HP StorageWorks 2/16V Brocade Web Tools Administrator's Guide (53-0000194-01, - Page 118

Configuring Virtual Ports, Encryption Algorithm., Authentication Algorithm., Perfect Forward Secrecy

Page 118 highlights

7 4. Select a policy type from the drop down menu. Figure 7-2 Create an IKE/IPSec Policy 5. Choose a policy number. 6. Select an Encryption Algorithm. 7. Select an Authentication Algorithm. 8. (IKE only) Select a Perfect Forward Secrecy. 9. (IKE only) Select a Diffie-Hellman Group. 10. Enter a value for the Security Association Lifetime in number of seconds. Configuring Virtual Ports Each GbE port support up to eight virtual ports. To enable FCIP on these ports, you must configure them as either VE_Port-to-VE_Port or VE_Port-to-VEX_Port, depending on whether you want to merge the connected fabrics. Two fabrics connected with VE_Ports will merge. Two fabrics connected with a VE_Port on one end and a VEX_Port on the other end will not merge. (See the Fabric OS Administrator's Guide for more information on Fiber Channel routing.) By default, all tunnels are created as VE_Port-to-VE_Port. If you do not want to merge the fabrics, you must explicitly configure the port at one end of the tunnel to be a VEX_Port before you configure the tunnel. See "Configuring FCIP Ports" on page 5-6 for instructions on configuring the virtual ports. You must configure and enable the ports on both the local and remote switches to utilize an FCIP ISL/IFL. 7-8 Web Tools Administrator's Guide Publication Number: 53-0000194-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308

7-8
Web Tools Administrator’s Guide
Publication Number: 53-0000194-01
7
4.
Select a policy type from the drop down menu.
Figure 7-2
Create an IKE/IPSec Policy
5.
Choose a policy number.
6.
Select an
Encryption Algorithm.
7.
Select an
Authentication Algorithm.
8.
(IKE only) Select a
Perfect Forward Secrecy
.
9.
(IKE only) Select a
Diffie-Hellman Group
.
10.
Enter a value for the Security Association Lifetime in number of seconds.
Configuring Virtual Ports
Each GbE port support up to eight virtual ports. To enable FCIP on these ports, you must configure
them as either VE_Port-to-VE_Port or VE_Port-to-VEX_Port, depending on whether you want to
merge the connected fabrics. Two fabrics connected with VE_Ports will merge. Two fabrics connected
with a VE_Port on one end and a VEX_Port on the other end will not merge. (See the
Fabric OS
Administrator’s Guide
for more information on Fiber Channel routing.)
By default, all tunnels are created as VE_Port-to-VE_Port. If you do
not
want to merge the fabrics, you
must explicitly configure the port at one end of the tunnel to be a VEX_Port before you configure the
tunnel.
See
“Configuring FCIP Ports”
on page 5-6 for instructions on configuring the virtual ports. You must
configure and enable the ports on both the local and remote switches to utilize an FCIP ISL/IFL.