
Fabric OS Administrator’s Guide
169
53-1002446-01
Management interface security
7
IPsec protocols use a sliding window to assist in flow control, The IPsec protocols also use this
sliding window to provide protection against replay attacks in which an attacker attempts a denial
of service attack by replaying an old sequence of packets. IPsec protocols assign a sequence
number to each packet. The recipient accepts each packet only if its sequence number is within
the window. It discards older packets.
Security associations
A security association (SA) is the collection of security parameters and authenticated keys that are
negotiated between IPsec peers to protect the IP datagram. A security association database (SADB)
is used to store these SAs. Information in these SAs—IP addresses, secret keys, algorithms, and so
on—is used by peers to encapsulate and decapsulate the IPsec packets
An IPsec security association is a construct that specifies security properties that are recognized by
communicating hosts. The properties of the SA are the security protocol (AH or ESP), destination IP
address, and Security Parameter Index (SPI) number. SPI is an arbitrary 32-bit value contained in
IPsec protocol headers (AH or ESP) and an IPsec SA is unidirectional. Because most
communication is peer-to-peer or client-to-server, two SAs must be present to secure traffic in both
directions. An SA specifies the IPsec protocol (AH or ESP), the algorithms used for encryption and
authentication, and the expiration definitions used in security associations of the traffic. IKE uses
these values in negotiations to create IPsec SAs. You must create an SA prior to creating an
SA-proposal. You cannot modify an SA once it is created. Use the ipsecConfig
--
flush manual-sa
command to remove all SA entries from the kernel SADB and re-create the SA. For more
information on the ipSecConfig command, refer to the
Fabric OS Command Reference
.
IPsec proposal
The IPsec sa-proposal defines an SA or an SA bundle. An SA is a set of parameters that define how
the traffic is protected using IPsec. These are the IPsec protocols to use for an SA, either AH or ESP,
and the encryption and authentication algorithms to use to protect the traffic. For SA bundles,
[AH, ESP] is the supported combination.
Authentication and encryption algorithms
IPsec uses different protocols to ensure the authentication, integrity, and confidentiality of the
communication. Encapsulating Security Payload (ESP) provides confidentiality, data integrity and
data source authentication of IP packets, and protection against replay attacks. Authentication
Header (AH) provides data integrity, data source authentication, and protection against replay
attacks, but unlike ESP, AH does not provide confidentiality.
In AH and ESP, hmac_md5 and hmac_sha1 are used as authentication algorithms. Only in ESP,
3des_cbc, blowfish_cbc, aes256_cbc and null_enc are used as encryption algorithms. Use
Table 43
when configuring the authentication algorithm.
TABLE 43
Algorithms and associated authentication policies
Algorithm
Encryption Level Policy
Description
hmac_md5
128-bit
AH, ESP A stronger MAC because it is a keyed hash inside a keyed hash. When
MD5 or SHA-1 is used in the calculation of an HMAC; the resulting MAC
algorithm is termed HMAC-MD5 or HMAC-SHA-1 accordingly.
NOTE: The MD5 hash algorithm is blocked when FIPS mode is
enabled
hmac_sha1
160-bit
AH, ESP
Содержание Fabric OS v7.0.1
Страница 1: ...53 1002446 01 15 December 2011 Fabric OS Administrator s Guide Supporting Fabric OS v7 0 1 ...
Страница 22: ...xxii Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 26: ...xxvi Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 30: ...xxx Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 38: ...xl Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 40: ...2 Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 100: ...62 Fabric OS Administrator s Guide 53 1002446 01 Configuring FLOGI time handling of duplicate PWWN 3 ...
Страница 152: ...114 Fabric OS Administrator s Guide 53 1002446 01 The authentication model using RADIUS and LDAP 5 ...
Страница 214: ...176 Fabric OS Administrator s Guide 53 1002446 01 Management interface security 7 ...
Страница 228: ...190 Fabric OS Administrator s Guide 53 1002446 01 Brocade configuration form 8 ...
Страница 248: ...210 Fabric OS Administrator s Guide 53 1002446 01 Validating a firmware download 9 ...
Страница 334: ...296 Fabric OS Administrator s Guide 53 1002446 01 Setting up TI over FCR sample procedure 12 ...
Страница 360: ...322 Fabric OS Administrator s Guide 53 1002446 01 Encryption and compression example 14 ...
Страница 374: ...336 Fabric OS Administrator s Guide 53 1002446 01 Access Gateway N_Port failover with FA PWWN 16 ...
Страница 404: ...366 Fabric OS Administrator s Guide 53 1002446 01 ...
Страница 430: ...392 Fabric OS Administrator s Guide 53 1002446 01 Ports on Demand 18 ...
Страница 470: ...432 Fabric OS Administrator s Guide 53 1002446 01 Disabling QoS zone based traffic prioritization 21 ...
Страница 502: ...464 Fabric OS Administrator s Guide 53 1002446 01 Buffer credit recovery 23 ...
Страница 544: ...506 Fabric OS Administrator s Guide 53 1002446 01 Displaying the range of output ports connected to xlate domains 24 ...
Страница 554: ...516 Fabric OS Administrator s Guide 53 1002446 01 Fabric configurations for interconnectivity A ...
Страница 572: ...534 Fabric OS Administrator s Guide 53 1002446 01 Hexadecimal overview D ...
Страница 584: ...546 Fabric OS Administrator s Guide 53 1002446 01 ...