Brocade Communications Systems StoreFabric SN6500B Command Reference Manual page 517

Brocade fabric os command reference v7.1.0 (53-1002746-01, march 2013)
Hide thumbs Also See for StoreFabric SN6500B:
Table of Contents

Advertisement

2.
3.
4.
5.
6.
7.
8.
9.
10. Perform the equivalent steps on the remote peer to complete the IPSec configuration. Refer to your
Example 2
The following example illustrates how to secure traffic between two systems using ESP protection with
3DES_CBC encryption and SHA1 authentication, and how to configure IKE with RSA Certificates signed
by the certification authority (CA). The two systems are A SWITCH, BROCADE300 (IPv6 address
fe80::220:1aff:fe34:2e82), and an external UNIX host (IPv6 address fe80::205:1fff:fe51:f09e).
1.
2.
Fabric OS Command Reference
53-1002746-01
Create an IPSec SA policy named AH01, which uses AH protection with MD5.
switch:admin> ipsecconfig --add policy ips sa
-t AH01 -p ah -auth hmac_md5
Create an IPSec proposal IPSEC-AH to use AH01 as SA.
switch:admin> ipsecconfig --add policy ips sa-proposal
-t IPSEC-AH -sa AH01
Configure the SA proposal's lifetime in time units.
switch:admin> ipsecconfig --add policy ips sa-proposal
-t IPSEC-AH -lttime 280000 -sa AH01
Import the preshared key file (e.g., ipseckey.psk) using the seCcertUtil import command.
Configure an IKE policy for the remote peer.
switch:admin> ipsecconfig --add policy ike -t IKE01
-remote 10.33.69.132 -id 10.33.74.13
-remoteid 10.33.69.132 -enc 3des_cbc
-hash hmac_md5 -prf hmac_md5 -auth psk
-dh modp1024 -psk ipseckey.psk
Create an IPSec transform named TRANSFORM01 to use transport mode to protect traffic identified
for IPSec protection and use IKE01 as the key management policy.
switch:admin> ipsecconfig --add policy ips transform
-t TRANSFORM01 -mode transport
-sa-proposal IPSEC-AH -action protect -ike IKE01
Create traffic selectors to select the outbound and inbound traffic that needs to be protected.
switch:admin> ipsecconfig --add policy ips selector
-t SELECTOR-OUT -d out -l 10.33.74.13 -r 10.33.69.132
-transform TRANSFORM01
switch:admin> ipsecconfig --add policy ips selector
-t SELECTOR-IN -d in -l 10.33.69.132 -r 10.33.74.13
-transform TRANSFORM01
Verify the IPSec SAs created using IKE for above traffic flow using ipsecConfig --show manual-sa
-a. Refer to the "IPSec display commands" section for an example.
server administration guide for instructions.
On the system console, log in to the switch as Admin and enable IPSec.
switch:admin> ipsecconfig --enable
Create an IPSec SA policy named ESP01, which uses ESP protection with 3DES and SHA1.
switch:admin> ipsecconfig --add policy ips sa -t ESP01
-p esp -enc 3des_cbc -auth hmac_sha1
\
\
\
\
\
\
\
\
\
\
\
\
\
2
ipSecConfig
\
489

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os v7.1.0

Table of Contents