HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 214

Optional. Enable the Perfect, Forward Secrecy PFS feature

Page 214 highlights

Step 4. Specify the security algorithms. Command • Specify the encryption algorithm for ESP in non-FIPS mode: esp encryption-algorithm { 3des-cbc | aes-cbc-128 | aes-cbc-192 | aes-cbc-256 | des-cbc | null } * • Specify the encryption algorithm for ESP in FIPS mode: esp encryption-algorithm { aes-cbc-128 | aes-cbc-192 | aes-cbc-256 } * • Specify the authentication algorithm for ESP in non-FIPS mode: esp authentication-algorithm { md5 | sha1 } * • Specify the authentication algorithm for ESP in FIPS mode: esp authentication-algorithm sha1 • Specify the authentication algorithm for AH in non-FIPS mode: ah authentication-algorithm { md5 | sha1 } * • Specify the authentication algorithm for AH in FIPS mode: ah authentication-algorithm sha1 Remarks Configure at least one command. By default, no security algorithm is specified. You can specify security algorithms for a security protocol only when the security protocol is used by the transform set. For example, you can specify the ESP-specific security algorithms only when you select ESP or AH-ESP as the security protocol. For ESP, you must specify both the authentication and encryption algorithms. You can specify multiple algorithms by using one command, and the algorithm specified earlier has a higher priority. 5. Specify the mode in which the security protocol encapsulates encapsulation-mode { transport | IP packets. tunnel } By default, the security protocol encapsulates IP packets in tunnel mode. The transport mode applies only when the source and destination IP addresses of data flows match those of the IPsec tunnel. IPsec for IPv6 routing protocols supports only the transport mode. By default, the PFS feature is not used for SA negotiation. For more information about PFS, • In non-FIPS mode: see "Configuring IKE." 6. (Optional.) Enable the Perfect Forward Secrecy (PFS) feature for the IPsec policy. pfs { dh-group1 | dh-group2 | dh-group5 | dh-group14 | dh-group24 } The security level of local Diffie-Hellman group must be higher than or equal that of the • In FIPS mode: peer. pfs dh-group14 The end without the PFS feature performs SA negotiation according to the PFS requirements of the peer end. 205

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

205
Step
Command
Remarks
4.
Specify the security
algorithms.
Specify the encryption
algorithm for ESP in non-FIPS
mode:
esp encryption-algorithm
{
3des-cbc
|
aes-cbc-128
|
aes-cbc-192
|
aes-cbc-256
|
des-cbc
|
null
}
*
Specify the encryption
algorithm for ESP in FIPS mode:
esp encryption-algorithm
{
aes-cbc-128
|
aes-cbc-192
|
aes-cbc-256
}
*
Specify the authentication
algorithm for ESP in non-FIPS
mode:
esp authentication-algorithm
{
md5
|
sha1
}
*
Specify the authentication
algorithm for ESP in FIPS mode:
esp authentication-algorithm
sha1
Specify the authentication
algorithm for AH in non-FIPS
mode:
ah authentication-algorithm
{
md5
|
sha1
}
*
Specify the authentication
algorithm for AH in FIPS mode:
ah authentication-algorithm
sha1
Configure at least one command.
By default, no security algorithm is
specified.
You can specify security algorithms
for a security protocol only when
the security protocol is used by the
transform set. For example, you
can specify the ESP-specific
security algorithms only when you
select ESP or AH-ESP as the security
protocol.
For ESP, you must specify both the
authentication and encryption
algorithms.
You can specify multiple
algorithms by using one command,
and the algorithm specified earlier
has a higher priority.
5.
Specify the mode in which the
security protocol encapsulates
IP packets.
encapsulation-mode
{
transport
|
tunnel
}
By default, the security protocol
encapsulates IP packets in tunnel
mode.
The transport mode applies only
when the source and destination IP
addresses of data flows match
those of the IPsec tunnel.
IPsec for IPv6 routing protocols
supports only the transport mode.
6.
(Optional.) Enable the Perfect
Forward Secrecy (PFS) feature
for the IPsec policy.
In non-FIPS mode:
pfs
{
dh-group1
|
dh-group2
|
dh-group5
|
dh-group14
|
dh-group24
}
In FIPS mode:
pfs dh-group14
By default, the PFS feature is not
used for SA negotiation.
For more information about PFS,
see "Configuring IKE."
The
security
level
of
local
Diffie-Hellman group must be
higher than or equal that of the
peer.
The end without the PFS feature
performs SA negotiation according
to the PFS requirements of the peer
end.