Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 75

IPsec Security Parameters, IPsec Security Associations (SA), IPsec Pre-Shared Keys (PSKs)

Page 75 highlights

You can generate certificates suitable for use in IPsec connections to the PS Series using any Windows, OpenSSL, or other commercial Certificate Authority product. From the Group Manager CLI, you can import, display, and delete certificates, using the ipsec certificate commands. See the Dell EqualLogic Group Manager CLI Reference Guide for more information. IPsec Security Parameters IPsec security parameters control the authentication and key negotiation carried out using the Internet Key Exchange IKEv1 or IKEv2 protocol. Security parameters specify the following features: • Using IKEv1, IKEv2, or manual keying NOTE: While it is possible to configure IPsec to use manual keys via the CLI command, Dell strongly cautions that you do not use this command. Using the command can lead to extremely serious security risks. Do not use this command. Consequently, Dell strongly discourages the use of manual keying in any production environment. IKEv1 or IKEv2 are the preferred keying methods. • Using certificates and pre-shared keys (PSK) • Establishing Transport Mode or Tunnel Mode connections NOTE: Unless specifically configured, IKEv1 and Transport Mode are used by default. IPsec security parameters are managed using the ipsec security-params commands. See the Dell EqualLogic Group Manager CLI Reference Guide for more information. IPsec Security Associations (SA) The pairing of an IPsec security parameter with an IPsec policy forms an IPsec security association (SA), which formalizes the secured connection between the group and a host connected to it. Each protected connection to the group is a unique security association, and each system can have multiple security associations, allowing it to have authenticated communications with many other systems. NOTE: You can view or delete security associations using the ipsec security-association commands. See the Dell EqualLogic Group Manager CLI Reference Guide for more information. IPsec Pre-Shared Keys (PSKs) In addition to using certificates, you can use pre-shared keys to authenticate secured connections. Pre-shared keys are identical strings that are specified at both ends of the communications pathway. The keys enable the systems to correctly identify each other. You can use either ASCII or hexadecimal strings. ASCII can be used in most situations. However, you can also use hexadecimal strings if: • Your organization mandates their use. • You have systems that do not support the use of ASCII strings. • You want to use characters that are not supported in ASCII strings. Examples of IPsec Configurations The following examples are provided and depict several scenarios for using IPsec with your PS Series group. They provide configuration settings for the array and for initiators and hosts. • Example 1: Transport mode (Host-to-Host) with certificates and PSK with Microsoft iSCSI Initiator • Example 2: Tunnel Mode (between Linux hosts) using PSK • Example 3: Tunnel Mode (between Linux hosts) using Certificate-Based Authentication About Group-Level Security 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

You can generate
certificates
suitable for use in IPsec connections to the PS Series using any Windows, OpenSSL, or other
commercial
Certificate
Authority product.
From the Group Manager CLI, you can import, display, and delete
certificates,
using the
ipsec
certificate
commands. See the
Dell
EqualLogic Group Manager CLI Reference Guide
for more information.
IPsec Security Parameters
IPsec security parameters control the authentication and key negotiation carried out using the Internet Key Exchange IKEv1 or IKEv2
protocol.
Security parameters specify the following features:
Using IKEv1, IKEv2, or manual keying
NOTE: While it is possible to
configure
IPsec to use manual keys via the CLI command, Dell strongly cautions that you
do not use this command. Using the command can lead to extremely serious security risks. Do not use this command.
Consequently, Dell strongly discourages the use of manual keying in any production environment. IKEv1 or IKEv2 are
the preferred keying methods.
Using
certificates
and pre-shared keys (PSK)
Establishing Transport Mode or Tunnel Mode connections
NOTE: Unless
specifically
configured,
IKEv1 and Transport Mode are used by default.
IPsec security parameters are managed using the
ipsec security-params
commands. See the
Dell EqualLogic Group Manager CLI
Reference Guide
for more information.
IPsec Security Associations (SA)
The pairing of an IPsec security parameter with an IPsec policy forms an IPsec security association (SA), which formalizes the
secured connection between the group and a host connected to it. Each protected connection to the group is a unique security
association, and each system can have multiple security associations, allowing it to have authenticated communications with many
other systems.
NOTE: You can view or delete security associations using the ipsec security-association commands. See the
Dell
EqualLogic Group Manager CLI Reference Guide
for more information.
IPsec Pre-Shared Keys (PSKs)
In addition to using
certificates,
you can use pre-shared keys to authenticate secured connections. Pre-shared keys are identical
strings that are
specified
at both ends of the communications pathway. The keys enable the systems to correctly identify each other.
You can use either ASCII or hexadecimal strings. ASCII can be used in most situations. However, you can also use hexadecimal
strings if:
Your organization mandates their use.
You have systems that do not support the use of ASCII strings.
You want to use characters that are not supported in ASCII strings.
Examples of IPsec
Configurations
The following examples are provided and depict several scenarios for using IPsec with your PS Series group. They provide
configuration
settings for the array and for initiators and hosts.
Example 1:
Transport mode (Host-to-Host) with
certificates
and PSK with Microsoft iSCSI Initiator
Example 2:
Tunnel Mode (between Linux hosts) using PSK
Example 3:
Tunnel Mode (between Linux hosts) using
Certificate-Based
Authentication
About Group-Level Security
75