
Securing Management Port Traffic with IPsec
ETEP CLI User Guide
77
Encryption Policy for Layer 2 Ethertype
This example creates an encryption policy on ETEP 1, which is configured for Layer 2 operation. The
policy uses Layer 2 selectors to encrypt Ethertype 0x0806 (ARP).
The policy-manual-key command uses the “any” attribute to create a bidirectional SA. The keys are
shown in the example below for demonstration purposes. When entering keys on the ETEP, the keys are
hidden on the terminal after you press ENTER.
The first command in the example makes a backup copy of the existing policy set. After defining the
policy, the commands used to view the pending policy and deploy the new policy are shown.
local-site-policy> backup-policy-set
local-site-policy> policy-add EncryptARP
local-site-policy> policy-config EncryptARP
policy-config> policy-action protect
policy-config> policy-layer2-selector 0x0806 any
policy-config> policy-manual-key any 1002 aes256-cbc sha1-96-hmac
Please enter 64 character hexadecimal number for encryption key:
1234567890123456789012345678901212345678901234567890123456789012
Please enter 40 character hexadecimal number for authentication key:
1234567890123456789012345678901234567890
policy-config> policy-priority 65400
policy-config> exit
local-site-policy> show-policy-set
local-site-policy> deploy-policy-set
Securing Management Port Traffic with IPsec
Most management port communications are secured using SSH and TLS. If you wish, you can create
IPsec policies on the management port to provide security for traffic that is not protected by SSH and
TLS, such as FTP traffic, SNMP traffic, and the NTP protocol.
To minimize the impact on management traffic, we recommend creating IPsec policies to protect specific
IP addresses and ports. These specific filters protect targeted traffic, such as NTP messages between the
management port and a time server, without affecting other management traffic.
The
ETEP Installation Guide
lists the protocols and ports that are used by the ETEPs and the
EncrypTight system. Make sure that your IPsec policies allow for the protocols that are required for your
deployment.
The IPsec implementation on the ETEP management port is summarized below:
●
The ETEP supports IKE negotiated policies and manual key policies, although not simultaneously.
You must use the same keying method for all management port policies.
●
The IKE authentication method is preshared keys.
●
The IPsec mode is transport mode
●
This IPsec implementation processes IPv4 and IPv6 traffic.
●
Dead peer detection (DPD) is supported. It is not user-configurable.
Содержание ET0010A
Страница 7: ...8 ETEP CLI User Guide Contents...
Страница 15: ...Getting Started 16 ETEP CLI User Guide...
Страница 33: ...User Administration 34 ETEP CLI User Guide...
Страница 55: ...Configuring the ETEP 56 ETEP CLI User Guide...
Страница 97: ...Creating Policies 98 ETEP CLI User Guide...
Страница 101: ...Maintenance 102 ETEP CLI User Guide...
Страница 119: ...Troubleshooting 120 ETEP CLI User Guide...
Страница 123: ...FIPS 140 2 Level 2 Operation 124 ETEP CLI User Guide...
Страница 205: ...Command Reference 206 ETEP CLI User Guide...
Страница 211: ...Index 212 ETEP CLI User Guide...