Dell PowerConnect Brocade M6505 Brocade 7.1.0 Web Tools Administrator's Guide - Page 224

Creating an SA proposal, The IPsec protocol AH or ESP.

Page 224 highlights

15 IPsec over management ports To create a security association, perform the following steps. 1. Select the IPsec tab. The IPsec Policies screen displays. 2. Select the SA tab. 3. Select Add. The Add SA dialog box displays. 4. Enter a name for the SA in the SA Name field. 5. Select the IPsec Protocol. option. The choices are ah (for authentication header) and esp (for encapsulated security protocol). 6. Select the Authentication Algorithm option. 7. Select the Encryption Algorithm option. 8. Optionally, enter a value in the SPI number field. A Security Parameter Index (SPI) number is automatically assigned, but may be manually overridden. 9. Click OK. Creating an SA proposal An SA proposal is sent from one endpoint to another to negotiate IKE and IPsec policies. An SA proposal contains one or more security associations (SA). The endpoints must find a match for each of the following in the SAs sent in the SA proposal: • The IKE authentication method. • The IKE encryption algorithm. • The IKE hash algorithm. • The Diffie-Hellman group number. • The IKE SA lifetime. • The IP addresses of the endpoints. • The IPsec protocol (AH or ESP). • The IPsec Transform policy. To create an SA proposal, perform the following steps. 1. Select the SA Proposal tab on the IPsec Policies screen. 2. Select Add. The Add-SA Proposal dialog box displays. 3. Enter a name in the SA Proposal Name field. 4. Enter the SAs in the SA(s) to use field. 5. Optionally, define SA lifetime parameters. 196 Web Tools Administrator's Guide 53-1002756-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

196
Web Tools Administrator’s Guide
53-1002756-01
IPsec over management ports
15
To create a security association, perform the following steps.
1.
Select the
IPsec
tab.
The
IPsec Policies
screen displays.
2.
Select the
SA
tab.
3.
Select
Add
.
The
Add SA
dialog box displays.
4.
Enter a name for the SA in the
SA Name
field.
5.
Select the
IPsec Protocol
. option.
The choices are ah (for authentication header) and esp (for encapsulated security protocol).
6.
Select the
Authentication Algorithm
option.
7.
Select the
Encryption Algorithm
option.
8.
Optionally, enter a value in the
SPI number
field.
A Security Parameter Index (SPI) number is automatically assigned, but may be manually
overridden.
9.
Click
OK
.
Creating an SA proposal
An SA proposal is sent from one endpoint to another to negotiate IKE and IPsec policies. An SA
proposal contains one or more security associations (SA). The endpoints must find a match for
each of the following in the SAs sent in the SA proposal:
The IKE authentication method.
The IKE encryption algorithm.
The IKE hash algorithm.
The Diffie-Hellman group number.
The IKE SA lifetime.
The IP addresses of the endpoints.
The IPsec protocol (AH or ESP).
The IPsec Transform policy.
To create an SA proposal, perform the following steps.
1.
Select the
SA Proposal
tab on the
IPsec Policies
screen.
2.
Select
Add
.
The
Add-SA Proposal
dialog box displays.
3.
Enter a name in the
SA Proposal Name
field.
4.
Enter the SAs in the
SA(s) to use
field.
5.
Optionally, define SA lifetime parameters.