HP StorageWorks 1606 Brocade Web Tools Administrator's Guide v6.3.0 (53-100134 - Page 307

Editing an IKE or IPSec policy, IPSec Protection Type

Page 307 highlights

IPSec over management ports 17 8. Choose the IPSec Mode. The choices are Transport or Tunnel. Refer to"Transport mode and tunnel mode" if you are unfamiliar with Transport and Tunnel modes. 9. Choose the IPSec Protocol. The choices are ah (for authentication header) and esp (for encapsulated security protocol). 10. Choose the IPSec Protection Type. The choices are discard, bypass, or process. - Discard causes data packets to be rejected if there is an invalid pair of source and destination addresses or invalid port addresses. - Bypass allows a data packet to be transmitted or received without IPsec protection. - Process indicates a data packet is processed using IPsec encryption, IKE authentication, or both, using encapsulation security protocol (ESP) processing, or authentication header (AH) protocol processing. 11. Choose the Authentication Algorithm. The choices are hmac_md5, hmac_sha1, and AES_xcbc. 12. Type or copy a generated encryption key in the Encryption Key field. 13. Choose the Encryption Algorithm. The choices are 3des_cbc, aes_128, and aes_256. 14. Type or copy a generated authentication key in the Authentication Key field. 15. Optionally, enter a local and peer tunnel IP address. 16. Click OK. Editing an IKE or IPSec policy An existing IKE or IPSec policy can be edited. 1. Open the Switch Administration window. 2. Select Show Advanced Mode. 3. Select the Security Policies tab. 4. Under Security Policies, select Ethernet IPSec or Ethernet IPSec. 5. Select the policy you want to edit. 6. Select Edit. An Edit Policy dialog box is displayed. 7. Edit the policy as needed. 8. Click OK. Deleting an IKE or IPSec policy You can delete one or more IKE or IPSec policies. 1. Open the Switch Administration window. 2. Select Show Advanced Mode. 3. Select the Security Policies tab. 4. Under Security Policies, select Ethernet IPSec or Ethernet IPSec. Web Tools Administrator's Guide 275 53-1001343-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370

Web Tools Administrator’s Guide
275
53-1001343-01
IPSec over management ports
17
8.
Choose the
IPSec Mode
. The choices are Transport or Tunnel.
Refer to
“Transport mode and tunnel mode”
if you are unfamiliar with Transport and Tunnel
modes.
9.
Choose the
IPSec Protocol
. The choices are
ah
(for authentication header) and
esp
(for
encapsulated security protocol).
10.
Choose the
IPSec Protection Type
. The choices are
discard
,
bypass
, or
process
.
-
Discard causes data packets to be rejected if there is an invalid pair of source and
destination addresses or invalid port addresses.
-
Bypass allows a data packet to be transmitted or received without IPsec protection.
-
Process indicates a data packet is processed using IPsec encryption, IKE authentication,
or both, using encapsulation security protocol (ESP) processing, or authentication header
(AH) protocol processing.
11.
Choose the
Authentication Algorithm
. The choices are hmac_md5, hmac_sha1, and AES_xcbc.
12.
Type or copy a generated encryption key in the
Encryption Key
field.
13.
Choose the
Encryption Algorithm
. The choices are 3des_cbc, aes_128, and aes_256.
14.
Type or copy a generated authentication key in the
Authentication Key
field.
15.
Optionally, enter a local and peer tunnel IP address.
16. Click
OK
.
Editing an IKE or IPSec policy
An existing IKE or IPSec policy can be edited.
1.
Open the
Switch Administration
window.
2.
Select
Show Advanced Mode
.
3.
Select the
Security Policies
tab.
4.
Under
Security Policies
, select
Ethernet IPSec
or
Ethernet IPSec
.
5.
Select the policy you want to edit.
6.
Select
Edit
.
An Edit Policy dialog box is displayed.
7.
Edit the policy as needed.
8.
Click
OK
.
Deleting an IKE or IPSec policy
You can delete one or more IKE or IPSec policies.
1.
Open the
Switch Administration
window.
2.
Select
Show Advanced Mode
.
3.
Select the
Security Policies
tab.
4.
Under
Security Policies
, select
Ethernet IPSec
or
Ethernet IPSec
.