Enhancements To Ipsec/Vpn; Responding To Ipsec Packets From An Unknown Tunnel - Allied Telesis AT-8600 Release Note

Version 2.8.1
Hide thumbs Also See for AT-8600:
Table of Contents

Advertisement

Software Version 2.8.1
Software Version 2.8.1
C613-10477-00 REV B

Enhancements to IPsec/VPN

This Software Version includes enhancements in the following IPsec functions:

Responding to IPsec Packets from an Unknown Tunnel

Modifying the Message Retransmission Delay
Retrying ISAKMP Phase 1 and 2 Negotiations
VPN Tunnel Licencing
This section describes the enhancements. The modified commands to
implement them are described in
Responding to IPsec Packets from an
Unknown Tunnel
This Software Version allows the router or switch to send a notification
message to a peer when IPsec traffic from the peer is not recognised. When the
peer receives the message, it deletes the SAs it has for the router or switch. This
provides a way to ensure that only valid IPsec tunnels exist between the router
or switch and its peer.
To enable the router or switch to send this type of notification message to its
peer, use the new respondbadspi parameter in the command:
create ipsec policy=name interface=interface action=ipsec
keymanagement=isakmp peeraddress=ipv4add
respondbadspi=true [other parameters]
This feature is only valid for connections where:
The peer IP address is a static IPv4 address.
IPsec tunnel mode is used. This is specified by setting the mode parameter
to tunnel in the create ipsec saspecification command.
The ISAKMP policy for the peer has the mode parameter set to main, and
the sendnotify parameter set to true.
The IPsec policy for the peer has the action parameter set to ipsec, the
keymanagement parameter set to isakmp, and the peeraddress parameter
set to a valid IPv4 address.
The router or switch recognises traffic for current IPsec tunnels by checking the
Security Parameter Index (SPI) value of the IPsec packets. If the router or
switch receives an IPsec packet with an unknown SPI value from a known peer,
this indicates there is a discrepancy with the IPsec tunnel between the router or
switch and its peer. When the respondbadspi parameter is configured to true,
the router or switch can then send a message to the peer, notifying it to delete
the SAs for the router or switch, which closes the tunnel.
Unknown SPI values can occur if the router or switch restarts while there is a
current IPsec tunnel. Because the IPsec SAs are lost, the router or switch no
longer recognises traffic sent through the IPsec tunnel. However, the peer will
keep sending traffic via the tunnel unless it is notified that the SAs are invalid.
Command Reference
Updates.
169

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents