Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 93

Supported iSCSI Initiator Platforms, Requirements for IPsec, Supported Relative Distinguished Names

Page 93 highlights

• The PS Series firmware provides no mechanism for using IPsec to protect traffic between replication partners. It is technically possible to create IPsec polices on both the primary and secondary group in which each group treats the other as an iSCSI initiator and traffic is protected accordingly. However, this configuration is not supported, and Dell recommends against implementing it in a production environment. • The PS Series array does not serve as an IPsec-secured gateway; it behaves as an IPsec-secured host only. • You cannot use the save-config CLI command to preserve the group's IPsec certificates and pre-shared keys. The save-config command saves the CLI commands that were used to configure IPsec, but it does not save certificates that have been transferred to the array using FTP. Therefore, when you restore a configuration, you must manually restore any configuration options set using the ipsec certificate load, ipsec security-params create certificate, and ipsec security-params pre-shared-key commands. • Kerberos-based authentication is not supported. • Multiple Root Certificate Authorities (CA) are not supported. • Certificate Revocation Lists (CRL) are not supported. • Only users with group administrator privileges can configure IPsec. • Perfect Forward Secrecy (PFS) is not supported. • Encrypted private keys are not supported for X.509 format certificates. • Dell recommends using a minimum of 3600 seconds and 10GB lifetime rekey values. • IKE mobility is not supported. • NAT Traversal (NAT-T) is not supported. Dell recommends against placing a firewall that performs address translation between the PS Series group and its IPsec peers. Supported iSCSI Initiator Platforms iSCSI initiators on the following hosts have been tested and verified for use with IPsec connections to PS Series groups: • Microsoft Windows 2008, Windows 2008 R2, Windows 7, Windows Server 2012, and Windows Server 2012 R2 • Ubuntu Linux (using strongSWAN) NOTE: Some Linux distributions use a different IKE implementation. For example: CentOS 6 uses Openswan. The configuration details change substantially depending on the IKE implementation used, and in particular, the examples provided in this document do not carry over to Openswan. Requirements for IPsec Certificates The following considerations apply to certificates: • If a certificate that is uploaded to the array contains multiple Subject Alternative names, only the first name is used. • Certificates can be imported using PKCS12 or X.509 formats. • Encrypted private keys are not supported for X.509 format certificates. Use PKCS12 format certificates when encrypted private keys are required. • The maximum supported certificate key size is 4096 bits, which applies to both local and root-CA certificates. • Disabling support for legacy protocols prevents the following actions: - RSA-based SSH keys smaller than 2048 bits establishing SSH sessions to the group - All DSA-based SSH keys establishing SSH sessions to the group - Using the IKE (Diffie-Hellman) Key Exchange Group 2 algorithm - All IPSec certificates (both on the initiator and the group) using DSA keys establishing security associations - All IPSec certificates (both on the initiator and the group) with keys smaller than 2048 bits establishing security associations - Any certificate with keys smaller than 2048 bits from being imported into the group Supported Relative Distinguished Names (RDN) Table 20. Supported RDNs lists supported certificate Relative Distinguished Names (RDN). About Group-Level Security 93

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

The PS Series
firmware
provides no mechanism for using IPsec to protect
traffic
between replication partners. It is technically
possible to create IPsec polices on both the primary and secondary group in which each group treats the other as an iSCSI
initiator and
traffic
is protected accordingly. However, this
configuration
is not supported, and Dell recommends against
implementing it in a production environment.
The PS Series array does not serve as an IPsec-secured gateway; it behaves as an IPsec-secured host only.
You cannot use the
save-config
CLI command to preserve the group’s IPsec
certificates
and pre-shared keys. The
save-config
command saves the CLI commands that were used to
configure
IPsec, but it does not save
certificates
that have been
transferred to the array using FTP. Therefore, when you restore a
configuration,
you must manually restore any
configuration
options set using the
ipsec
certificate
load
,
ipsec security-params create
certificate
, and
ipsec security-params pre-shared-key
commands.
Kerberos-based authentication is not supported.
Multiple Root
Certificate
Authorities (CA) are not supported.
Certificate
Revocation Lists (CRL) are not supported.
Only users with group administrator privileges can
configure
IPsec.
Perfect Forward Secrecy (PFS) is not supported.
Encrypted private keys are not supported for X.509 format
certificates.
Dell recommends using a minimum of 3600 seconds and 10GB lifetime rekey values.
IKE mobility is not supported.
NAT Traversal (NAT-T) is not supported. Dell recommends against placing a
firewall
that performs address translation between
the PS Series group and its IPsec peers.
Supported iSCSI Initiator Platforms
iSCSI initiators on the following hosts have been tested and
verified
for use with IPsec connections to PS Series groups:
Microsoft Windows 2008, Windows 2008 R2, Windows 7, Windows Server 2012, and Windows Server 2012 R2
Ubuntu Linux (using strongSWAN)
NOTE: Some Linux distributions use a
different
IKE implementation. For example: CentOS 6 uses Openswan. The
configuration
details change substantially depending on the IKE implementation used, and in particular, the examples
provided in this document do not carry over to Openswan.
Requirements for IPsec
Certificates
The following considerations apply to
certificates:
If a
certificate
that is uploaded to the array contains multiple Subject Alternative names, only the
first
name is used.
Certificates
can be imported using PKCS12 or X.509 formats.
Encrypted private keys are not supported for X.509 format
certificates.
Use PKCS12 format
certificates
when encrypted private
keys are required.
The maximum supported
certificate
key size is 4096 bits, which applies to both local and root-CA
certificates.
Disabling support for legacy protocols prevents the following actions:
RSA-based SSH keys smaller than 2048 bits establishing SSH sessions to the group
All DSA-based SSH keys establishing SSH sessions to the group
Using the IKE
(Diffie-Hellman)
Key Exchange Group 2 algorithm
All IPSec
certificates
(both on the initiator and the group) using DSA keys establishing security associations
All IPSec
certificates
(both on the initiator and the group) with keys smaller than 2048 bits establishing security associations
Any
certificate
with keys smaller than 2048 bits from being imported into the group
Supported Relative Distinguished Names (RDN)
Table 20. Supported RDNs
lists supported
certificate
Relative Distinguished Names (RDN).
About Group-Level Security
93