148 Configuring advanced security features
Nested Configurations
You can configure other scenarios as nested combinations of the above configurations.
IPsec protocols
IPsec uses two different protocols, Authentication Header (AH) and Encapsulating Security Payload (ESP),
to ensure the authentication, integrity, and confidentiality of the communication.
To protect the integrity of the IP datagram, the IPsec protocols use hash message authentication codes
(HMAC). To derive this HMAC, the IPsec protocols use hash algorithms like MD5 and SHA to calculate a
hash based on a secret key and the contents of the IP datagram. This HMAC is then included in the IPsec
protocol header and the receiver of the packet can check the HMAC if it has access to the secret key.
To protect against denial of service attacks, the IPsec protocols use a sliding window. Each packet gets
assigned a sequence number and is accepted only if the packet's number is within the window or newer.
Older packets are immediately discarded. This protects against replay attacks where the attacker records
the original packets and replays them later.
Security Associations
A security association (SA) is the collection of security parameters and authenticated keys that are
negotiated between IPsec peers. For the peers to be able to encapsulate and de-encapsulate the IPsec
packets, they need a way to store the secret keys, algorithms, and IP addresses involved in the
communication. All these parameters needed for the protection of the IP datagram are stored in a security
association (SA). The security associations are in turn stored in a security association database (SADB).
An IPsec security association is a construct that specifies security properties that are recognized by
communicating hosts. The properties of the SA are the security protocol (AH or ESP), destination IP
address, and Security Parameter Index (SPI) number. SPI is an arbitrary 32-bit value contained in IPsec
protocol headers (AH or ESP) and an IPsec SA is unidirectional. Because most communication is
peer-to-peer or client-to-server, two SAs must be present to secure traffic in both directions. An SA specifies
the IPsec protocol (AH or ESP), the algorithms used for encryption and authentication, and the expiration
definitions used in security associations of the traffic. IKE uses these values in negotiations to create IPsec
SAs. You must create an SA prior to creating an SA-proposal. You cannot modify an SA once it is created.
Use the
ipsecConfig --flush manual-sa
command to remove all SA entries from the kernel SADB
and re-create the SA.
IPsec sa-proposal
The IPsec sa-proposal defines an SA or an SA bundle. An SA is a set of parameters that define how the
traffic is protected using IPsec. These are the IPsec protocols to use for an SA, either AH or ESP, and the
encryption and authentication algorithms to use to protect the traffic. For SA bundles, [AH, ESP] is the
supported combination.
Authentication and Encryption Algorithms
IPsec uses different protocols to ensure the authentication, integrity, and confidentiality of the
communication. Encapsulating Security Payload (ESP) provides confidentiality, data integrity and data
source authentication of IP packets, and protection against replay attacks. Authentication Header (AH)
provides data integrity, data source authentication, and protection against replay attacks, but unlike ESP,
AH does not provide confidentiality.
In AH and ESP,
hmac_md5
and
hmac_sha1
are used as authentication algorithms. Only in
ESP
,
3des_cbc
,
blowfish_cbc
,
aes256_cbc
and
null_enc
are used as encryption algorithms. Use
Table 41
when configuring the authentication algorithm.
Table 41
Algorithms and associated authentication policies
Algorithm
Encryption Level Policy
hmac_md5
128-bit
AH, ESP
hmac_sha1
160-bit
AH, ESP
3des_cbc
168-bit
ESP
blowfish_cbc
64-bit
ESP
Summary of Contents for A7533A - Brocade 4Gb SAN Switch Base
Page 1: ...HP StorageWorks Fabric OS 6 2 administrator guide Part number 5697 0016 Edition May 2009 ...
Page 24: ...24 ...
Page 99: ...Fabric OS 6 2 administrator guide 99 ...
Page 100: ...100 Managing user accounts ...
Page 118: ...116 Configuring standard security features ...
Page 164: ...162 Configuring advanced security features ...
Page 234: ...232 Installing and maintaining firmware ...
Page 268: ...266 Administering advanced zoning ...
Page 284: ...282 Configuring Enterprise class platforms ...
Page 292: ...290 Routing traffic ...
Page 294: ...292 Interoperability for merged SANs ...
Page 302: ...300 Configuring the Distributed Management Server ...
Page 334: ...332 iSCSI gateway service ...
Page 340: ...338 Administering NPIV ...
Page 407: ...Fabric OS 6 2 administrator guide 405 ...
Page 408: ...406 Using the FC FC routing service ...
Page 438: ...434 Administering extended fabrics ...
Page 460: ...456 Administering ISL trunking ...
Page 516: ...512 FICON fabrics ...
Page 526: ...522 Configuring and monitoring FICON Extension Services ...
Page 540: ...536 Configuring the PID format ...
Page 544: ...540 Understanding legacy password behavior ...
Page 546: ...542 Mixed fabric configurations for non merge SANs ...
Page 550: ...546 Migrating from an MP Router to a 400 MP Router ...
Page 558: ...554 Inband Management ...
Page 572: ...568 ...