HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 8

Configuring FIPS mode, Conditional self-tests, vi

Page 8 highlights

Configuring FIPS 191 Overview 191 Configuration restrictions and guidelines 191 Configuring FIPS mode 192 Entering FIPS mode 192 Configuration changes in FIPS mode 193 FIPS self-tests 194 Power-up self-tests 194 Conditional self-tests 194 Triggering self-tests 194 Displaying and maintaining FIPS 195 FIPS configuration examples 195 Entering FIPS mode through automatic reboot 195 Entering FIPS mode through manual reboot 196 Configuring IPsec 198 Overview 198 Security protocols and encapsulation modes 198 Security association 200 Authentication and encryption 200 IPsec implementation 201 Protocols and standards 202 FIPS compliance 202 IPsec tunnel establishment 202 Implementing ACL-based IPsec 202 Feature restrictions and guidelines 202 ACL-based IPsec configuration task list 202 Configuring an ACL 203 Configuring an IPsec transform set 204 Configuring a manual IPsec policy 206 Configuring an IKE-based IPsec policy 207 Applying an IPsec policy to an interface 211 Enabling ACL checking for de-encapsulated packets 212 Configuring the IPsec anti-replay function 212 Binding a source interface to an IPsec policy 213 Enabling QoS pre-classify 213 Enabling logging of IPsec packets 214 Configuring the DF bit of IPsec packets 214 Displaying and maintaining IPsec 215 IPsec configuration examples 216 Configuring a manual mode IPsec tunnel for IPv4 packets 216 Configuring an IKE-based IPsec tunnel for IPv4 packets 218 Configuring IKE 222 Overview 222 IKE negotiation process 222 IKE security mechanism 223 Protocols and standards 224 FIPS compliance 224 IKE configuration prerequisites 224 IKE configuration task list 224 Configuring an IKE profile 225 Configuring an IKE proposal 227 Configuring an IKE keychain 228 Configuring the global identity information 229 vi

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

vi
Configuring FIPS······················································································································································ 191
Overview······································································································································································· 191
Configuration restrictions and guidelines ·················································································································· 191
Configuring FIPS mode
················································································································································ 192
Entering FIPS mode ············································································································································· 192
Configuration changes in FIPS mode ················································································································ 193
FIPS self-tests ································································································································································· 194
Power-up self-tests ················································································································································ 194
Conditional self-tests
············································································································································ 194
Triggering self-tests ·············································································································································· 194
Displaying and maintaining FIPS ······························································································································· 195
FIPS configuration examples ······································································································································· 195
Entering FIPS mode through automatic reboot ································································································· 195
Entering FIPS mode through manual reboot ····································································································· 196
Configuring IPsec ···················································································································································· 198
Overview······································································································································································· 198
Security protocols and encapsulation modes ··································································································· 198
Security association············································································································································· 200
Authentication and encryption ··························································································································· 200
IPsec implementation ··········································································································································· 201
Protocols and standards ····································································································································· 202
FIPS compliance ··························································································································································· 202
IPsec tunnel establishment ··········································································································································· 202
Implementing ACL-based IPsec ··································································································································· 202
Feature restrictions and guidelines ···················································································································· 202
ACL-based IPsec configuration task list ············································································································· 202
Configuring an ACL ············································································································································ 203
Configuring an IPsec transform set ···················································································································· 204
Configuring a manual IPsec policy···················································································································· 206
Configuring an IKE-based IPsec policy ············································································································· 207
Applying an IPsec policy to an interface ·········································································································· 211
Enabling ACL checking for de-encapsulated packets······················································································ 212
Configuring the IPsec anti-replay function ········································································································ 212
Binding a source interface to an IPsec policy ·································································································· 213
Enabling QoS pre-classify ·································································································································· 213
Enabling logging of IPsec packets····················································································································· 214
Configuring the DF bit of IPsec packets ············································································································ 214
Displaying and maintaining IPsec ······························································································································ 215
IPsec configuration examples······································································································································ 216
Configuring a manual mode IPsec tunnel for IPv4 packets ············································································ 216
Configuring an IKE-based IPsec tunnel for IPv4 packets ················································································· 218
Configuring IKE ······················································································································································· 222
Overview······································································································································································· 222
IKE negotiation process ······································································································································ 222
IKE security mechanism······································································································································· 223
Protocols and standards ····································································································································· 224
FIPS compliance ··························································································································································· 224
IKE configuration prerequisites ··································································································································· 224
IKE configuration task list ············································································································································ 224
Configuring an IKE profile ·········································································································································· 225
Configuring an IKE proposal ······································································································································ 227
Configuring an IKE keychain ······································································································································ 228
Configuring the global identity information ·············································································································· 229