HP StorageWorks 8/20q HP StorageWorks 8/20q Fibre Channel Switch Command Line - Page 29

Managing IP security, IP security concepts, Uses of security policies - 8 base san switch

Page 29 highlights

Managing IP security To modify IP security, you must open an Admin session with the admin start command, then open an Ipsec Edit session with the ipsec edit command. The Admin session prevents other accounts from making changes at the same time through Telnet, Simple SAN Connection Manager, or any other management application. The Ipsec Edit session provides access to the ipsec, ipsec association and ipsec policy commands with which you make modifications to the IP security configuration, as shown in the following example: 8/20q FC Switch #> admin start 8/20q FC Switch (admin) #> ipsec edit 8/20q FC Switch (admin-ipsec)#> ipsec . . . 8/20q FC Switch (admin-ipsec)#> ipsec policy . . . 8/20q FC Switch (admin-ipsec)#> ipsec association. . . The ipsec save command saves the changes you made during the Ipsec Edit session. Changes take effect immediately. 8/20q FC Switch (admin-ipsec)#> ipsec save To close the Ipsec Edit session without saving changes, enter the ipsec cancel command. 8/20q FC Switch (admin-ipsec)#> ipsec cancel The admin end command releases the Admin session for other administrators when you are finished making changes to the switch. To remove all IP security policies and associations, enter the reset ipsec command. 8/20q FC Switch (admin) #> reset ipsec The following subsections describe IP security concepts and IP security management tasks: • IP security concepts, page 29 • Displaying IP security information, page 30 • Managing the security policy database, page 31 • Managing the security association database, page 34 • Resetting the IP security configuration, page 37 IP security concepts IP security provides encryption-based security for IPv4 and IPv6 communications through the use of security policies and associations. Security policies are located in the security policy database and define the following parameters: • Connection source and destination • Data traffic direction: inbound or outbound • Protocols for which to protect data traffic • Security protocols; Authentication Header (AH) or Encapsulating Security Payload (ESP) • Level of protection: IP Security, discard, or none Security associations are located in the security association database and define the encryption algorithm and encryption key to apply when called by a security policy. A security policy may call several associations at different times, but each association is related to only one policy. Uses of security policies Policies can define security for host-to-host, host-to-gateway, and gateway-to-gateway connections; providing one policy for each direction. For example, to secure the connection between two hosts, you need two policies: one for outbound traffic from the source to the destination, and another for inbound traffic to the source from the destination. You can specify sources and destinations by IP addresses (version 4 or 6) or DNS host names. If a host name resolves to more than one IP address, the switch creates the necessary policies and associations. You can recognize these dynamic policies and associations because their names begin with DynamicSP_ and DynamicSA_ respectively. 8/20q Fibre Channel Switch Command Line Interface Guide 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332

8/20q Fibre Channel Switch Command Line Interface Guide
29
Managing IP security
To modify IP security, you must open an Admin session with the
admin start
command, then open an
Ipsec Edit session with the
ipsec edit
command. The Admin session prevents other accounts from
making changes at the same time through Telnet, Simple SAN Connection Manager, or any other
management application. The Ipsec Edit session provides access to the
ipsec
,
ipsec association
and
ipsec policy
commands with which you make modifications to the IP security configuration, as
shown in the following example:
8/20q FC Switch #> admin start
8/20q FC Switch (admin) #> ipsec edit
8/20q FC Switch (admin-ipsec)#> ipsec . . .
8/20q FC Switch (admin-ipsec)#> ipsec policy . . .
8/20q FC Switch (admin-ipsec)#> ipsec association. . .
The
ipsec save
command saves the changes you made during the Ipsec Edit session. Changes take
effect immediately.
8/20q FC Switch (admin-ipsec)#> ipsec save
To close the Ipsec Edit session without saving changes, enter the
ipsec cancel
command.
8/20q FC Switch (admin-ipsec)#> ipsec cancel
The
admin end
command releases the Admin session for other administrators when you are finished
making changes to the switch.
To remove all IP security policies and associations, enter the
reset ipsec
command.
8/20q FC Switch (admin) #> reset ipsec
The following subsections describe IP security concepts and IP security management tasks:
IP security concepts
, page 29
Displaying IP security information
, page 30
Managing the security policy database
, page 31
Managing the security association database
, page 34
Resetting the IP security configuration
, page 37
IP security concepts
IP security provides encryption-based security for IPv4 and IPv6 communications through the use of security
policies and associations. Security policies are located in the security policy database and define the
following parameters:
Connection source and destination
Data traffic direction: inbound or outbound
Protocols for which to protect data traffic
Security protocols; Authentication Header (AH) or Encapsulating Security Payload (ESP)
Level of protection: IP Security, discard, or none
Security associations are located in the security association database and define the encryption algorithm
and encryption key to apply when called by a security policy. A security policy may call several
associations at different times, but each association is related to only one policy.
Uses of security policies
Policies can define security for host-to-host, host-to-gateway, and gateway-to-gateway connections;
providing one policy for each direction. For example, to secure the connection between two hosts, you
need two policies: one for outbound traffic from the source to the destination, and another for inbound
traffic to the source from the destination. You can specify sources and destinations by IP addresses (version
4 or 6) or DNS host names. If a host name resolves to more than one IP address, the switch creates the
necessary policies and associations. You can recognize these dynamic policies and associations because
their names begin with
DynamicSP_
and
DynamicSA_
respectively.