Fabric OS Administrator’s Guide
233
53-1002745-02
Management interface security
7
FIGURE 16
Endpoint-to-gateway tunnel configuration
RoadWarrior configuration
In endpoint-to-endpoint security, packets are encrypted and decrypted by the host which produces
or consumes the traffic. In the gateway-to-gateway example, a router on the network encrypts and
decrypts the packets on behalf of the hosts on a protected network. A combination of the two is
referred to as a RoadWarrior configuration where a host on the Internet requires access to a
network through a security gateway that is protecting the network.
IP sec protocols
IP sec ensures confidentiality, integrity, and authentication using the following protocols:
•
Authentication Header (AH)
•
Encapsulating Security Payload (ESP)
IP sec protocols protect IP datagram integrity using hash message authentication codes (HMAC).
Using hash algorithms with the contents of the IP datagram and a secret key, the IP sec protocols
generate this HMAC and add it to the protocol header. The receiver must have access to the secret
key in order to decode the hash.
IP sec protocols use a sliding window to assist in flow control, The IP sec protocols also use this
sliding window to provide protection against replay attacks in which an attacker attempts a denial
of service attack by replaying an old sequence of packets. IP sec protocols assign a sequence
number to each packet. The recipient accepts each packet only if its sequence number is within
the window. It discards older packets.
Security associations
A security association (SA) is the collection of security parameters and authenticated keys that are
negotiated between IP sec peers to protect the IP datagram. A security association database
(SADB) is used to store these SAs. Information in these SAs—IP addresses, secret keys, algorithms,
and so on—is used by peers to encapsulate and decapsulate the IP sec packets
An IP sec security association is a construct that specifies security properties that are recognized
by communicating hosts. The properties of the SA are the security protocol (AH or ESP), destination
IP address, and Security Parameter Index (SPI) number. SPI is an arbitrary 32-bit value contained in
IP sec protocol headers (AH or ESP) and an IP sec SA is unidirectional. Because most
communication is peer-to-peer or client-to-server, two SAs must be present to secure traffic in both
directions. An SA specifies the IP sec protocol (AH or ESP), the algorithms used for encryption and
authentication, and the expiration definitions used in security associations of the traffic. IKE uses
Содержание Fabric OS 7.1.0
Страница 1: ...53 1002745 02 25 March 2013 Fabric OS Administrator s Guide Supporting Fabric OS 7 1 0 ...
Страница 24: ...24 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 28: ...28 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 32: ...32 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 42: ...42 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 116: ...116 Fabric OS Administrator s Guide 53 1002745 02 Inter switch links 4 FIGURE 7 Virtual channels on a QoS enabled ISL ...
Страница 132: ...132 Fabric OS Administrator s Guide 53 1002745 02 Frame Redirection 4 ...
Страница 194: ...194 Fabric OS Administrator s Guide 53 1002745 02 Ports and applications used by switches 6 ...
Страница 254: ...254 Fabric OS Administrator s Guide 53 1002745 02 Brocade configuration form 8 ...
Страница 274: ...274 Fabric OS Administrator s Guide 53 1002745 02 Validating a firmware download 9 ...
Страница 302: ...302 Fabric OS Administrator s Guide 53 1002745 02 Creating a logical fabric using XISLs 10 ...
Страница 344: ...344 Fabric OS Administrator s Guide 53 1002745 02 Concurrent zone transactions 11 ...
Страница 374: ...374 Fabric OS Administrator s Guide 53 1002745 02 Setting up TI over FCR sample procedure 12 ...
Страница 432: ...432 Fabric OS Administrator s Guide 53 1002745 02 Access Gateway N_Port failover with FA PWWN 16 ...
Страница 462: ...462 Fabric OS Administrator s Guide 53 1002745 02 ...
Страница 490: ...490 Fabric OS Administrator s Guide 53 1002745 02 Ports on Demand 18 ...
Страница 498: ...498 Fabric OS Administrator s Guide 53 1002745 02 Supported topologies for ICL connections 19 ...
Страница 626: ...626 Fabric OS Administrator s Guide 53 1002745 02 Preparing a switch for FIPS B ...
Страница 630: ...630 Fabric OS Administrator s Guide 53 1002745 02 Hexadecimal Conversion C ...
Страница 666: ...666 Fabric OS Administrator s Guide 53 1002745 02 ...