06.02.2014 Views

User's Guide Command Line Interface - QLogic

User's Guide Command Line Interface - QLogic

User's Guide Command Line Interface - QLogic

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3–Network Configuration<br />

Managing IP Security<br />

Policies can define security for host-to-host and host-to-gateway connections; one<br />

policy for each direction. For example, to secure the connection between two<br />

hosts, you need two policies: one for outbound traffic from the source to the<br />

destination, and another for inbound traffic to the source from the destination. You<br />

can specify sources and destinations by IP addresses (version 4 or 6) or DNS<br />

host names. If a host name resolves to more than one IP address, the switch<br />

creates the necessary policies and associations. You can recognize these<br />

dynamic policies and associations because their names begin with DynamicSP_<br />

and DynamicSA_ respectively.<br />

A security association defines the encryption algorithm and encryption key (public<br />

key or secret) to apply when called by a security policy. A security policy may call<br />

several associations at different times, but each association is related to only one<br />

policy. The security association database is the set of all security associations.<br />

You can apply IP security to all communication between two systems, or to<br />

selected protocols, such as ICMP, TCP, or UDP. Furthermore, instead of applying<br />

IP security, you can choose to discard all inbound or outbound traffic, or allow all<br />

traffic without encryption. Both the AH and ESP security protocols provide source<br />

authentication, ensure data integrity, and protect against replay.<br />

IKE Peers and Policies<br />

IKE is a protocol that automates the configuration of matching IP security<br />

associations on the switch and on the connected device (or peer). The IKE peer<br />

defines the IKE security association connection through which the IKE policy<br />

configures the IP security associations.The IKE policy defines the type of data<br />

traffic to secure between the switch and the peer, and how to encrypt that data.<br />

You must create the same IKE peer and IKE policy configurations on the switch<br />

and the peer device.<br />

Public Key Infrastructure<br />

Public key encryption requires a public key, a corresponding private key, and the<br />

necessary certificates to authenticate them. Public key infrastructure (PKI)<br />

provides support for the creation and management of public/private key pairs,<br />

signed certificates, and certificate authority (CA) certificates when using IKE. You<br />

can create a public/private key and combine it with one or more device identities<br />

to generate a certificate request. Submit the certificate request to a CA to obtain a<br />

signed certificate, which contains the authenticated public/private key pair. In<br />

addition to the signed certificate, you must also obtain a CA certificate to<br />

authenticate the CA. After downloading the signed certificate and a CA certificate<br />

to the switch and importing them into the PKI database, the signed certificate<br />

(which contains the authenticated public key) can then be used to complete the<br />

IKE peer configuration.<br />

3-8 59263-02 B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!