© Copyright IBM Corp. 2011
Chapter 17. IPsec with IPv6
207
Setting Up a Key Policy
When configuring IPsec, you must define a key policy. This key policy can be either
manual or dynamic. Either way, configuring a policy involves the following steps:
•
Create a transform set—This defines which encryption and authentication algo-
rithms are used.
•
Create a traffic selector—This describes the packets to which the policy applies.
•
Establish an IPsec policy.
•
Apply the policy.
1. To define which encryption and authentication algorithms are used, create a
transform set:
where the following parameters are used:
–
transform ID
A number from 1-10
–
encryption method
One of the following:
esp-des
|
esp-3des
|
esp-aes-cbc
|
esp-null
–
integrity algorithm
One of the following:
esp-sha1
|
esp-md5
|
none
–
AH authentication algorithm
One of the following:
ah-sha1
|
ah-md5
|
none
2. Decide whether to use tunnel or transport mode. The default mode is transport.
3. To describe the packets to which this policy applies, create a traffic selector
using the following command:
where the following parameters are used:
–
traffic selector number
an integer from 1-10
–
permit
|
deny
whether or not to permit IPsec encryption of traffic that meets
the criteria specified in this command
–
any
apply the selector to any type of traffic
–
icmp
<type>
|
any
only apply the selector only to ICMP traffic of the
specified
type
(an integer from 1-255) or to any ICMP traffic
–
tcp
only apply the selector to TCP traffic
–
source IP address
|
any
the source IP address in IPv6 format or “any” source
–
destination IP address
|
any
the destination IP address in IPv6 format or “any”
destination
–
prefix length
(Optional) the length of the destination IPv6 prefix; an integer
from 1-128
Permitted traffic that matches the policy in force is encrypted, while denied traffic
that matches the policy in force is dropped. Traffic that does not match the policy
bypasses IPsec and passes through
clear
(unencrypted).
4. Choose whether to use a manual or a dynamic policy.
RS G8000(config)#
ipsec transform-set
<transform ID>
<encryption method>
<integrity algorithm> <AH authentication algorithm>
RS G8000(config)#
ipsec transform-set tunnel
|
transport
RS G8000(config)#
ipsec traffic-selector
<traffic selector number>
permit|deny any|icmp
<type|
any
>
|tcp
> <source IP address|
any
> <destination IP
address|
any
>
[
<prefix length>
]
Summary of Contents for RackSwitch G8000
Page 1: ...RackSwitch G8000 Application Guide...
Page 2: ......
Page 3: ...RackSwitch G8000 Application Guide...
Page 16: ...16 RackSwitch G8000 Application Guide...
Page 22: ...20 RackSwitch G8000 Application Guide...
Page 23: ...Copyright IBM Corp 2011 21 Part 1 Getting Started...
Page 24: ...22 RackSwitch G8000 Application Guide...
Page 54: ...52 RackSwitch G8000 Application Guide...
Page 55: ...Copyright IBM Corp 2011 53 Part 2 Securing the Switch...
Page 56: ...54 RackSwitch G8000 Application Guide...
Page 92: ...90 RackSwitch G8000 Application Guide...
Page 94: ...92 RackSwitch G8000 Application Guide...
Page 144: ...142 RackSwitch G8000 Application Guide...
Page 145: ...Copyright IBM Corp 2011 143 Part 4 Advanced Switch ing Features...
Page 146: ...144 RackSwitch G8000 Application Guide...
Page 148: ...146 RackSwitch G8000 Application Guide...
Page 182: ...180 RackSwitch G8000 Application Guide...
Page 184: ...182 RackSwitch G8000 Application Guide...
Page 212: ...210 RackSwitch G8000 Application Guide...
Page 258: ...256 RackSwitch G8000 Application Guide...
Page 286: ...284 RackSwitch G8000 Application Guide...
Page 294: ...292 RackSwitch G8000 Application Guide...
Page 298: ...296 RackSwitch G8000 Application Guide...
Page 310: ...308 RackSwitch G8000 Application Guide...
Page 311: ...Copyright IBM Corp 2011 309 Part 7 Network Management...
Page 312: ...310 RackSwitch G8000 Application Guide...
Page 320: ...318 RackSwitch G8000 Application Guide...
Page 332: ...330 RackSwitch G8000 Application Guide...
Page 334: ...332 RackSwitch G8000 Application Guide...
Page 345: ...Copyright IBM Corp 2011 343 Part 9 Appendices...
Page 346: ...344 RackSwitch G8000 Application Guide...
Page 357: ...Copyright IBM Corp 2011 Appendix C Notices 355 Taiwan Class A compliance statement...