Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 96

Protect Communication Between Group Members, Protect iSCSI Initiator Connections, Add Members to an

Page 96 highlights

Protect Communication Between Group Members To enable IPsec security for communication between group members, use the ipsec enable CLI command. No further configuration actions are required. Protect iSCSI Initiator Connections IP traffic between the group and iSCSI initiators is not automatically protected after IPsec has been enabled. Configure an IPsec configuration as follows: NOTE: See the Dell EqualLogic Group Manager CLI Reference Guide for command syntax and examples of the CLI commands. 1. If you are authenticating with certificates rather than pre-shared keys, load local and root-CA certificates using the ipsec certificate load command. (See About IPsec for more information.) 2. Create a security parameter using one of the ipsec security-params create commands, based on the authentication method: • If you are using a certificate, use ipsec security-params create certificate. • If you are using a pre-shared key, use ipsec security-params create pre-shared-key. NOTE: Local and root-CA certificates must be loaded before you can create certificate-based security parameters. This step is not required for security parameters using pre-shared keys. 3. Create a policy that defines a particular set of network traffic and applies a specific action to that traffic, a process that is conceptually similar to creating a firewall rule. You can either drop the traffic, allow it to pass through, or protect it using a security parameter. NOTE: If you are creating policies that drop traffic or allow it to pass, you do not have to create the corresponding security parameter. 4. Perform additional host or initiator configuration tasks required to use IPsec. See your operating system or iSCSI initiator documentation for instructions. 5. IPsec must be enabled for the IPsec configuration to take effect. However, you can still create IPsec configurations while IPsec is disabled. Add Members to an IPsec-Enabled Group You can add new group members to an existing IPsec-enabled group, provided the new member is a model that supports IPsec. See the documentation for the setup command in the Dell EqualLogic Group Manager CLI Reference Guide for instructions on joining an IPsec-enabled group. Some older PS Series array models do not support IPsec. See the Dell EqualLogic PS Series Storage Arrays Release Notes for more information. Remove an IPsec Configuration IPsec configurations cannot be modified. They must be removed and then recreated using the new configuration. NOTE: This process might disrupt connections that are covered by the policy being deleted. Dell recommends changing the configuration during a maintenance window. If you are removing an IPsec configuration, you must delete the components in the reverse order in which they were applied: 1. Delete the policy. 2. Delete the security parameter. 3. Delete the certificate (if certificate-based protection is being used). This same ordering rule applies when deleting any component used in an IPsec configuration. To delete a security parameter, you must first delete any policies using it. To delete a certificate, you must first delete any security parameters that use it. 96 About Group-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Protect Communication Between Group Members
To enable IPsec security for communication between group members, use the
ipsec enable
CLI command. No further
configuration
actions are required.
Protect iSCSI Initiator Connections
IP
traffic
between the group and iSCSI initiators is not automatically protected after IPsec has been enabled.
Configure
an IPsec
configuration
as follows:
NOTE: See the
Dell EqualLogic Group Manager CLI Reference Guide
for command syntax and examples of the
CLI commands.
1.
If you are authenticating with
certificates
rather than pre-shared keys, load local and root-CA
certificates
using the
ipsec
certificate
load
command. (See
About IPsec
for more information.)
2.
Create a security parameter using one of the
ipsec security-params create
commands, based on the authentication method:
If you are using a
certificate,
use
ipsec security-params create
certificate
.
If you are using a pre-shared key, use
ipsec security-params create pre-shared-key
.
NOTE: Local and root-CA
certificates
must be loaded before you can create
certificate-based
security parameters.
This step is not required for security parameters using pre-shared keys.
3.
Create a policy that
defines
a particular set of network
traffic
and applies a
specific
action to that
traffic,
a process that is
conceptually similar to creating a
firewall
rule. You can either drop the
traffic,
allow it to pass through, or protect it using a
security parameter.
NOTE: If you are creating policies that drop
traffic
or allow it to pass, you do not have to create the corresponding
security parameter.
4.
Perform additional host or initiator
configuration
tasks required to use IPsec. See your operating system or iSCSI initiator
documentation for instructions.
5.
IPsec must be enabled for the IPsec
configuration
to take
effect.
However, you can still create IPsec
configurations
while IPsec
is disabled.
Add Members to an IPsec-Enabled Group
You can add new group members to an existing IPsec-enabled group, provided the new member is a model that supports IPsec. See
the documentation for the
setup
command in the
Dell EqualLogic Group Manager CLI Reference Guide
for instructions on joining an
IPsec-enabled group.
Some older PS Series array models do not support IPsec. See the
Dell EqualLogic PS Series Storage Arrays Release Notes
for more
information.
Remove an IPsec
Configuration
IPsec
configurations
cannot be
modified.
They must be removed and then recreated using the new
configuration.
NOTE: This process might disrupt connections that are covered by the policy being deleted. Dell recommends changing
the
configuration
during a maintenance window.
If you are removing an IPsec
configuration,
you must delete the components in the reverse order in which they were applied:
1.
Delete the policy.
2.
Delete the security parameter.
3.
Delete the
certificate
(if
certificate-based
protection is being used).
This same ordering rule applies when deleting any component used in an IPsec
configuration.
To delete a security parameter, you
must
first
delete any policies using it. To delete a
certificate,
you must
first
delete any security parameters that use it.
96
About Group-Level Security