being interpreted by the shell.
1. On the system console, log in to the switch as Admin.
2. Enable IPsec.
3. Create an IPsec SA policy named AH01, which uses AH protection with MD5.
4. Create an IPsec proposal IPSEC-AH to use AH01 as SA.
5. Configure the SA proposal's lifetime in time units.
6. Import the pre-shared key file using the secCertUtil command. The file name should have a
7.
NOTE
IKE version ('-v' option) needs to be set to 1 (IKEv1) if remote peer is a Windows XP or 2000 Host as
Windows XP and 2000 do not support IKEv2.
8. Create an IPsec transform named TRANSFORM01 to use transport mode to protect traffic
9. Create traffic selectors to select the outbound and inbound traffic that needs to be protected.
172
a. Connect to the switch and log in using an account assigned to the admin role.
b. Enter the ipSecConfig
switch:admin> ipsecconfig --add policy ips sa -t AH01 \
-p ah -auth hmac_md5
switch:admin> ipsecconfig --add policy ips sa-proposal \
-t IPSEC-AH -sa AH01
switch:admin> ipsecconfig --add policy ips sa-proposal \
-t IPSEC-AH -lttime 280000 -sa AH01
.psk extension.
For more information on importing the pre-shared key file, refer to
certificate"
on page 125.
Configure an IKE policy for the remote peer.
switch:admin> ipsecconfig --add policy ike -t IKE01 \
-remote 10.33.69.132 -id 10.33.74.13 -remoteid 10.33.69.132 \
-enc 3des_cbc -hash hmac_md5 -prf hmac_md5 -auth psk \
-dh modp1024 -psk ipseckey.psk
identified for IPsec protection and use IKE01 as key management policy.
switch:admin> ipsecconfig --add policy ips transform \
-t TRANSFORM01 -mode transport -sa-proposal IPSEC-AH -action \
protect -ike IKE01
switch:admin> ipsecconfig --add policy ips selector \
-t SELECTOR-OUT -d out -l 10.33.74.13 -r 10.33.69.132 \
-transform TRANSFORM01
switch:admin> ipsecconfig --add policy ips selector \
enable command to enable IPsec on the switch.
--
"Installing a switch
Fabric OS Administrator's Guide
53-1001763-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

8/248/408/88/80

Table of Contents