Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 78

CLI Commands IPv4, Example 2: Tunnel Mode Between Linux Hosts Using PSK

Page 78 highlights

Setting MainModeSecMethods QuickModeSecMethods IPv6 Value DHGroup14-AES256-SHA384 ESP:SHA1-AES256+60min+10000000kb CLI Commands (IPv4) Enter the following CLI commands on the PS Series group to implement the IPv4 configuration shown in Figure 10. Transport Mode (Host-to-Host) with Certificates or PSK: > ipsec certificate load PSAcert IPsecPSA.pfx local password password > ipsec certificate load RootCA rootca.cer root-ca > ipsec security-params create RemPeer_CERT_Auth certificate id-type distinguished-name idvalue "CN=RemPeerDN" > ipsec policy create ToRemPeer_IPv4_CERT_Ikev1 type v4 ip-addr 10.125.56.10 protocol any action protect RemPeer_CERT_Aut NOTE: The certificates must be loaded into the Local Computer CAPI store on the Windows host and uploaded to the / mgtdb/update folder on the PS Series array. CLI Commands (IPv6) Enter the following CLI commands on the PS Series group to implement the IPv6 configuration shown in Figure 10. Transport Mode (Host-to-Host) with Certificates or PSK: > ipsec security-params create RemPeer_PSK_Auth pre-shared-key key password > ipsec policy create ToRemPeer_IPv6_PSK_Ikev1 type v6 ip-addr fc00::10:125:56:11 protocol tcp action protect RemPeer_PSK_Auth NOTE: The certificates must be loaded into the Local Computer CAPI store on the Windows host and uploaded to the / mgtdb/update folder on the PS Series array. Example 2: Tunnel Mode (Between Linux Hosts) Using PSK In Figure 11. Tunnel Mode Between Linux Hosts Using PSK, an IPsec connection is established between Linux hosts running strongSwan and the PS Series group. The IPv4 and IPv6 traffic is protected using pre-shared keys (PSK). Either IKEv1 or IKEv2 can be used in this configuration. This particular example uses IKEv2. 78 About Group-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Setting
IPv6 Value
MainModeSecMethods
DHGroup14-AES256-SHA384
QuickModeSecMethods
ESP:SHA1-AES256+60min+10000000kb
CLI Commands (IPv4)
Enter the following CLI commands on the PS Series group to implement the IPv4
configuration
shown in
Figure 10. Transport Mode
(Host-to-Host) with
Certificates
or PSK
:
> ipsec certificate load PSAcert IPsecPSA.pfx local password
password
> ipsec certificate load RootCA rootca.cer root-ca
> ipsec security-params create RemPeer_CERT_Auth certificate id-type distinguished-name id-
value "CN=RemPeerDN"
> ipsec policy create ToRemPeer_IPv4_CERT_Ikev1 type v4 ip-addr 10.125.56.10 protocol any
action protect RemPeer_CERT_Aut
NOTE: The
certificates
must be loaded into the Local Computer CAPI store on the Windows host and uploaded to the /
mgtdb/update folder on the PS Series array.
CLI Commands (IPv6)
Enter the following CLI commands on the PS Series group to implement the IPv6
configuration
shown in
Figure 10. Transport Mode
(Host-to-Host) with
Certificates
or PSK
:
> ipsec security-params create RemPeer_PSK_Auth pre-shared-key key
password
> ipsec policy create ToRemPeer_IPv6_PSK_Ikev1 type v6 ip-addr fc00::10:125:56:11 protocol
tcp action protect RemPeer_PSK_Auth
NOTE: The
certificates
must be loaded into the Local Computer CAPI store on the Windows host and uploaded to the /
mgtdb/update folder on the PS Series array.
Example 2: Tunnel Mode (Between Linux Hosts) Using PSK
In
Figure 11. Tunnel Mode Between Linux Hosts Using PSK
, an IPsec connection is established between Linux hosts running
strongSwan and the PS Series group. The IPv4 and IPv6
traffic
is protected using pre-shared keys (PSK). Either IKEv1 or IKEv2 can
be used in this
configuration.
This particular example uses IKEv2.
78
About Group-Level Security