
Brocade Network Advisor SAN User Manual
945
53-1003154-01
IPsec and IKE implementation over FCIP
22
IPsec for the 4 Gbps platforms
IPsec uses some terms that you should be familiar with before beginning your configuration. These
are standard terms, but are included here for your convenience.
The following limitations apply to using IPsec:
•
IPsec-specific statistics are not supported.
•
To change the configuration of a secure tunnel, you must delete the tunnel and recreate it.
•
There is no RAS message support for IPsec.
•
IPsec can only be configured on IPv4 based tunnels.
•
Secure Tunnels cannot be defined with VLAN Tagged connections.
Term
Definition
AES
Advanced Encryption Standard. FIPS 197 endorses the Rijndael encryption algorithm as the
approved AES for use by US Government organizations and others to protect sensitive
information. It replaces DES as the encryption standard.
AES-XCBC
Cipher Block Chaining. A key-dependent one-way hash function (MAC) used with AES in
conjunction with the Cipher-Block-Chaining mode of operation, suitable for securing messages
of varying lengths, such as IP datagrams.
AH
Authentication Header - like ESP, AH provides data integrity, data source authentication, and
protection against replay attacks but does not provide confidentiality.
DES
Data Encryption Standard is the older encryption algorithm that uses a 56-bit key to encrypt
blocks of 64-bit plain text. Because of the relatively shorter key length, it is not a secured
algorithm and no longer approved for Federal use.
3DES
Triple DES is a more secure variant of DES. It uses three different 56-bit keys to encrypt blocks
of 64-bit plain text. The algorithm is FIPS-approved for use by Federal agencies.
ESP
Encapsulating Security Payload is the IPsec protocol that provides confidentiality, data integrity
and data source authentication of IP packets, and protection against replay attacks.
IKE
Internet Key Exchange is defined in RFC 2407, RFC 2408 and RFC 2409. IKEv2 is defined in
RFC 4306. IKE uses a Diffie-Hellman key exchange to set up a shared session secret, from
which cryptographic keys are derived and communicating parties are authenticated. The IKE
protocol creates a security association (SA) for both parties.
MD5
Message Digest 5, like SHA-1, is a popular one-way hash function used for authentication and
data integrity.
SHA
Secure Hash Algorithm, like MD5, is a popular one-way hash function used for authentication
and data integrity.
MAC
Message Authentication Code is a key-dependent, one-way hash function used for generating
and verifying authentication data.
HMAC
A stronger MAC because it is a keyed hash inside a keyed hash.
SA
Security Association is the collection of security parameters and authenticated keys that are
negotiated between IPsec peers.
Содержание Network Advisor 12.3.0
Страница 1: ...53 1003154 01 11 July 2014 Brocade Network Advisor SAN User Manual Supporting Network Advisor 12 3 0...
Страница 4: ...iv Brocade Network Advisor SAN User Manual 53 1003154 01...
Страница 86: ...34 Brocade Network Advisor SAN User Manual 53 1003154 01 Uninstalling a patch 2...
Страница 190: ...138 Brocade Network Advisor SAN User Manual 53 1003154 01 Fabric tracking 4...
Страница 216: ...164 Brocade Network Advisor SAN User Manual 53 1003154 01 User profiles 5...
Страница 462: ...410 Brocade Network Advisor SAN User Manual 53 1003154 01 Searching for an assigned event filter 9...
Страница 478: ...426 Brocade Network Advisor SAN User Manual 53 1003154 01 Microsoft System Center Operations Manager SCOM plug in 10...
Страница 612: ...560 Brocade Network Advisor SAN User Manual 53 1003154 01 Exporting Host port mapping 13...
Страница 620: ...568 Brocade Network Advisor SAN User Manual 53 1003154 01 Exporting storage port mapping 14...
Страница 720: ...668 Brocade Network Advisor SAN User Manual 53 1003154 01 Security configuration deployment 17...
Страница 744: ...692 Brocade Network Advisor SAN User Manual 53 1003154 01 Configuring Virtual Fabrics 19...
Страница 1036: ...984 Brocade Network Advisor SAN User Manual 53 1003154 01 Troubleshooting FCIP Ethernet connections 22...
Страница 1068: ...1016 Brocade Network Advisor SAN User Manual 53 1003154 01 Removing thresholds 24...
Страница 1098: ...1046 Brocade Network Advisor SAN User Manual 53 1003154 01 Swapping blades 25...
Страница 1104: ...1052 Brocade Network Advisor SAN User Manual 53 1003154 01 Searching the configuration snapshots 26...
Страница 1176: ...1124 Brocade Network Advisor SAN User Manual 53 1003154 01 SAN connection utilization 28...
Страница 1282: ...1230 Brocade Network Advisor SAN User Manual 53 1003154 01 Removing a frame monitor from a switch 30...
Страница 1306: ...1254 Brocade Network Advisor SAN User Manual 53 1003154 01 Viewing historical reports for a configuration policy manager 31...
Страница 1378: ...1326 Brocade Network Advisor SAN User Manual 53 1003154 01 Event logs 32...
Страница 1432: ...1380 Brocade Network Advisor SAN User Manual 53 1003154 01 MAPS integration with other features 33...
Страница 1448: ...1396 Brocade Network Advisor SAN User Manual 53 1003154 01 Upload failure data capture 34...
Страница 1490: ...1438 Brocade Network Advisor SAN User Manual 53 1003154 01 SAN shortcut menus A...
Страница 1494: ...1442 Brocade Network Advisor SAN User Manual 53 1003154 01 Call Home Event Tables B...
Страница 1524: ...1472 Brocade Network Advisor SAN User Manual 53 1003154 01 About Roles and Access Levels D...
Страница 1552: ...1500 Brocade Network Advisor SAN User Manual 53 1003154 01 Regular Expressions F...
Страница 1920: ...1868 Brocade Network Advisor SAN User Manual 53 1003154 01 Views H...