Creating Layer 2 Point-to-Point Policies
ETEP CLI User Guide
63
How the ETEP Encrypts and Authenticates Layer 2
Traffic
When operating as a Layer 2 encryptor in a negotiated policy, the ETEP’s encapsulation mode (CE-ESP)
authenticates the encrypted frame’s Ethernet payload. The ETEP uses the AES algorithm with 256-bit
keys to encrypt the Ethernet payload. The HMAC-SHA-1 authentication algorithm provides the data
origin authentication and data integrity.
Figure 9
Layer 2 encrypted frame format
To encrypt traffic, ETEPs must establish
security associations
(SAs). A security association defines the
processing to be done on a specific packet. It associates security services and a key with the traffic to be
protected and the remote peer with whom secured traffic is being exchanged. The SA is a unidirectional
secure tunnel through which data passes between the two appliances. Each secure connection has two
SAs, one for each direction. SAs are identified by a value called an SPI.
In point-to-point Layer 2 configurations the SAs are automatically negotiated using IKE. Timeout values
force the IKE protocol to renegotiate the IKE Phase 1 and Phase 2 keys periodically. The ETEP can uses
a preshared key for
authentication in IKE negotiations.
When encrypting traffic the ETEP uses the values shown in
. These values are
hard-coded and cannot be modified by the user.
Table 30 IKE Phase 1 Parameters
Parameter
Value
Cipher algorithm
AES-256
Hash algorithm
HMAC-SHA-1
Diffie-Hellman group
5
Lifetime
24 hours
Negotiation mode
Main mode
Table 31 IKE Phase 2 Parameters
Parameter
Value
Cipher algorithm
AES-256
Hash algorithm
HMAC-SHA-1
PFS Diffie-Hellman group
5
Lifetime
One hour
Negotiation mode
Main mode
Summary of Contents for ET0010A
Page 7: ...8 ETEP CLI User Guide Contents...
Page 15: ...Getting Started 16 ETEP CLI User Guide...
Page 33: ...User Administration 34 ETEP CLI User Guide...
Page 55: ...Configuring the ETEP 56 ETEP CLI User Guide...
Page 97: ...Creating Policies 98 ETEP CLI User Guide...
Page 101: ...Maintenance 102 ETEP CLI User Guide...
Page 119: ...Troubleshooting 120 ETEP CLI User Guide...
Page 123: ...FIPS 140 2 Level 2 Operation 124 ETEP CLI User Guide...
Page 205: ...Command Reference 206 ETEP CLI User Guide...
Page 211: ...Index 212 ETEP CLI User Guide...