HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 236

Configuring an IKE proposal

Page 236 highlights

Step Command 10. Specify an inside VPN instance. inside-vpn vpn-instance vpn-name 11. Specify a priority for the IKE profile. priority number Remarks By default, no inside VPN instance is specified for an IKE profile, and the device forwards protected data to the VPN instance with the same name as the VPN instance on the external network. By default, the priority of an IKE profile is 100. Configuring an IKE proposal An IKE proposal defines a set of attributes describing how IKE negotiation in phase 1 should take place. You can create multiple IKE proposals with different priorities. The priority of an IKE proposal is represented by its sequence number. The lower the sequence number, the higher the priority. Two peers must have at least one matching IKE proposal for successful IKE negotiation. During IKE negotiation: • The initiator sends its IKE proposals to the peer. { If the initiator is using an IPsec with an IKE profile, the initiator sends all IKE proposals referenced by the IKE profile to the peer. An IKE proposal specified earlier for the IKE profile has a higher priority. { If the initiator is using an IPsec with no IKE profile, the initiator sends all its IKE proposals to the peer. An IKE proposal with a smaller number has a higher priority. • The peer searches its own IKE proposals for a match. The search starts from the IKE proposal with the highest priority and proceeds in the descending order of priority until a match is found. The matching IKE proposals are used to establish the IKE SA. If all user-defined IKE proposals are found mismatching, the two peers use their default IKE proposals to establish the IKE SA. Two matching IKE proposals have the same encryption algorithm, authentication method, authentication algorithm, and DH group. The SA lifetime takes the smaller one of the two proposals' SA lifetime settings. To configure an IKE proposal: Step 1. Enter system view. Command system-view Remarks N/A 2. Create an IKE proposal and enter its view. ike proposal proposal-number By default, there is an IKE proposal that is used as the default IKE proposal. 3. Specify an encryption algorithm for the IKE proposal. encryption-algorithm { 3des-cbc | aes-cbc-128 | aes-cbc-192 | aes-cbc-256 | des-cbc } By default, an IKE proposal uses the 56-bit DES encryption algorithm in CBC mode in non-FIPS mode and 128-bit AES encryption algorithm in FIPS mode. 4. Specify an authentication method for the IKE proposal. authentication-method { dsa-signature | pre-share | rsa-signature } By default, an IKE proposal uses the pre-shared key authentication method. 227

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

227
Step
Command
Remarks
10.
Specify an inside VPN
instance.
inside-vpn
vpn-instance
vpn-name
By default, no inside VPN
instance is specified for an IKE
profile, and the device forwards
protected data to the VPN
instance with the same name as
the VPN instance on the
external network.
11.
Specify a priority for the IKE
profile.
priority
number
By default, the priority of an IKE
profile is 100.
Configuring an IKE proposal
An IKE proposal defines a set of attributes describing how IKE negotiation in phase 1 should take place.
You can create multiple IKE proposals with different priorities. The priority of an IKE proposal is
represented by its sequence number. The lower the sequence number, the higher the priority.
Two peers must have at least one matching IKE proposal for successful IKE negotiation. During IKE
negotiation:
The initiator sends its IKE proposals to the peer.
{
If the initiator is using an IPsec with an IKE profile, the initiator sends all IKE proposals
referenced by the IKE profile to the peer. An IKE proposal specified earlier for the IKE profile has
a higher priority.
{
If the initiator is using an IPsec with no IKE profile, the initiator sends all its IKE proposals to the
peer. An IKE proposal with a smaller number has a higher priority.
The peer searches its own IKE proposals for a match. The search starts from the IKE proposal with
the highest priority and proceeds in the descending order of priority until a match is found. The
matching IKE proposals are used to establish the IKE SA. If all user-defined IKE proposals are found
mismatching, the two peers use their default IKE proposals to establish the IKE SA.
Two matching IKE proposals have the same encryption algorithm, authentication method, authentication
algorithm, and DH group. The SA lifetime takes the smaller one of the two proposals' SA lifetime settings.
To configure an IKE proposal:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create an IKE proposal and
enter its view.
ike
proposal
proposal-number
By default, there is an IKE
proposal that is used as the
default IKE proposal.
3.
Specify an encryption
algorithm for the IKE
proposal.
encryption-algorithm
{
3des-cbc
|
aes-cbc-128
|
aes-cbc-192
|
aes-cbc-256
|
des-cbc
}
By default, an IKE proposal uses
the 56-bit DES encryption
algorithm in CBC mode in
non-FIPS mode and 128-bit AES
encryption algorithm in FIPS
mode.
4.
Specify an authentication
method for the IKE proposal.
authentication-method
{
dsa-signature
| pre-share | rsa-signature
}
By default, an IKE proposal uses
the pre-shared key authentication
method.