Dell Brocade G620 Brocade 8.0.1 Fabric OS Administratiors Guide - Page 255

Notes, ipSecConfig --show policy ips sa-proposal -a

Page 255 highlights

Configuring Security Policies -prf hmac_md5 -auth psk -dh modp1024 -psk ipseckey.psk NOTE IKE version ('-v' option) needs to be set to 1 (IKEv1) if remote peer is a Windows XP or 2000 Host as Windows XP and 2000 do not support IKEv2. 8. Create an IPsec transform named TRANSFORM01 to use transport mode to protect traffic identified for IPsec protection and use IKE01 as key management policy. switch:admin> ipsecconfig --add policy ips transform -t TRANSFORM01 -mode transport -sa-proposal IPSEC-AH -action protect -ike IKE01 9. Create traffic selectors to select the outbound and inbound traffic that needs to be protected. switch:admin> ipsecconfig --add policy ips selector -t SELECTOR-OUT -d out -l 10.33.74.13 -r 10.33.69.132 -transform TRANSFORM01 switch:admin> ipsecconfig --add policy ips selector -t SELECTOR-IN -d in -l 10.33.69.132 -r 10.33.74.13 -transform TRANSFORM01 10. Verify the IPsec SAs created with IKE using the ipSecConfig --show manual-sa -a command. 11. Perform the equivalent steps on the remote peer to complete the IPsec configuration. Refer to your server administration guide for instructions. 12. Generate IP traffic and verify that it is protected using defined policies. a) Initiate Telnet or SSH or ping session from BRCD300 to Remote Host. b) Verify that the IP traffic is encapsulated. c) Monitor IPsec SAs created using IKE for the above traffic flow. ∙ Use the ipSecConfig --show manual-sa -a command with the operands specified to display the outbound and inbound SAs in the kernel SADB. ∙ Use the ipSecConfig --show policy ips sa -a command with the specified operands to display all IPsec SA policies. ∙ Use the ipSecConfig --show policy ips sa-proposal -a command with the specified operands to display IPsec proposals. ∙ Use the ipSecConfig --show policy ips transform -a command with the specified operands to display IPsec transforms. ∙ Use the ipSecConfig --show policy ips selector -a command with the specified operands to display IPsec traffic selectors. ∙ Use the ipSecConfig --show policy ike -a command with the specified operands to display IKE policies. ∙ Use the ipSecConfig --flush manual-sa command with the specified operands to flush the created SAs in the kernel SADB. ATTENTION Flushing SAs requires IPsec to be disabled and re-enabled. This operation is disruptive to traffic using the tunnel. Notes ∙ As of Fabric OS 7.0.0, IPsec no longer supports null encryption (null_enc) for IKE policies. ∙ IPv6 policies cannot tunnel IMCP traffic. Brocade Fabric OS Administration Guide, 8.0.1 53-1004111-02 255

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551

-prf hmac_md5 -auth psk -dh modp1024 -psk ipseckey.psk
NOTE
IKE version (‘-v’ option) needs to be set to 1 (IKEv1) if remote peer is a Windows XP or 2000 Host as Windows XP and
2000 do not support IKEv2.
8.
Create an IPsec transform named TRANSFORM01 to use transport mode to protect traffic identified for IPsec protection and
use IKE01 as key management policy.
switch:admin> ipsecconfig --add policy ips transform -t TRANSFORM01
-mode transport -sa-proposal IPSEC-AH -action protect -ike IKE01
9.
Create traffic selectors to select the outbound and inbound traffic that needs to be protected.
switch:admin> ipsecconfig --add policy ips selector -t SELECTOR-OUT -d out
-l 10.33.74.13 -r 10.33.69.132 -transform TRANSFORM01
switch:admin> ipsecconfig --add policy ips selector -t SELECTOR-IN -d in
-l 10.33.69.132 -r 10.33.74.13 -transform TRANSFORM01
10.
Verify the IPsec SAs created with IKE using the
ipSecConfig --show manual-sa -a
command.
11.
Perform the equivalent steps on the remote peer to complete the IPsec configuration. Refer to your server administration guide
for instructions.
12.
Generate IP traffic and verify that it is protected using defined policies.
a)
Initiate Telnet or SSH or ping session from BRCD300 to Remote Host.
b)
Verify that the IP traffic is encapsulated.
c)
Monitor IPsec SAs created using IKE for the above traffic flow.
Use the
ipSecConfig --show manual-sa -a
command with the operands specified to display the outbound and
inbound SAs in the kernel SADB.
Use the
ipSecConfig --show policy ips sa -a
command with the specified operands to display all IPsec SA policies.
Use the
ipSecConfig --show policy ips sa-proposal -a
command with the specified operands to display IPsec
proposals.
Use the
ipSecConfig --show policy ips transform -a
command with the specified operands to display IPsec
transforms.
Use the
ipSecConfig --show policy ips selector -a
command with the specified operands to display IPsec traffic
selectors.
Use the
ipSecConfig --show policy ike -a
command with the specified operands to display IKE policies.
Use the
ipSecConfig --flush manual-sa
command with the specified operands to flush the created SAs in the kernel
SADB.
ATTENTION
Flushing SAs requires IPsec to be disabled and re-enabled. This operation is disruptive to traffic using the tunnel.
Notes
As of Fabric OS 7.0.0, IPsec no longer supports null encryption (null_enc) for IKE policies.
IPv6 policies cannot tunnel IMCP traffic.
Configuring Security Policies
Brocade Fabric OS Administration Guide, 8.0.1
53-1004111-02
255