32
Network configuration
Creating a policy
To create a policy, enter the
ipsec policy create
command as shown in the following example:
8/20q FC Switch #> admin start
8/20q FC Switch (admin) #> ipsec edit
8/20q FC Switch (admin-ipsec) #> ipsec policy create h2h-sh-sp
A list of attributes with formatting will follow.
Enter a value or simply press the ENTER key to skip specifying a value.
If you wish to terminate this process before reaching the end of the list
press 'q' or 'Q' and the ENTER key to do so.
Required attributes are preceded by an asterisk.
Value (press ENTER to not specify value, 'q' to quit):
Description (string value, 0-127 bytes) :
Host-to-host:switch->host
*SourceAddress (IPv4, IPv6 or hostname/[PrefixLength]) :
fe80::2c0:ddff:fe03:d4c1
SourcePort (decimal value, 1-65535) :
*DestinationAddress (IPv4, IPv6 or hostname/[PrefixLength]) :
fe80::250:daff:feb7:9d02
DestinationPort (decimal value, 1-65535) :
*Protocol (decimal value, or keyword)
Allowed keywords
icmp, icmp6, ip4, tcp, udp or any : any
*Direction (1=in, 2=out) : 2
Priority (value, -2147483647 to +214783647) :
*Action (1=discard, 2=none, 3=ipsec) : 3
*ProtectionDesired (select one, transport-mode only)
1=ah Authentication Header
2=esp Encapsulating Security Payload
3=both : 2
*espRuleLevel (1=default, 2=use, 3=require) : 3
The security policy has been created.
This configuration must be saved with the 'ipsec save' command
before it can take effect, or to discard this configuration
use the 'ipsec cancel' command.
Deleting a policy
To delete a user-defined policy, enter the
ipsec policy delete
command, as shown in the following
example:
8/20q FC Switch #> admin start
8/20q FC Switch (admin) #> ipsec edit
8/20q FC Switch (admin-ipsec) #> ipsec policy delete policy_1
The security policy will be deleted. Please confirm (y/n): [n] y
8/20q FC Switch (admin-ipsec) #> ipsec save
The IPsec configuration will be saved and activated.
Please confirm (y/n): [n] y
Summary of Contents for 8/20q
Page 14: ...14 About this guide ...
Page 20: ...20 Command line interface usage ...
Page 24: ...24 User account configuration ...
Page 38: ...38 Network configuration ...
Page 90: ...90 Connection security configuration ...
Page 100: ...100 Device security configuration ...
Page 104: ...104 RADIUS server configuration ...
Page 110: ...110 Event log configuration ...
Page 130: ...130 Simple Network Management Protocol configuration ...
Page 322: ...322 Command reference ...
Page 332: ...332 Index ...