HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 234

Configuring an IKE profile

Page 234 highlights

Tasks at a glance (Optional.) Enabling invalid SPI recovery (Optional.) Setting the limit on the number of IKE SAs Remarks N/A N/A Configuring an IKE profile An IKE profile is intended to provide a set of parameters for IKE negotiation. To configure an IKE profile, you can do the following: 1. Configure peer IDs. During IKE negotiation, when an end needs to select an IKE profile, it matches the received peer ID against the peer IDs of its local IKE profiles. If a match is found, it uses the IKE profile with the peer ID for IKE negotiation. 2. Configure the IKE keychain. 3. Specify the negotiation mode (main or aggressive) that the device uses as the initiator. When the device acts as the responder, it uses the IKE negotiation mode of the initiator. 4. Specifies the IKE proposals that the device can use as the initiator. An IKE proposal specified earlier has a higher priority. When the device acts as the responder, it uses the IKE proposals configured in system view to match the IKE proposals received from the initiator. 5. Configure the local ID, the ID that the device uses to identify itself to the peer during IKE negotiation: { For digital signature authentication, the device can use any type of ID. If the local ID is an IP address that is different from the IP address in the local certificate, the device uses the FQDN (the device name configured by using the sysname command) instead. { For pre-shared key authentication, the device can use any type of ID other than the DN. 6. Configure the IKE DPD function to detect dead IKE peers. You can also configure this function in system view. The IKE DPD settings configured in IKE profile takes precedence over those configured in system view. 7. Specify a local interface or IP address for the IKE profile so the profile can be applied only to the specified interface or IP address. For this task, specify the local address configured in IPsec policy or IPsec policy template view (using the local-address command). If no local address is configured, specify the IP address of the interface referencing the IPsec policy. 8. Specify a priority number for the IKE profile. To determine the priority of an IKE profile: a. First, the device examines the existence of the match local address command. An IKE profile with the match local address command configured has a higher priority. b. If a tie exists, the device compares the priority numbers. An IKE profile with a smaller priority number has a higher priority. c. If a tie still exists, the device prefers an IKE profile configured earlier. To configure an IKE profile: Step 1. Enter system view. 2. Create an IKE profile and enter its view. Command system-view ike profile profile-name Remarks N/A By default, no IKE profile is configured. 225

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

225
Tasks at a glance
Remarks
(Optional.)
Enabling invalid SPI recovery
N/A
(Optional.)
Setting the limit on the number of IKE SAs
N/A
Configuring an IKE profile
An IKE profile is intended to provide a set of parameters for IKE negotiation. To configure an IKE profile,
you can do the following:
1.
Configure peer IDs. During IKE negotiation, when an end needs to select an IKE profile, it matches
the received peer ID against the peer IDs of its local IKE profiles. If a match is found, it uses the IKE
profile with the peer ID for IKE negotiation.
2.
Configure the IKE keychain.
3.
Specify the negotiation mode (main or aggressive) that the device uses as the initiator. When the
device acts as the responder, it uses the IKE negotiation mode of the initiator.
4.
Specifies the IKE proposals that the device can use as the initiator. An IKE proposal specified
earlier has a higher priority. When the device acts as the responder, it uses the IKE proposals
configured in system view to match the IKE proposals received from the initiator.
5.
Configure the local ID, the ID that the device uses to identify itself to the peer during IKE
negotiation:
{
For digital signature authentication, the device can use any type of ID. If the local ID is an IP
address that is different from the IP address in the local certificate, the device uses the FQDN
(the device name configured by using the
sysname
command) instead.
{
For pre-shared key authentication, the device can use any type of ID other than the DN.
6.
Configure the IKE DPD function to detect dead IKE peers. You can also configure this function in
system view. The IKE DPD settings configured in IKE profile takes precedence over those
configured in system view.
7.
Specify a local interface or IP address for the IKE profile so the profile can be applied only to the
specified interface or IP address. For this task, specify the local address configured in IPsec policy
or IPsec policy template view (using the
local-address
command). If no local address is configured,
specify the IP address of the interface referencing the IPsec policy.
8.
Specify a priority number for the IKE profile. To determine the priority of an IKE profile:
a.
First, the device examines the existence of the
match local address
command. An IKE profile
with the
match local address
command configured has a higher priority.
b.
If a tie exists, the device compares the priority numbers. An IKE profile with a smaller priority
number has a higher priority.
c.
If a tie still exists, the device prefers an IKE profile configured earlier.
To configure an IKE profile:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create an IKE profile and
enter its view.
ike profile
profile-name
By default, no IKE profile is
configured.