HP AE370A Brocade Web Tools Administrator's Guide v6.0.0 (53-1000606-01, April - Page 218

FCIP-related features, IKE/IPSec, Understanding the FCIP Tunneling Service

Page 218 highlights

17 Understanding the FCIP Tunneling Service FCIP-related features Web Tools provides or supports these related features: • A per-tunnel compression feature that allows the Fibre Channel data frames to be compressed before they are sent over the tunnel as FCIP frames. • Fastwrite, which is a feature that reduces the number of round-trip times required to complete a SCSI write I/O and increases performance. • Tape pipelining which reduces the number of round trip times required to complete a SCSI write I/O and eliminates the sequential nature of the SCSI I/O. • IKE/IPSec Policy, which is a framework of open standards to ensure private, secure communications over IP networks through the use of cryptographic security services. IKE (Internet Key Exchange) is the protocol used to set up a Security Association in the IPSec protocol suite. NOTE You need an IPSec license to enable and use this feature. IKE/IPSec IKE/IPSec is not supported with the following protocols: • IPv6 • ESP in transport mode • NAT Traversal Table 12 explains the fields and related choices to create an IKE/IPSec policy. TABLE 12 IKE/IPSec Configuration Choices Field Description Choices Policy Type Policy Number Encryption Algorithm Authentication Algorithm Perfect Forward Secrecy (PFS) You can create either an IKE policy or an IPSec policy IKE IPSec This parameter helps you keep track of the number of policies you have created on your switch. You can choose any number from 1 through 32. You can define up to 32 IKE and 32 IPSec policies per switch. 1 through 32 A mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. 3DES AES-128 AES-256 An encryption process or tool in which the results of text SHA-1 encryption depend on all relevant authentication MD5 elements. AES-XCBC In an authenticated key agreement protocol that uses public key cryptography, PFS is the property of disclosure of the long-term secret keying material that is used to derive an agreed ephemeral key that does not compromise the secrecy of the agreed keys from earlier runs. IKE on/off IPSec disabled 198 Web Tools Administrator's Guide 53-1000606-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272

198
Web Tools Administrator’s Guide
53-1000606-01
Understanding the FCIP Tunneling Service
17
FCIP-related features
Web Tools provides or supports these related features:
A per-tunnel compression feature that allows the Fibre Channel data frames to be compressed
before they are sent over the tunnel as FCIP frames.
Fastwrite, which is a feature that reduces the number of round-trip times required to complete
a SCSI write I/O and increases performance.
Tape pipelining which reduces the number of round trip times required to complete a SCSI
write I/O and eliminates the sequential nature of the SCSI I/O.
IKE/IPSec Policy, which is a framework of open standards to ensure private, secure
communications over IP networks through the use of cryptographic security services. IKE
(Internet Key Exchange) is the protocol used to set up a Security Association in the IPSec
protocol suite.
NOTE
You need an IPSec license to enable and use this feature.
IKE/IPSec
IKE/IPSec is not supported with the following protocols:
IPv6
ESP in transport mode
NAT Traversal
Table 12
explains the fields and related choices to create an IKE/IPSec policy.
TABLE 12
IKE/IPSec Configuration Choices
Field
Description
Choices
Policy Type
You can create either an IKE policy or an IPSec policy
IKE
IPSec
Policy Number
This parameter helps you keep track of the number of
policies you have created on your switch. You can
choose any number from 1 through 32. You can define
up to 32 IKE and 32 IPSec policies per switch.
1 through 32
Encryption Algorithm
A mathematical procedure for performing encryption on
data. Through the use of an algorithm, information is
made into meaningless cipher text and requires the use
of a key to transform the data back into its original form.
3DES
AES-128
AES-256
Authentication Algorithm
An encryption process or tool in which the results of text
encryption depend on all relevant authentication
elements.
SHA-1
MD5
AES-XCBC
Perfect Forward Secrecy
(PFS)
In an authenticated key agreement protocol that uses
public key cryptography, PFS is the property of
disclosure of the long-term secret keying material that is
used to derive an agreed ephemeral key that does not
compromise the secrecy of the agreed keys from earlier
runs.
IKE on/off
IPSec disabled