HP StorageWorks 2/32 Brocade Web Tools Administrator's Guide (53-0000194-01, N - Page 118
Configuring Virtual Ports, Encryption Algorithm., Authentication Algorithm., Perfect Forward Secrecy
View all HP StorageWorks 2/32 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 118 highlights
7 4. Select a policy type from the drop down menu. Figure 7-2 Create an IKE/IPSec Policy 5. Choose a policy number. 6. Select an Encryption Algorithm. 7. Select an Authentication Algorithm. 8. (IKE only) Select a Perfect Forward Secrecy. 9. (IKE only) Select a Diffie-Hellman Group. 10. Enter a value for the Security Association Lifetime in number of seconds. Configuring Virtual Ports Each GbE port support up to eight virtual ports. To enable FCIP on these ports, you must configure them as either VE_Port-to-VE_Port or VE_Port-to-VEX_Port, depending on whether you want to merge the connected fabrics. Two fabrics connected with VE_Ports will merge. Two fabrics connected with a VE_Port on one end and a VEX_Port on the other end will not merge. (See the Fabric OS Administrator's Guide for more information on Fiber Channel routing.) By default, all tunnels are created as VE_Port-to-VE_Port. If you do not want to merge the fabrics, you must explicitly configure the port at one end of the tunnel to be a VEX_Port before you configure the tunnel. See "Configuring FCIP Ports" on page 5-6 for instructions on configuring the virtual ports. You must configure and enable the ports on both the local and remote switches to utilize an FCIP ISL/IFL. 7-8 Web Tools Administrator's Guide Publication Number: 53-0000194-01