HP StorageWorks 8/80 HP StorageWorks Fabric OS 6.2 administrator guide (5697-0 - Page 464

IPSec implementation over FCIP

Page 464 highlights

Table 91 Default Mapping of DSCP priorities to L2Cos Priorities (continued) Virtual CIrcuit (VC) DSCP priority/bits L2CoS priority/bits Assigned to: 3 15 / 001111 3 / 011 Medium QoS 4 19 / 010011 3 / 011 Medium QoS 5 23 / 010111 3 / 011 6 27 / 011011 0 / 000 7 31 / 011111 0 / 000 8 35 / 100011 0 / 000 Medium QoS Class 3 Multicast Broadcast/Multicast Low Qos 9 39 / 100111 0 / 000 Low Qos 10 43 / 101011 4 / 100 11 47 / 101111 4 / 100 12 51 / 110011 4 / 100 13 55 / 110111 4 / 100 High QoS High QoS High QoS High QoS 14 59 / 111011 15 63 / 111111 4 / 100 0 / 000 High QoS - IPSec implementation over FCIP Internet Protocol security (IPsec) uses cryptographic security to ensure private, secure communications over Internet Protocol networks. IPsec supports network-level data integrity, data confidentiality, data origin authentication, and replay protection. It helps secure your SAN against network-based attacks from untrusted computers, attacks that can result in the denial-of-service of applications, services, or the network, data corruption, and data and user credential theft. By default, when creating an FCIP tunnel, IPsec is disabled. Used to provide greater security in tunneling on a B-Series Multi-Protocol Router Blade or an HP StorageWorks 400 Multi-Protocol Router, the IPsec feature does not require you to configure separate security for each application that uses TCP/IP. When configuring for IPsec, however, you must ensure that there is a B-Series Multi-Protocol Router Blade or an HP StorageWorks 400 Multi-Protocol Router at each end of the FCIP tunnel. IPsec works on FCIP tunnels with or without IP compression (IPComp), FCIP Fastwrite, and Tape Pipelining. IPsec can be created only on tunnels using IPv4 addressing. IPsec requires the High-Performance Extension over FCIP/FC license. IPsec uses some terms that you should be familiar with before beginning your configuration. These are standard terms, but are included here for your convenience. Table 92 IPsec terminology Term Definition AES AES-XCBC AH DES 3DES Advanced Encryption Standard. FIPS 197 endorses the Rijndael encryption algorithm as the approved AES for use by US Government organizations and others to protect sensitive information. It replaces DES as the encryption standard. Cipher Block Chaining. A key-dependent one-way hash function (MAC) used with AES in conjunction with the Cipher-Block-Chaining mode of operation, suitable for securing messages of varying lengths, such as IP datagrams. Authentication Header - like ESP, AH provides data integrity, data source authentication, and protection against replay attacks but does not provide confidentiality. Data Encryption Standard is the older encryption algorithm that uses a 56-bit key to encrypt blocks of 64-bit plain text. Because of the relatively shorter key length, it is not a secured algorithm and no longer approved for Federal use. Triple DES is a more secure variant of DES. It uses three different 56-bit keys to encrypt blocks of 64-bit plain text. The algorithm is FIPS-approved for use by Federal agencies. 460 Configuring and monitoring FCIP extension services

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576

460
Configuring and monitoring FCIP extension services
IPSec implementation over FCIP
Internet Protocol security (IPsec) uses cryptographic security to ensure private, secure communications over
Internet Protocol networks. IPsec supports network-level data integrity, data confidentiality, data origin
authentication, and replay protection. It helps secure your SAN against network-based attacks from
untrusted computers, attacks that can result in the denial-of-service of applications, services, or the network,
data corruption, and data and user credential theft. By default, when creating an FCIP tunnel, IPsec is
disabled.
Used to provide greater security in tunneling on a B-Series Multi-Protocol Router Blade or an HP
StorageWorks 400 Multi-Protocol Router, the IPsec feature does not require you to configure separate
security for each application that uses TCP/IP. When configuring for IPsec, however, you must ensure that
there is a B-Series Multi-Protocol Router Blade or an HP StorageWorks 400 Multi-Protocol Router at each
end of the FCIP tunnel. IPsec works on FCIP tunnels with or without IP compression (IPComp), FCIP
Fastwrite, and Tape Pipelining. IPsec can be created only on tunnels using IPv4 addressing.
IPsec requires the High-Performance Extension over FCIP/FC license.
IPsec uses some terms that you should be familiar with before beginning your configuration. These are
standard terms, but are included here for your convenience.
3
15 / 001111
3 / 011
Medium QoS
4
19 / 010011
3 / 011
Medium QoS
5
23 / 010111
3 / 011
Medium QoS
6
27 / 011011
0 / 000
Class 3 Multicast
7
31 / 011111
0 / 000
Broadcast/Multicast
8
35 / 100011
0 / 000
Low Qos
9
39 / 100111
0 / 000
Low Qos
10
43 / 101011
4 / 100
High QoS
11
47 / 101111
4 / 100
High QoS
12
51 / 110011
4 / 100
High QoS
13
55 / 110111
4 / 100
High QoS
14
59 / 111011
4 / 100
High QoS
15
63 / 111111
0 / 000
-
Table 91
Default Mapping of DSCP priorities to L2Cos Priorities (continued)
Virtual
CIrcuit (VC)
DSCP priority/bits
L2CoS priority/bits
Assigned to:
Table 92
IPsec terminology
Term
Definition
AES
Advanced Encryption Standard. FIPS 197 endorses the Rijndael encryption algorithm as
the approved AES for use by US Government organizations and others to protect
sensitive information. It replaces DES as the encryption standard.
AES-XCBC
Cipher Block Chaining. A key-dependent one-way hash function (MAC) used with AES
in conjunction with the Cipher-Block-Chaining mode of operation, suitable for securing
messages of varying lengths, such as IP datagrams.
AH
Authentication Header - like ESP, AH provides data integrity, data source authentication,
and protection against replay attacks but does not provide confidentiality.
DES
Data Encryption Standard is the older encryption algorithm that uses a 56-bit key to
encrypt blocks of 64-bit plain text. Because of the relatively shorter key length, it is not a
secured algorithm and no longer approved for Federal use.
3DES
Triple DES is a more secure variant of DES. It uses three different 56-bit keys to encrypt
blocks of 64-bit plain text. The algorithm is FIPS-approved for use by Federal agencies.