HP StorageWorks 2/16V Brocade Web Tools Administrator's Guide (53-0000194-01, - Page 115

Limitations, Unsupported with IKE/IPSec, NAT Traversal

Page 115 highlights

7 IPSec helps provide in-depth defense against: • Network-based attacks from untrusted computers, which can result in the denial-of-service of applications, services, or the network • Data corruption • Data theft • User-credential theft • Administrative control of servers, other computers, and the network Limitations Consider the following limitations if you plan to use IPSec: • Policies cannot be altered. To change the parameters associated with a current IKE or IPSec policy, that policy must be deleted and re-created with the altered parameters. • A policy cannot be deleted while an active FCIP tunnel is using it. • As with other FCIP tunnel configuration parameters, IPSec configuration on both ends of the tunnel must match for the tunnel to be established. (IPSec is an optional feature and is not required to be enabled.) • If IPSec is to be enabled on an FCIP tunnel, you must specify the preshared key, IKE, and IPSec policy numbers. • Only a single secure tunnel is allowed on a port. Nonsecure tunnels are not allowed on the same port as secure tunnels. • Fastwrite and tape pipelining are not supported with secure tunnels. • Modify operations are not allowed on secure tunnels. To change the configuration of a secure tunnel, first delete the tunnel and then re-create it with the desired options. • Jumbo frames are not supported on secure tunnels. • Only a single route is supported on an interface with a secure tunnel. Unsupported with IKE/IPSec The following implementations are currently not supported with IKE/IPSec: • IPV6 • ESP in transport mode • NAT Traversal Web Tools Administrator's Guide 7-5 Publication Number: 53-0000194-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308

Web Tools Administrator’s Guide
7-5
Publication Number: 53-0000194-01
7
IPSec helps provide in-depth defense against:
Network-based attacks from untrusted computers, which can result in the denial-of-service of
applications, services, or the network
Data corruption
Data theft
User-credential theft
Administrative control of servers, other computers, and the network
Limitations
Consider the following limitations if you plan to use IPSec:
Policies cannot be altered. To change the parameters associated with a current IKE or IPSec policy,
that policy must be deleted and re-created with the altered parameters.
A policy cannot be deleted while an active FCIP tunnel is using it.
As with other FCIP tunnel configuration parameters, IPSec configuration on both ends of the tunnel
must match for the tunnel to be established. (IPSec is an optional feature and is not required to be
enabled.)
If IPSec is to be enabled on an FCIP tunnel, you must specify the preshared key, IKE, and IPSec
policy numbers.
Only a single secure tunnel is allowed on a port. Nonsecure tunnels are not allowed on the same
port as secure tunnels.
Fastwrite and tape pipelining are not supported with secure tunnels.
Modify operations are not allowed on secure tunnels. To change the configuration of a secure
tunnel, first delete the tunnel and then re-create it with the desired options.
Jumbo frames are not supported on secure tunnels.
Only a single route is supported on an interface with a secure tunnel.
Unsupported with IKE/IPSec
The following implementations are currently not supported with IKE/IPSec:
IPV6
ESP in transport mode
NAT Traversal