26
Internet Protocol Security (IPSec)
Internet protocol security (IPSec) is an end-to-end security scheme for securing IP communications by
authenticating and encrypting all packets in a session. Use IPSec between hosts, gateways, or hosts and
gateways.
IPSec uses a series of protocol functions to achieve information security:
•
Authentication Headers (AH)
— Connectionless integrity and origin authentication for IP packets.
•
Encapsulating Security Payloads (ESP)
— Confidentiality, authentication, and data integrity for IP
packets.
•
Security Associations (SA)
— Algorithm-provided parameters required for AH and ESP protocols.
IPSec capability is available on control (protocol) and management traffic; end-node support is required.
IPSec supports two operational modes: Transport and Tunnel.
• Transport is the default mode for IPSec and encrypts only the payload of the packet. Routing
information is unchanged.
• Tunnel mode is used to encrypt the entire packet, including the routing information in the IP header.
Tunnel mode is typically used in creating virtual private networks (VPNs).
Transport mode provides IP packet payload protection using ESP. You can use ESP alone or in
combination with AH to provide additional authentication. AH protects data from modification but does
not provide confidentiality.
SA is the configuration information that specifies the type of security provided to the IPSec flow. The SA is
a set of algorithms and keys used to authenticate and encrypt the traffic flow. The AH and ESP use SA to
provide traffic protection for the IPSec flow.
NOTE:
Due to performance limitations on the control processor, you cannot enable IPSec on all packets in
a communication session.
crypto ipsec transform-set
Create a transform set, or combination of security algorithms and protocols, of cryptos.
S4810
Syntax
crypto ipsec transform-set
name
{ah-authentication {md5|sha1|
null} | esp-authentication {md5|sha1|null} | esp-encryption
{3des|cbc|des|null}}
Internet Protocol Security (IPSec)
829
Содержание Networking S4810
Страница 1: ...Dell Command Line Reference Guide for the S4810 System 9 4 0 0 ...
Страница 42: ...42 ...
Страница 62: ...62 ...
Страница 89: ... 12946259 bytes successfully copied Dell reload File Management 89 ...
Страница 90: ...90 ...
Страница 164: ...164 ...
Страница 204: ...204 ...
Страница 348: ...348 ...
Страница 518: ...518 ...
Страница 613: ...action act UpdateCounter param0 1 0x01 param1 0 0x00 output truncated Debugging and Diagnostics 613 ...
Страница 614: ...614 ...
Страница 652: ...652 ...
Страница 674: ...Version 8 3 12 0 Introduced on the S4810 674 FCoE Transit ...
Страница 686: ...686 ...
Страница 828: ...828 ...
Страница 838: ...838 ...
Страница 950: ...IPv6 Service Class Field Queue ID 101XXXXX 5 100XXXXX 4 011XXXXX 3 010XXXXX 2 001XXXXX 1 000XXXXX 0 950 IPv6 Basics ...
Страница 1036: ...1036 ...
Страница 1142: ...1142 ...
Страница 1156: ...1156 ...
Страница 1270: ...1270 ...
Страница 1386: ...1386 ...
Страница 1446: ...1446 ...
Страница 1448: ...1448 ...
Страница 1539: ...Gi1 2 2 STP PVST Dell Related Commands show running config displays the current configuration Service Provider Bridging 1539 ...
Страница 1540: ...1540 ...
Страница 1552: ...Gi 3 40 configured rate 16384 actual rate 16384 sub sampling rate 1 Dell 1552 sFlow ...
Страница 1604: ...1604 ...
Страница 1642: ...1642 ...
Страница 1666: ...1666 ...
Страница 1676: ...1676 ...
Страница 1689: ... uplink state group creates an uplink state group and enables the tracking of upstream links Uplink Failure Detection UFD 1689 ...
Страница 1690: ...1690 ...
Страница 1710: ...1710 ...