HP StorageWorks 2/16V Brocade Web Tools Administrator's Guide (53-0000194-01, - Page 116

Table 7-2, Field, Description, Choices, Perfect Forward Secrecy - transformer

Page 116 highlights

7 Table 7-2 explains the fields and related choices to create an IKE/IPSec policy. Table 7-2 IKE/IPSec Configuration Choices Field Description Choices Policy Type You can create either an IKE policy or an IPSec IKE policy IPSec Policy Number This parameter helps you keep track of the number of policies you have created on your switch. You can choose any number from 1 through 32. You can define up to 32 IKE and 32 IPSec policies per switch. 1 through 32 Encryption Algorithm A mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. 3DES AES-128 AES-256 Authentication Algorithm An encryption process or tool in which the results SHA-1 of text encryption depend on all relevant MD5 authentication elements. AES-XCBC Perfect Forward Secrecy (PFS) In an authenticated key agreement protocol that uses public key cryptography, PFS is the property of disclosure of the long-term secret keying material that is used to derive an agreed ephemeral key that does not compromise the secrecy of the agreed keys from earlier runs. IKE on/off IPSec disabled Diffie-Hellman (D-H) Diffie-Hellman key exchange is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher IKE 1 or 14 IPSec disabled Security Association Lifetime This specifies the lifetime in seconds of the security association and a new key will be renegotiated before this value expires if PFS is on. The security association will expire when either this value or the value lifetime is reached. Specify the number of seconds 7-6 Web Tools Administrator's Guide Publication Number: 53-0000194-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308

7-6
Web Tools Administrator’s Guide
Publication Number: 53-0000194-01
7
Table 7-2
explains the fields and related choices to create an IKE/IPSec policy.
Table 7-2
IKE/IPSec Configuration Choices
Field
Description
Choices
Policy Type
You can create either an IKE policy or an IPSec
policy
IKE
IPSec
Policy Number
This parameter helps you keep track of the
number of policies you have created on your
switch. You can choose any number from 1
through 32. You can define up to 32 IKE and 32
IPSec policies per switch.
1 through 32
Encryption Algorithm
A mathematical procedure for performing
encryption on data. Through the use of an
algorithm, information is made into meaningless
cipher text and requires the use of a key to
transform the data back into its original form.
3DES
AES-128
AES-256
Authentication Algorithm
An encryption process or tool in which the results
of text encryption depend on all relevant
authentication elements.
SHA-1
MD5
AES-XCBC
Perfect Forward Secrecy
(PFS)
In an authenticated key agreement protocol that
uses public key cryptography, PFS is the property
of disclosure of the long-term secret keying
material that is used to derive an agreed ephemeral
key that does not compromise the secrecy of the
agreed keys from earlier runs.
IKE on/off
IPSec disabled
Diffie-Hellman (D-H)
Diffie-Hellman key exchange is a cryptographic
protocol that allows two parties that have no prior
knowledge of each other to jointly establish a
shared secret key over an insecure
communications channel. This key can then be
used to encrypt subsequent communications using
a symmetric key cipher
IKE 1 or 14
IPSec disabled
Security Association
Lifetime
This specifies the lifetime in seconds of the
security association and a new key will be
renegotiated before this value expires if PFS is on.
The security association will expire when either
this value or the value lifetime is reached.
Specify the number
of seconds