HP AE370A Brocade Web Tools Administrator's Guide v6.0.0 (53-1000606-01, April - Page 219

Configuring an FCIP interswitch/interfabric link, Configuring an IKE or IPSEC Policy

Page 219 highlights

Configuring an FCIP interswitch/interfabric link 17 TABLE 12 Field IKE/IPSec Configuration Choices (Continued) Description Choices Diffie-Hellman (D-H) Diffie-Hellman key exchange is a cryptographic protocol that allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher IKE 1 or 14 IPSec disabled Security Association Lifetime This specifies the lifetime in seconds of the security association and a new key will be renegotiated before this value expires if PFS is on. The security association will expire when either this value or the value lifetime is reached. Specify the number of seconds Configuring an FCIP interswitch/interfabric link Perform the following tasks in the order indicated to configure FCIP interswitch/interfabric link: 1. (Optional) "Configuring an IKE or IPSEC Policy" on page 199. If you are planning to use IPSec, you must configure the policies first. 2. "Configuring Virtual Ports" on page 200. 3. "Interfaces, Routes, and Tunnels" on page 201. Use the wizard to perform the following tasks: a. Defining the IP interfaces of the GbE port. b. Adding IP routes on the GbE port (optional). c. Configuring FCIP tunnels. 4. "Enabling Persistently Disabled Ports" on page 203. Enabling the two VE_ports at this juncture will merge the two fabrics. You must configure and enable both the local and remote switch ports to use the FCIP ISL/IFL. NOTE Admin Domain membership is required to configure IP interfaces, routes, and tunnels. Configuring an IKE or IPSEC Policy Before you begin to create an FCIP interswitch/interfabric link, you need to determine whether to implement an IKE/IPSec policy. Once you begin to create the tunnels with the wizard, you must provide the IKE/IPSec policy information. If you choose not to implement an IKE/IPSec policy, you can always choose No Policy from the drop-down menu in the FCIP tunnel wizard. You must create an IKE policy and an IPSec policy to apply IPSec to an FCIP tunnel. 1. Open the Switch Administration window. 2. Select the Security Policies tab. 3. Click IPSec Policies on the Security Policies menu. Web Tools Administrator's Guide 199 53-1000606-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272

Web Tools Administrator’s Guide
199
53-1000606-01
Configuring an FCIP interswitch/interfabric link
17
Configuring an FCIP interswitch/interfabric link
Perform the following tasks in the order indicated to configure
FCIP interswitch/interfabric link:
1.
(Optional)
“Configuring an IKE or IPSEC Policy”
on page 199.
If you are planning to use IPSec, you must configure the policies first.
2.
“Configuring Virtual Ports”
on page 200.
3.
“Interfaces, Routes, and Tunnels”
on page 201.
Use the wizard to perform the following tasks:
a.
Defining the IP interfaces of the GbE port.
b.
Adding IP routes on the GbE port (
optional
).
c.
Configuring FCIP tunnels.
4.
“Enabling Persistently Disabled Ports”
on page 203.
Enabling the two VE_ports at this juncture will merge the two fabrics. You must configure and
enable both the local and remote switch ports to use the FCIP ISL/IFL.
NOTE
Admin Domain membership is required to configure IP interfaces, routes, and tunnels.
Configuring an IKE or IPSEC Policy
Before you begin to create an FCIP interswitch/interfabric link, you need to determine whether to
implement an IKE/IPSec policy. Once you begin to create the tunnels with the wizard, you must
provide the IKE/IPSec policy information. If you choose not to implement an IKE/IPSec policy, you
can always choose No Policy from the drop-down menu in the FCIP tunnel wizard. You must create
an IKE policy and an IPSec policy to apply IPSec to an FCIP tunnel.
1.
Open the
Switch Administration
window.
2.
Select the
Security Policies
tab.
3.
Click
IPSec Policies
on the
Security Policies
menu.
Diffie-Hellman (D-H)
Diffie-Hellman key exchange is a cryptographic protocol
that allows two parties that have no prior knowledge of
each other to jointly establish a shared secret key over
an insecure communications channel. This key can then
be used to encrypt subsequent communications using a
symmetric key cipher
IKE 1 or 14
IPSec disabled
Security Association Lifetime
This specifies the lifetime in seconds of the security
association and a new key will be renegotiated before
this value expires if PFS is on. The security association
will expire when either this value or the value lifetime is
reached.
Specify the number of
seconds
TABLE 12
IKE/IPSec Configuration Choices
(Continued)
Field
Description
Choices