HP StorageWorks 4/256 Brocade Fabric OS Command Reference Manual v6.2.0 (53-10 - Page 414
Displays the Security Associations in the local SADB. No, Example 1, IPsec display commands
View all HP StorageWorks 4/256 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 414 highlights
2 ipsecConfig selector Displays IPsec selector parameters including IPsec policy name, IP address of the local entity, IP address of the remote entity, direction of traffic flow (inbound or outbound), upper layer protocol used, and IPsec transform index. transform Displays IPsec transform parameters including IPsec policy name, key management protocol (version) or manual SA, processing option for selected IP traffic, IPsec mode (tunnel or transport), IP address of the local entity, IP address of the remote entity, and SA proposal. sa-proposal Displays the parameters of the SA proposal, including proposal name, lifetime (in seconds and in byte units, or infinite), and associated SA definitions. sa policy ike Displays security association (SA) parameters for the specified IPsec policies including policy names, IPsec protocol used (AH or ESP), encryption and authentication algorithms. Displays the IKE policy configuration. No subtype is required with this command. The command displays the following IKE policy parameters: IKE version, IP address of the remote entity, IP address of the local entity, encryption algorithm, hash algorithm, PRF algorithm, DH group, authentication method, path and filename of the pre-shared key. manual-sa arguments -a -tag name Displays the Security Associations in the local SADB. No subtype is required with this command. Specifies the display selection as one of the following: Displays all configuration information for the specified type and subtype. Displays configuration information for the specified IPsec policy only. Examples --help Displays command usage. Optionally use --help with a specified command, type, and subtype to display the syntax for specific commands. Do not include a double dash when specifying the command. 1. "Example 1" - Configure an IPsec policy using AH protection with MD5 and configure IKE with pre-shared keys. 2. "Example 2" - Configure an IPsec policy using ESP protection with 3DES_CBC encryption and SHA1 authentication, and configure IKE with RSA signed certificates. 3. "Example 3" - Configure an IPsec policy using AH with SHA1 and ESP protection with 3DES and configure IKE with pre-shared keys. 4. "Example 4" - Secure traffic between two systems using protection with MD5 and Manually keyed SAs. 5. "IPsec display commands" - Verify your IPsec configurations. 6. "Using the help command" - Use the help command with arguments to get syntax information on specific parameters. 386 Fabric OS Command Reference 53-1001186-01