Dell PowerEdge M710 Web Tools Administrator’s Guide - Page 267

Adding an IPsec selector, IKE Policy Name

Page 267 highlights

DRAFT: BROCADE CONFIDENTIAL IPsec over management ports 17 • Process indicates a data packet is processed using IPsec encryption, IKE authentication, or both, using encapsulation security protocol (ESP) processing, or authentication header (AH) protocol processing. Use the following procedure to add an IPsec transform policy. 1. Select the Transforms tab. The Transforms screen displays. 2. Select Add. The Add Transform dialog box displays. 3. Enter a name in the Transform Name field. 4. Select the IPsec Mode. The choices are Transport or Tunnel. 5. Enter the SA Proposal name. 6. Select the IPsec Protection Type option. 7. Select the IKE Policy Name option. IKE policies need to be created before adding a transform policy. If there are no names to select from, you must create an IKE policy. 8. Optional: Enter a local and peer IP address. 9. Click OK. Adding an IPsec selector Selectors are used to apply transform policies to an IP flow. Flows are uni-directional. Selectors are associated with a specific source IP address, a specific peer IP address, and a specific transform. 1. Select the Selectors tab. The Selectors screen displays. 2. Select Add. The Add Selector dialog box displays. 3. Enter a name in the Selector Name field. 4. Select the Traffic Flow Direction (in or out). IPsec policies are unidirectional, and must be applied separately to inbound and outbound flows. 5. Enter the IP address of the sender in the Source IP Address field. 6. Enter the IP address of the receiver in the Peer IP Address field. 7. Enter the Transform Name value. 8. The Protocol Name selector allows you to select a specific protocol. 9. Click OK. Web Tools Administrator's Guide 239 53-1001772-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310

Web Tools Administrator’s Guide
239
53-1001772-01
IPsec over management ports
17
DRAFT: BROCADE CONFIDENTIAL
•
Process indicates a data packet is processed using IPsec encryption, IKE authentication, or
both, using encapsulation security protocol (ESP) processing, or authentication header (AH)
protocol processing.
Use the following procedure to add an IPsec transform policy.
1.
Select the
Transforms
tab.
The
Transforms
screen displays.
2.
Select
Add
.
The
Add Transform
dialog box displays.
3.
Enter a name in the
Transform Name
field.
4.
Select the
IPsec Mode
.
The choices are
Transport
or
Tunnel
.
5.
Enter the
SA Proposal
name.
6.
Select the
IPsec Protection Type
option.
7.
Select the
IKE Policy Name
option.
IKE policies need to be created before adding a transform policy. If there are no names to
select from, you must create an IKE policy.
8.
Optional:
Enter a local and peer IP address.
9.
Click
OK
.
Adding an IPsec selector
Selectors are used to apply transform policies to an IP flow. Flows are uni-directional. Selectors are
associated with a specific source IP address, a specific peer IP address, and a specific transform.
1.
Select the
Selectors
tab.
The
Selectors
screen displays.
2.
Select
Add
.
The
Add Selector
dialog box displays.
3.
Enter a name in the
Selector Name
field.
4.
Select the
Traffic Flow Direction
(in or out).
IPsec policies are unidirectional, and must be applied separately to inbound and outbound
flows.
5.
Enter the IP address of the sender in the
Source IP Address
field.
6.
Enter the IP address of the receiver in the
Peer IP Address
field.
7.
Enter the
Transform Name
value.
8.
The
Protocol Name
selector allows you to select a specific protocol.
9.
Click
OK
.