HP 2000fc HP StorageWorks Simple SAN Connection Manager user guide (5697-0083, - Page 72

Length, Protocol, ICMP IPv6 Type if specified, and Direction. No two IPsec associations can, Address

Page 72 highlights

Protocol ICMP IPv6 Type Direction Priority Action Protection Desired AH Level Rule ESP Level Rule Select one of the following protocols or applications to which to apply IP security: • ICMP-Internet Control Message Protocol • ICMP6-Internet Control Message Protocol for IPv6 • IP4-Internet Protocol, version 4 • TCP-Transmission Control Protocol • UDP-User Datagram Protocol • Any-Any protocol Or enter a number in the range of 0 to 255. If you select ICMP6, you must also enter a value in the ICMP IPv6 Type box. (Required if you select ICMP6 for the Protocol) In the ICMP IPv6 Type box, enter a number in the range of 0 to 255. Select the direction of data traffic to which to apply the policy: • In-Data entering the destination • Out-Data leaving the source To control the relative ordering of this policy within the SPD, enter an integer in the range of -2147483647 to 214783647. Specify the processing to apply to data traffic: • Discard-Unconditionally disallow all inbound or outbound data traffic • None-Allow all inbound or outbound data traffic without encryption or decryption • IPsec-Apply IP security to inbound and outbound data traffic (Required if you select IPsec for the Action) Select the type of IP security protection to apply: • AH-Authentication Header • ESP-Encapsulating Security Payload • Both-Apply both AH and ESP protection (Required if you select AH or Both for the Protection) Select the rule level to apply for AH protection: • Default-For Linux, the default is Use. For Windows, the default is Require. • Use-If corresponding SAD entry is found, use IPsec. If corresponding SAD entry is not found, do not use IPsec. • Require-If corresponding SAD is entry found, use IPsec. If corresponding SAD entry is not found, do not communicate at all. (Required if you select ESP or Both for the Protection) Select the rule level to apply for ESP protection: • Default-For Linux, the default is Use. For Windows, the default is Require. • Use-If corresponding SAD entry is found, use IPsec. If corresponding SAD entry is not found, do not use IPsec. • Require-If corresponding SAD is entry found, use IPsec. If corresponding SAD entry is not found, do not communicate at all. NOTE: IPsec policies must be unique. The unique key for a policy includes the fields Source Address, Source Port, Source Prefix Length, Destination Address, Destination Port, Destination Prefix Length, Protocol, ICMP IPv6 Type (if specified), and Direction. No two IPsec associations can contain duplicate values in these nine fields. 72 Managing switches

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150

72
Managing switches
NOTE:
IPsec policies must be unique. The unique key for a policy includes the fields Source
Address, Source Port, Source Prefix Length, Destination Address, Destination Port, Destination Prefix
Length, Protocol, ICMP IPv6 Type (if specified), and Direction. No two IPsec associations can
contain duplicate values in these nine fields.
Protocol
Select one of the following protocols or applications to which to apply IP
security:
ICMP
—Internet Control Message Protocol
ICMP6
—Internet Control Message Protocol for IPv6
IP4
—Internet Protocol, version 4
TCP
—Transmission Control Protocol
UDP
—User Datagram Protocol
Any
—Any protocol
Or enter a number in the range of 0 to 255.
If you select ICMP6, you must also enter a value in the ICMP IPv6 Type box.
ICMP IPv6 Type
(Required if you select ICMP6 for the Protocol) In the ICMP IPv6 Type box, enter
a number in the range of 0 to 255.
Direction
Select the direction of data traffic to which to apply the policy:
In
—Data entering the destination
Out
—Data leaving the source
Priority
To control the relative ordering of this policy within the SPD, enter an integer in
the range of –2147483647 to 214783647.
Action
Specify the processing to apply to data traffic:
Discard
—Unconditionally disallow all inbound or outbound data traffic
None
—Allow all inbound or outbound data traffic without encryption or
decryption
IPsec
—Apply IP security to inbound and outbound data traffic
Protection Desired
(Required if you select IPsec for the Action) Select the type of IP security
protection to apply:
AH
—Authentication Header
ESP
—Encapsulating Security Payload
Both
—Apply both AH and ESP protection
AH Level Rule
(Required if you select AH or Both for the Protection) Select the rule level to apply
for AH protection:
Default
—For Linux, the default is Use. For Windows, the default is Require.
Use
—If corresponding SAD entry is found, use IPsec. If corresponding SAD
entry is not found, do not use IPsec.
Require
—If corresponding SAD is entry found, use IPsec. If corresponding
SAD entry is not found, do not communicate at all.
ESP Level Rule
(Required if you select ESP or Both for the Protection) Select the rule level to apply
for ESP protection:
Default
—For Linux, the default is Use. For Windows, the default is Require.
Use
—If corresponding SAD entry is found, use IPsec. If corresponding SAD
entry is not found, do not use IPsec.
Require
—If corresponding SAD is entry found, use IPsec. If corresponding
SAD entry is not found, do not communicate at all.