Dell Brocade G620 Brocade 8.0.1 Fabric OS Administratiors Guide - Page 247

Management interface security, TABLE 53, ATTENTION, ipSecConfig --enable, Authentication

Page 247 highlights

Configuring Security Policies Table 53 shows merges that are not supported. TABLE 53 Examples of strict fabric merges Fabric-wide consistency policy setting Fabric A Strict/Tolerant SCC:S;DCC:S SCC;DCC:S SCC:S;DCC Strict/Absent SCC:S;DCC:S Strict/Strict SCC:S DCC:S SCC:S Fabric B SCC;DCC:S SCC:S;DCC SCC:S DCC:S Table 54 has a matrix of merging fabrics with tolerant and absent policies. TABLE 54 Fabric merges with tolerant and absent combinations Fabric-wide consistency policy setting Fabric A Tolerant/Absent SCC;DCC DCC SCC;DCC DCC Fabric B SCC SCC Expected behavior Ports connecting switches are disabled. Expected behavior Error message logged. Run the fddCfg command with the --fabwideset "policy_ID" from any switch with the desired configuration to fix the conflict. The secPolicyActivate command is blocked until conflict is resolved. Management interface security You can secure an Ethernet management interface between two Brocade switches or Backbones by implementing IPsec and IKE policies to create a tunnel that protects traffic flows. While the tunnel must have a Brocade switch or Backbone at each end, there may be routers, gateways, and firewalls in between the two ends. ATTENTION Enabling secure IPsec tunnels does not provide IPsec protection for traffic flows on the external management interfaces of intelligent blades in a chassis, nor does it support protection of traffic flows on FCIP interfaces. Internet Protocol security (IPsec) is a framework of open standards that ensures private and secure communications over Internet Protocol (IP) networks through the use of cryptographic security services. The goal of IPsec is to provide the following capabilities: NOTE The ipSecConfig --enable command is not supported in Fabric OS 8.0.0. ∙ Authentication -- Ensures that the sending and receiving end-users and devices are known and trusted by one another. ∙ Data Integrity -- Confirms that the data received was in fact the data transmitted. ∙ Data Confidentiality -- Protects the user data being transmitted, such as utilizing encryption to avoid sending data in clear text. ∙ Replay Protection -- Prevents replay attack in which an attacker resends previously-intercepted packets in an effort to fraudulently authenticate or otherwise masquerade as a valid user. ∙ Automated Key Management --Automates the process, as well as manages the periodic exchange and generation of new keys. Brocade Fabric OS Administration Guide, 8.0.1 53-1004111-02 247

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551

Table 53
shows merges that are not supported.
TABLE 53
Examples of strict fabric merges
Fabric-wide consistency policy setting
Expected behavior
Fabric A
Fabric B
Strict/Tolerant
SCC:S;DCC:S
SCC;DCC:S
Ports connecting switches are
disabled.
SCC;DCC:S
SCC:S;DCC
SCC:S;DCC
SCC:S
Strict/Absent
SCC:S;DCC:S
SCC:S
DCC:S
Strict/Strict
SCC:S
DCC:S
Table 54
has a matrix of merging fabrics with tolerant and absent policies.
TABLE 54
Fabric merges with tolerant and absent combinations
Fabric-wide consistency policy setting
Expected behavior
Fabric A
Fabric B
Tolerant/Absent
SCC;DCC
Error message logged.
Run the
fddCfg
command with the
--fabwideset
"
policy_ID
" from any
switch with the desired
configuration to fix the conflict. The
secPolicyActivate
command is
blocked until conflict is resolved.
DCC
SCC;DCC
SCC
DCC
SCC
Management interface security
You can secure an Ethernet management interface between two Brocade switches or Backbones by implementing IPsec and IKE
policies to create a tunnel that protects traffic flows. While the tunnel must have a Brocade switch or Backbone at each end, there may be
routers, gateways, and firewalls in between the two ends.
ATTENTION
Enabling secure IPsec tunnels does not provide IPsec protection for traffic flows on the external management interfaces of
intelligent blades in a chassis, nor does it support protection of traffic flows on FCIP interfaces.
Internet Protocol security (IPsec) is a framework of open standards that ensures private and secure communications over Internet
Protocol (IP) networks through the use of cryptographic security services. The goal of IPsec is to provide the following capabilities:
NOTE
The
ipSecConfig --enable
command is not supported in Fabric OS 8.0.0.
Authentication
-- Ensures that the sending and receiving end-users and devices are known and trusted by one another.
Data Integrity
-- Confirms that the data received was in fact the data transmitted.
Data Confidentiality
-- Protects the user data being transmitted, such as utilizing encryption to avoid sending data in clear text.
Replay Protection
-- Prevents replay attack in which an attacker resends previously-intercepted packets in an effort to
fraudulently authenticate or otherwise masquerade as a valid user.
Automated Key Management
--Automates the process, as well as manages the periodic exchange and generation of new keys.
Configuring Security Policies
Brocade Fabric OS Administration Guide, 8.0.1
53-1004111-02
247