HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 207

Configuring IPsec, Overview, Security protocols and encapsulation modes, Security protocols

Page 207 highlights

Configuring IPsec CAUTION: If you configure both IPsec and QoS on an interface, make sure the IPsec traffic classification rules match the QoS traffic classification rules. If the rules do not match, QoS might classify the packets of one IPsec SA to different queues, causing packets to be sent out of order. When IPsec anti-replay is enabled, IPsec will drop the incoming packets that are out of the anti-replay window, resulting in packet loss. IPsec traffic classification rules are determined by the referenced ACL rules. For information about QoS classification rules, see ACL and QoS Configuration Guide. Overview IP Security (IPsec) is defined by the IETF to provide interoperable, high-quality, cryptographically-based security for IP communications. It is a Layer 3 VPN technology that transmits data in a secure channel established between two endpoints (such as two security gateways). Such a secure channel is usually called an IPsec tunnel. IPsec is a security framework that comprises a set of protocols, including Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange (IKE), and algorithms for authentication and encryption. AH and ESP are security protocols that provide security services. IKE performs automatic key exchange. IPsec provides the following security services for data packets in the IP layer: • Confidentiality-The sender encrypts packets before transmitting them over the Internet, protecting the packets from being eavesdropped en route. • Data integrity-The receiver verifies the packets received from the sender to make sure they are not tampered with during transmission. • Data origin authentication-The receiver verifies the authenticity of the sender. • Anti-replay-The receiver examines packets and drops outdated and duplicate packets. IPsec delivers the following benefits: • Reduced key negotiation overhead and simplified maintenance by supporting the IKE protocol. IKE provides automatic key negotiation and automatic IPsec security association (SA) setup and maintenance. • Good compatibility. You can apply IPsec to all IP-based application systems and services without modifying them. • Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for flexibility and greatly enhances IP security. Security protocols and encapsulation modes Security protocols IPsec comes with two security protocols, AH and ESP. They define how to encapsulate IP packets and the security services that they can provide. 198

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

198
Configuring IPsec
CAUTION:
If you configure both IPsec and QoS on an interface, make sure the IPsec traffic classification rules match
the QoS traffic classification rules. If the rules do not match, QoS might classify the packets of one IPsec SA
to different queues, causing packets to be sent out of order. When IPsec anti-replay is enabled, IPsec will
drop the incoming packets that are out of the anti-replay window, resulting in packet loss.
IPsec traffic classification rules are determined by the referenced ACL rules. For information about QoS
classification rules, see
ACL and QoS Configuration Guide
.
Overview
IP Security (IPsec) is defined by the IETF to provide interoperable, high-quality, cryptographically-based
security for IP communications. It is a Layer 3 VPN technology that transmits data in a secure channel
established between two endpoints (such as two security gateways). Such a secure channel is usually
called an IPsec tunnel.
IPsec is a security framework that comprises a set of protocols, including Authentication Header (AH),
Encapsulating Security Payload (ESP), Internet Key Exchange (IKE), and algorithms for authentication
and encryption. AH and ESP are security protocols that provide security services. IKE performs automatic
key exchange.
IPsec provides the following security services for data packets in the IP layer:
Confidentiality
—The sender encrypts packets before transmitting them over the Internet, protecting
the packets from being eavesdropped en route.
Data integrity
—The receiver verifies the packets received from the sender to make sure they are not
tampered with during transmission.
Data origin authentication
—The receiver verifies the authenticity of the sender.
Anti-replay
—The receiver examines packets and drops outdated and duplicate packets.
IPsec delivers the following benefits:
Reduced key negotiation overhead and simplified maintenance by supporting the IKE protocol. IKE
provides automatic key negotiation and automatic IPsec security association (SA) setup and
maintenance.
Good compatibility. You can apply IPsec to all IP-based application systems and services without
modifying them.
Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for flexibility
and greatly enhances IP security.
Security protocols and encapsulation modes
Security protocols
IPsec comes with two security protocols, AH and ESP. They define how to encapsulate IP packets and the
security services that they can provide.