303
In one-to-many communication scenarios, you must configure the IPsec SAs for an IPv6 routing
protocol in manual mode because of the following reasons:
•
The automatic key exchange mechanism is used only to protect communications between two
points. In one-to-many communication scenarios, automatic key exchange cannot be
implemented.
•
One-to-many communication scenarios require that all the devices use the same SA
parameters (SPI and key) to receive and send packets. IKE negotiated SAs cannot meet this
requirement.
Protocols and standards
•
RFC 2401,
Security Architecture for the Internet Protocol
•
RFC 2402,
IP Authentication Header
•
RFC 2406,
IP Encapsulating Security Payload
•
RFC 4552,
Authentication/Confidentiality for OSPFv3
FIPS compliance
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for
features, commands, and parameters might differ in FIPS mode (see "
") and
non-FIPS mode.
IPsec tunnel establishment
CAUTION:
Typically, IKE uses UDP port 500 for communication, and AH and ESP use the protocol numbers 51
and 50, respectively. Make sure traffic of these protocols is not denied on the interfaces with IKE or
IPsec configured.
IPsec tunnels can be established in different methods. Choose a correct method to establish IPsec
tunnels according to your network conditions:
•
ACL-based IPsec tunnel
—Protects packets identified by an ACL. To establish an ACL-based
IPsec tunnel, configure an IPsec policy, specify an ACL in the policy, and apply the policy to an
interface (see "
"). The IPsec tunnel establishment steps are the
same in an IPv4 network and in an IPv6 network.
•
Application-based
IPsec
tunnel
—Protects the packets of an application. This method can be
used to protect IPv6 routing protocols. It does not require an ACL. For information about IPv6
routing protocol protection, see "
Configuring IPsec for IPv6 routing protocols
."
Implementing ACL-based IPsec
IMPORTANT:
ACLs for IPsec take effect only on traffic that is generated by the device and traffic that is destined
for the device. They do not take effect on traffic forwarded through the device. For example, an
ACL-based IPsec tunnel can protect log messages the device sends to a log server, but it does not
protect data flows and voice flows that are forwarded by the device.
Use the following procedure to implement ACL-based IPsec:
Содержание FlexFabric 5940 SERIES
Страница 251: ...238 ...