Encryption and Decryption of IPv4 Unicast Data and Control Packets
Features include for encryption and decryption of IPv4 unicast data and control packets include IKEv2 on MP; IPSec FPGA protocol;
IKEv2 protocol support; and PKI checks for certificate presence.
Major enhancements to support encryption and decryption of IPv4 unicast data and control packets transmitted or received from
external networks include:
•
IPSec FPGA protocol using a new 4x10G/1G and 4x1G IPSec line card, developed to provide hardware based data encryption
and decryption at line rate of 44GBe. This card has free scale P2010 CPU with Security Engine 3.1x.
•
IKEv2 protocol support to setup and manage secure tunnels across the external network.
•
PKI support for authentication of endpoints of tunnel using digital certificates.
NOTE
The PKI module needs to run over HTTP, so it will be running as a separate task on MP.
IKE or another module should not store the PKI certificates for later reference. Whenever needed, the PKI module
should be queried with the certificate DN or Subject's alternate name.
•
Manual PKI is supported, and OCSP and SCEP are not supported (for NetIron Release 5.8.00).
IKEv2 Authentication
When IKEv2 authentication is configured and the method (remote or local) is ECDSA, the CA certificates are retrieved and downloaded to
LPs where IKE will store these certificates. This is done even if the peer is not up, such as during peer init. This data is required or
SA-
INIT
cannot be completed.
NOTE
The new PKI feature in NI Release 5.8.00 will only be used for setting up the IKEv2 session.
When a peer is created and auth method is ECDSA IKE checks its database to ascertain if the CA and its self certificate are available.
The following certificate payload encoding is supported:
Certificate Type
Value
X.509 Certificate – Signature
4
Hash and URL of X.509 certificate
12
OCSP content
14
During the IKEv2 exchange, when two peers are establishing a tunnel, each peer will receive a certificate from the other IKE peer. In the
IKE, the certificates can be sent in two ways: Inline certificate and HTTP and URL format.
NOTE
IKE or another module should not store the PKI certificates for later reference. Whenever needed, the PKI module should be
queried with the certificate DN or Subject alternate name.
Router modules
Brocade NetIron MLXe Series Hardware Installation Guide
46
53-1004203-04
Содержание NetIron MLXe Series
Страница 8: ...Brocade NetIron MLXe Series Hardware Installation Guide 8 53 1004203 04...
Страница 12: ...Brocade NetIron MLXe Series Hardware Installation Guide 12 53 1004203 04...
Страница 20: ...Brocade NetIron MLXe Series Hardware Installation Guide 20 53 1004203 04...
Страница 192: ...Brocade NetIron MLXe Series Hardware Installation Guide 192 53 1004203 04...
Страница 270: ...Brocade NetIron MLXe Series Hardware Installation Guide 270 53 1004203 04...
Страница 286: ...Brocade NetIron MLXe Series Hardware Installation Guide 286 53 1004203 04...
Страница 292: ...Brocade NetIron MLXe Series Hardware Installation Guide 292 53 1004203 04...