© Copyright IBM Corp. 2011
Chapter 17. IPsec with IPv6
207
Setting Up a Key Policy
When configuring IPsec, you must define a key policy. This key policy can be either
manual or dynamic. Either way, configuring a policy involves the following steps:
•
Create a transform set—This defines which encryption and authentication algo-
rithms are used.
•
Create a traffic selector—This describes the packets to which the policy applies.
•
Establish an IPsec policy.
•
Apply the policy.
1. To define which encryption and authentication algorithms are used, create a
transform set:
where the following parameters are used:
–
transform ID
A number from 1-10
–
encryption method
One of the following:
esp-des
|
esp-3des
|
esp-aes-cbc
|
esp-null
–
integrity algorithm
One of the following:
esp-sha1
|
esp-md5
|
none
–
AH authentication algorithm
One of the following:
ah-sha1
|
ah-md5
|
none
2. Decide whether to use tunnel or transport mode. The default mode is transport.
3. To describe the packets to which this policy applies, create a traffic selector
using the following command:
where the following parameters are used:
–
traffic selector number
an integer from 1-10
–
permit
|
deny
whether or not to permit IPsec encryption of traffic that meets
the criteria specified in this command
–
any
apply the selector to any type of traffic
–
icmp
<type>
|
any
only apply the selector only to ICMP traffic of the
specified
type
(an integer from 1-255) or to any ICMP traffic
–
tcp
only apply the selector to TCP traffic
–
source IP address
|
any
the source IP address in IPv6 format or “any” source
–
destination IP address
|
any
the destination IP address in IPv6 format or “any”
destination
–
prefix length
(Optional) the length of the destination IPv6 prefix; an integer
from 1-128
Permitted traffic that matches the policy in force is encrypted, while denied traffic
that matches the policy in force is dropped. Traffic that does not match the policy
bypasses IPsec and passes through
clear
(unencrypted).
4. Choose whether to use a manual or a dynamic policy.
RS G8000(config)#
ipsec transform-set
<transform ID>
<encryption method>
<integrity algorithm> <AH authentication algorithm>
RS G8000(config)#
ipsec transform-set tunnel
|
transport
RS G8000(config)#
ipsec traffic-selector
<traffic selector number>
permit|deny any|icmp
<type|
any
>
|tcp
> <source IP address|
any
> <destination IP
address|
any
>
[
<prefix length>
]
Содержание RackSwitch G8000
Страница 1: ...RackSwitch G8000 Application Guide...
Страница 2: ......
Страница 3: ...RackSwitch G8000 Application Guide...
Страница 16: ...16 RackSwitch G8000 Application Guide...
Страница 22: ...20 RackSwitch G8000 Application Guide...
Страница 23: ...Copyright IBM Corp 2011 21 Part 1 Getting Started...
Страница 24: ...22 RackSwitch G8000 Application Guide...
Страница 54: ...52 RackSwitch G8000 Application Guide...
Страница 55: ...Copyright IBM Corp 2011 53 Part 2 Securing the Switch...
Страница 56: ...54 RackSwitch G8000 Application Guide...
Страница 92: ...90 RackSwitch G8000 Application Guide...
Страница 94: ...92 RackSwitch G8000 Application Guide...
Страница 144: ...142 RackSwitch G8000 Application Guide...
Страница 145: ...Copyright IBM Corp 2011 143 Part 4 Advanced Switch ing Features...
Страница 146: ...144 RackSwitch G8000 Application Guide...
Страница 148: ...146 RackSwitch G8000 Application Guide...
Страница 182: ...180 RackSwitch G8000 Application Guide...
Страница 184: ...182 RackSwitch G8000 Application Guide...
Страница 212: ...210 RackSwitch G8000 Application Guide...
Страница 258: ...256 RackSwitch G8000 Application Guide...
Страница 286: ...284 RackSwitch G8000 Application Guide...
Страница 294: ...292 RackSwitch G8000 Application Guide...
Страница 298: ...296 RackSwitch G8000 Application Guide...
Страница 310: ...308 RackSwitch G8000 Application Guide...
Страница 311: ...Copyright IBM Corp 2011 309 Part 7 Network Management...
Страница 312: ...310 RackSwitch G8000 Application Guide...
Страница 320: ...318 RackSwitch G8000 Application Guide...
Страница 332: ...330 RackSwitch G8000 Application Guide...
Страница 334: ...332 RackSwitch G8000 Application Guide...
Страница 345: ...Copyright IBM Corp 2011 343 Part 9 Appendices...
Страница 346: ...344 RackSwitch G8000 Application Guide...
Страница 357: ...Copyright IBM Corp 2011 Appendix C Notices 355 Taiwan Class A compliance statement...
Страница 358: ...356 RackSwitch G8000 Application Guide...