HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 39

IKE in Action

Page 39 highlights

exchange and HP Jetdirect recommends all of them except for DH-1. DH-1 is not recommended because it is no longer considered cryptographically "strong". Next, the encryption and authentication parameters are available. 3DES, AES-128, AES-192, and AES-256 are all fine for Encryption. For Authentication, SHA-1 and AES-XCBC are recommended. The SA lifetime for IKE Phase 1 is usually much longer than Phase 2 and is set to 8 hours (28800 seconds) by default. Refer to Figure 30 - IKE Phase 2/Quick Mode. Figure 30 - IKE Phase 2/Quick Mode Here we see the Encapsulation Type - HP Jetdirect recommends Transport for the Intranet. The cryptographic parameters are ESP with 3DES, AES-128, AES-192, or AES-256 as the encryption algorithm and SHA-1 or AES-XCBC as the authentication algorithm. The SA Lifetimes for the IKE Phase 2 SAs are set to 3600 seconds (1 hour) or 100,000 kilobytes, whichever comes first. IKE sure has a lot of parameters to configure! Luckily, HP Jetdirect provides a variety of IKE templates that provide useful default values and keep the administrator from having to configure all of these parameters. HP Jetdirect also provides the Custom IKE template which allows an administrator to configure these parameters should they desire. IKE in Action Well, IKE Phase 2 has been covered, let's see what is next: • An application decided to print data to a printer • The first packet sent to the printer is intercepted within the host's IP stack by IPsec without the application's knowledge • IPsec checks the IPsec policy and determines that the packet needs to be protected by IPsec • IPsec checks the SADB and sees that there are no entries for this packet • IPsec calls on IKE to populate the SADB • IKE establishes an SA for itself by negotiating security parameters, exchanging secret key material, and mutually authenticating both endpoints (via Pre-Shared Key) • Using the SA negotiated by IKE between the initiator and responder, IKE then can safely negotiate two IPsec SAs (IKE Phase 2 also referred to as IKE Quick Mode), one for each data 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

39
exchange and HP Jetdirect recommends all of them except for DH-1.
DH-1 is not recommended
because it is no longer considered cryptographically “strong”.
Next, the encryption and
authentication parameters are available.
3DES, AES-128, AES-192, and AES-256 are all fine for
Encryption.
For Authentication, SHA-1 and AES-XCBC are recommended.
The SA lifetime for IKE
Phase 1 is usually much longer than Phase 2 and is set to 8 hours (28800 seconds) by default.
Refer to Figure 30 – IKE Phase 2/Quick Mode.
Figure 30 – IKE Phase 2/Quick Mode
Here we see the Encapsulation Type – HP Jetdirect recommends Transport for the Intranet.
The
cryptographic parameters are ESP with 3DES, AES-128, AES-192, or AES-256 as the encryption
algorithm and SHA-1 or AES-XCBC as the authentication algorithm.
The SA Lifetimes for the IKE
Phase 2 SAs are set to 3600 seconds (1 hour) or 100,000 kilobytes, whichever comes first.
IKE sure has a lot of parameters to configure!
Luckily, HP Jetdirect provides a variety of IKE templates
that provide useful default values and keep the administrator from having to configure all of these
parameters.
HP Jetdirect also provides the Custom IKE template which allows an administrator to
configure these parameters should they desire.
IKE in Action
Well, IKE Phase 2 has been covered, let’s see what is next:
An application decided to print data to a printer
The first packet sent to the printer is intercepted within the host’s IP stack by IPsec without the
application’s knowledge
IPsec checks the IPsec policy and determines that the packet needs to be protected by IPsec
IPsec checks the SADB and sees that there are no entries for this packet
IPsec calls on IKE to populate the SADB
IKE establishes an SA for itself by negotiating security parameters, exchanging secret key
material, and mutually authenticating both endpoints (via Pre-Shared Key)
Using the SA negotiated by IKE between the initiator and responder, IKE then can safely
negotiate two IPsec SAs (IKE Phase 2 also referred to as IKE Quick Mode), one for each data