Creating An Ike And Ipsec Policy - HP A7533A - Brocade 4Gb SAN Switch Base Administrator's Manual

Hp storageworks fabric os 6.2 administrator guide (5697-0016, may 2009)
Hide thumbs Also See for A7533A - Brocade 4Gb SAN Switch Base:
Table of Contents

Advertisement

The first step to configuring IPsec is to create a policy for IKE and a policy for IPsec. Once the policies have
been created, you assign the policies when creating the FCIP tunnel.
IKE negotiates SA parameters and authenticates the peer using the preshared key authentication method.
Once the two phases of the negotiation are completed successfully, the actual encrypted data transfer can
begin.
IPsec policies are managed using the policy command.
You can configure up to 32 IKE and 32 IPsec policies. Policies cannot be modified; they must be deleted
and re-created in order to change the parameters. You can delete and re-create any policy as long as the
policy is not being used by an active FCIP tunnel.
Each FCIP tunnel is configured separately and may have the same or different IKE and IPsec policies as
any other tunnel. Only one IPsec tunnel can be configured for each GbE port.
IPsec parameters
When creating policies, the parameters listed in
Table 93
Fixed policy parameters
Parameter
IKE negotiation protocol
ESP
IKE negotiation authentication method
3DES encryption
AES encryption
The parameters listed
Table 94
Modifiable policy parameters
Parameter
Encryption Algorithm
Authentication Algorithm
Security Association lifetime in
seconds
PFS (Perfect Forward Secrecy)
Diffie-Hellman group

Creating an IKE and IPsec policy

For a complete description of the policy command, see the Fabric OS Command Reference.
1.
Connect to the switch and log in using an account assigned to the admin role.
2.
Enter the policy command to create IKE and IPsec policies:
policy --create type number [-enc encryption_method][-auth
authentication_algorithm] [-pfs off|on] [-dh DH_group] [-seclife secs]
462 Configuring and monitoring FCIP extension services
Fixed Value
Main mode
Tunnel mode
Preshared key
Key length of 168 bits
Key length of 128 or 256
inTable 94
can be modified.
Description
3DES—168-bit key
AES- 1 28—128-bit key (default)
AES-256—256-bit key
SHA- 1 —Secure Hash Algorithm (default)
MD5—Message Digest 5
AES-XCBC—Used only for IPsec
Security association lifetime in seconds. A new key is
renegotiated before seconds expires. seconds must be between
28800 to 250000000 or 0. The default is 28800.
Applies only to IKE policies. Choices are On/Off and
default is On.
Group 1—768 bits (default)
Group 14—2048 bits
Table 93
are fixed and cannot be modified.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents