HP 8/20q HP StorageWorks 8/20q and SN6000 Fibre Channel Switch Enterprise Fabr - Page 104

Security policies

Page 104 highlights

Security policies A security policy defines the following parameters: • Connection source and destination • Data traffic direction: inbound or outbound • Protocols for which to protect data traffic • Security protocols; Authentication Header (AH) or Encapsulating Security Payload (ESP) • Level of protection: IP Security, discard, or none Policies can define security for host-to-host, host-to-gateway, and gateway-to-gateway connections; one policy for each direction. For example, to secure the connection between two hosts, you need two policies: one for outbound traffic from the source to the destination, and another for inbound traffic to the source from the destination. You can specify sources and destinations by IP addresses (version 4 or 6) or DNS host names. If a host name resolves to more than one IP address, the switch creates the necessary policies and associations. You can recognize these dynamic policies and associations because their names begin with DynamicSP_ and DynamicSA_ respectively. You can apply IP security to all communication between two systems, or to select protocols, such as ICMP, TCP, or UDP. Furthermore, instead of applying IP security, you can choose to discard all inbound or outbound traffic, or allow all traffic without encryption. Both the AH and ESP security protocols provide source authentication, ensure data integrity, and protect against replay. To create a policy, click Add on the Security Policy Database side of the Create IPsec Configuration dialog box. This opens the Create IPsec Security Policy dialog box (Figure 58). Table 17 describes the fields in the Create IP Security Policy dialog box. Figure 58 Create IP Security Policy dialog box Table 17 Create IP Security Policy dialog box fields Field Description Name Name of policy Description Description of policy Source Address Source port number (1-65535) Source Prefix Length Length of prefix in source address 104 Managing Switches

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

104
Managing Switches
Security policies
A security policy defines the following parameters:
Connection source and destination
Data traffic direction: inbound or outbound
Protocols for which to protect data traffic
Security protocols; Authentication Header (AH) or Encapsulating Security Payload (ESP)
Level of protection: IP Security, discard, or none
Policies can define security for host-to-host, host-to-gateway, and gateway-to-gateway connections; one
policy for each direction. For example, to secure the connection between two hosts, you need two policies:
one for outbound traffic from the source to the destination, and another for inbound traffic to the source
from the destination. You can specify sources and destinations by IP addresses (version 4 or 6) or DNS host
names. If a host name resolves to more than one IP address, the switch creates the necessary policies and
associations. You can recognize these dynamic policies and associations because their names begin with
DynamicSP_ and DynamicSA_ respectively.
You can apply IP security to all communication between two systems, or to select protocols, such as ICMP,
TCP, or UDP. Furthermore, instead of applying IP security, you can choose to discard all inbound or
outbound traffic, or allow all traffic without encryption. Both the AH and ESP security protocols provide
source authentication, ensure data integrity, and protect against replay.
To create a policy, click
Add
on the Security Policy Database side of the Create IPsec Configuration dialog
box. This opens the Create IPsec Security Policy dialog box (
Figure 58
).
Table 17
describes the fields in the
Create IP Security Policy dialog box.
Figure 58
Create IP Security Policy dialog box
Table 17
Create IP Security Policy dialog box fields
Field
Description
Name
Name of policy
Description
Description of policy
Source Address
Source port number (1–65535)
Source Prefix Length
Length of prefix in source address