HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 233

PFS, Protocols and standards, FIPS compliance, IKE configuration prerequisites

Page 233 highlights

PFS The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. After PFS is enabled, an additional DH exchange is performed in IKE phase 2 to make sure negotiated keys have no derivative relations and a broken key brings no threats to other keys. Protocols and standards • RFC 2408, Internet Security Association and Key Management Protocol (ISAKMP) • RFC 2409, The Internet Key Exchange (IKE) • RFC 2412, The OAKLEY Key Determination Protocol FIPS compliance The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode (see "Configuring FIPS") and non-FIPS mode. IKE configuration prerequisites Determine the following parameters prior to IKE configuration: • The algorithms to be used during IKE negotiation, including the identity authentication method, encryption algorithm, authentication algorithm, and DH group. { Different algorithms provide different levels of protection. A stronger algorithm provides more resistance to decryption but uses more resources. Generally, an algorithm with a longer key is stronger. { A DH group that uses more bits provides higher security but needs more time. • The IKE-based IPsec policies for the communicating peers. If an IPsec policy does not reference any IKE profile, the device selects an IKE profile for the IPsec policy. If no IKE profile is configured, the globally configured IKE settings are used. For more information about IPsec, see "Configuring an IKE-based IPsec policy." IKE configuration task list Tasks at a glance (Optional.) Configuring an IKE profile (Optional.) Configuring an IKE proposal (Optional.) Configuring an IKE keychain (Optional.) Configuring the global identity information (Optional.) Configuring the IKE keepalive function (Optional.) Configuring the IKE NAT keepalive function (Optional.) Configuring IKE DPD 224 Remarks N/A Required when the IKE profile needs to reference IKE proposals. Required when pre-shared authentication is used in IKE negotiation phase 1. N/A N/A N/A N/A

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

224
PFS
The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. After PFS is
enabled, an additional DH exchange is performed in IKE phase 2 to make sure negotiated keys have no
derivative relations and a broken key brings no threats to other keys.
Protocols and standards
RFC 2408,
Internet Security Association and Key Management Protocol (ISAKMP)
RFC 2409,
The Internet Key Exchange (IKE)
RFC 2412,
The OAKLEY Key Determination Protocol
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features,
commands, and parameters might differ in FIPS mode (see "
Configuring FIPS
") and non-FIPS mode.
IKE configuration prerequisites
Determine the following parameters prior to IKE configuration:
The algorithms to be used during IKE negotiation, including the identity authentication method,
encryption algorithm, authentication algorithm, and DH group.
{
Different algorithms provide different levels of protection. A stronger algorithm provides more
resistance to decryption but uses more resources. Generally, an algorithm with a longer key is
stronger.
{
A DH group that uses more bits provides higher security but needs more time.
The IKE-based IPsec policies for the communicating peers. If an IPsec policy does not reference any
IKE profile, the device selects an IKE profile for the IPsec policy. If no IKE profile is configured, the
globally configured IKE settings are used. For more information about IPsec, see "
Configuring an
IKE-based IPsec policy.
"
IKE configuration task list
Tasks at a glance
Remarks
(Optional.)
Configuring an IKE profile
N/A
(Optional.)
Configuring an IKE proposal
Required when the IKE profile needs to
reference IKE proposals.
(Optional.)
Configuring an IKE keychain
Required when pre-shared authentication is
used in IKE negotiation phase 1.
(Optional.)
Configuring the global identity information
N/A
(Optional.)
Configuring the IKE keepalive function
N/A
(Optional.)
Configuring the IKE NAT keepalive function
N/A
(Optional.)
Configuring IKE DPD
N/A