Establishing An Ike Policy; Creating A Security Association - Brocade Communications Systems StoreFabric SN6500B Administrator's Manual

Brocade web tools administrator's guide v7.1.0 (53-1002756-01, march 2013)
Hide thumbs Also See for StoreFabric SN6500B:
Table of Contents

Advertisement

1. Open the Switch Administration window.
2. Select Show Advanced Mode.
3. Select the Security Policies tab.
4. Under Security Policies, select Ethernet IPsec.
5. Ethernet IPsec policies can be configured only after enabling IPsec by clicking the Enable

Establishing an IKE policy

When you establish an IKE policy, you identify a set of algorithms and authentication rules and
parameters to use in a key exchange. Refer to the Fabric OS Administrator's Guide for details on
IKE functionality.
To establish an IKE policy, perform the following steps.
1. Select the IKE tab on the IPsec Policies window for Ethernet IPsec.
2. Enter an IKE Policy Name.
3. Enter the IP address of the authentication partner in the Peer IP Address field.
4. Enter the switch's local identifier in the Local Identifier field.
5. Enter the identifier of the remote peer switch in Peer Identifier.
6. Select the Encryption Algorithm option.
7.
8. Select the PRF Algorithm option.
9. Select the DH Group Number option.
10. Select the Authentication Method option.
11. If PSK is chosen as the authentication method, enter the name of the file that holds the
12. If you are using an X.509 certificate for authentication, enter the appropriate file names in the
13. Use the PFS selector to turn Perfect Forward Secrecy (PFS) on or off.

Creating a security association

A security association (SA) describes a set of parameters for providing secure communications
between two endpoints.
Web Tools Administrator's Guide
53-1002756-01
The Ethernet IPsec Policies screen displays.
button below the Ethernet IPsec policies table.
The Add IKE Policy dialog box displays.
This is normally the IP address in IPv4 or IPv6 format, but it may also be a DNS name.
This is normally the IP address in IPv4 or IPv6 format, but it may also be a DNS name.
Select the Hash Algorithm option.
pre-shared key in the Pre-Shared Key filename field.
Public Key filename, Private Key filename, and Peer Public Key filename fields in PEM format.
PFS provides additional security by means of a Diffie-Hellman shared secret value. With PFS, if
one key is compromised, previous and subsequent keys are secure because they are not
derived from previous keys.
IPsec over management ports
15
195

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents