Avaya Configuring IPsec Services Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Softwarové příručky Avaya Configuring IPsec Services. Avaya Configuring IPsec Services User's Manual [English] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 122
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
BayRS Version 15.1
Part No. 308630-15.1 Rev 00
October 2001
600 Technology Park Drive
Billerica, MA 01821-4130
Configuring IPsec Services
Zobrazit stránku 0
1 2 3 4 5 6 ... 121 122

Shrnutí obsahu

Strany 1 - Configuring IPsec Services

BayRS Version 15.1Part No. 308630-15.1 Rev 00October 2001600 Technology Park DriveBillerica, MA 01821-4130Configuring IPsec Services

Strany 3

Configuring IPsec ServicesD-2308630-15.1 Rev 00Web Browser Configuration of the Contivity VPN SwitchUnlike products that use BayRS software, you confi

Strany 4

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-3 Configuration ConsiderationsWhen you configure a Contivity switch to interoperate with BayR

Strany 5 - Contents

Configuring IPsec ServicesD-4308630-15.1 Rev 00PerformanceThe BayRS implementation of IPsec is slower than the Contivity implementation. Consider perf

Strany 6

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-5 BayRS Features Not Supported by the Contivity VPN SwitchContivity does not support the foll

Strany 7 - 308630-15.1 Rev 00 vii

Configuring IPsec ServicesD-6308630-15.1 Rev 00Troubleshooting BayRS-Contivity IPsec InteroperabilityUse the following troubleshooting tools to diagno

Strany 8

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-7 Symptoms You May SeeIf traffic does not appear to traverse the IPsec tunnel, first check fo

Strany 9 - 308630-15.1 Rev 00 ix

Configuring IPsec ServicesD-8308630-15.1 Rev 00• IPsec SAs are deleted on the local side. This message is probably due to normal operation after IPsec

Strany 10

308630-15.1 Rev 00E-1Appendix EProtocol NumbersIPsec policies may include a protocol criterion that references the 1-byte protocol number field in an

Strany 11 - 308630-15.1 Rev 00 xi

Configuring IPsec ServicesE-2308630-15.1 Rev 00Assigned Internet Protocol Numbers by NameTable E-1 lists the Internet Protocol numbers alphabetically

Strany 12

Protocol Numbers308630-15.1 Rev 00E-3 8 EGP Exterior Gateway Protocol88 EIGRP N/A14 EMCON N/A98 ENCAP Encapsulation Header50 ESP Encapsulating Securit

Strany 13 - Before You Begin

308630-15.1 Rev 00 xiTablesTable 1-1. Security Policy Specifications ...1-14Table 1-2. M

Strany 14 - Text Conventions

Configuring IPsec ServicesE-4308630-15.1 Rev 0041 IPv6 Internet Protocol version 644 IPv6-Frag Fragment Header for IPv658 IPv6-ICMP ICMP for IPv659 IP

Strany 15 - Acronyms

Protocol Numbers308630-15.1 Rev 00E-5 103 PIM Protocol Independent Multicast131 PIPE Private IP Encapsulation within IP102 PNNI PNNI over IP21 PRM Pac

Strany 16 - Hard-Copy Technical Manuals

Configuring IPsec ServicesE-6308630-15.1 Rev 0077 SUN-ND SUN ND Protocol-Temporary53 SWIPE IP with Encryption87 TCF N/A6 TCP Transmission Control Prot

Strany 17 - How to Get Help

Protocol Numbers308630-15.1 Rev 00E-7 Assigned Internet Protocol Numbers by NumberTable E-2 lists the Internet Protocol numbers in order by protocol n

Strany 18

Configuring IPsec ServicesE-8308630-15.1 Rev 0026 LEAF-2 Leaf-227 RDP Reliable Data Protocol28 IRTP Internet Reliable Transaction Protocol29 ISO-TP4 I

Strany 19 - Overview of IPsec

Protocol Numbers308630-15.1 Rev 00E-9 55 MOBILE IP Mobility56 TLSP Transport Layer Security Protocol using Kryptonet key management57 SKIP N/A58 IPv6-

Strany 20 - About IPsec

Configuring IPsec ServicesE-10308630-15.1 Rev 0084 TTP N/A85 NSFNET-IGP N/A86 DGP Dissimilar Gateway Protocol87 TCF N/A88 EIGRP N/A89 OSPFIGP N/A90 Sp

Strany 21 - Supported WAN Protocols

Protocol Numbers308630-15.1 Rev 00E-11 113 PGM PGM Reliable Transport Protocol114 Any 0-hop protocol115 L2TP Layer Two Tunneling Protocol116 DDX D-II

Strany 23 - How IPsec Works

308630-15.1 Rev 00Index-1Numbers3DES, 1-16AAccess Node (AN) support, 1-3Access Stack Node (ASN) support, 1-3acronyms, xvAdvanced Remote Node (ARN) sup

Strany 25 - IPsec Elements

Index-2308630-15.1 Rev 00IIKEdescription, 1-11enabling, 3-1security associations, 3-7Image Builder, 2-1inbound security policies, 1-5, 1-9initializati

Strany 26 - Security Policies

308630-15.1 Rev 00Index-3Ssecurityconfiguration, 2-4site considerations, 2-4security associationautomated, 3-7creating, 3-7description, 1-11examples,

Strany 28

308630-15.1 Rev 00xiii PrefaceThis guide describes the Nortel Networks* implementation of IP Security (IPsec) and how to configure it on a Nortel Netw

Strany 29 - Security Associations

Configuring IPsec Servicesxiv308630-15.1 Rev 00Text ConventionsThis guide uses the following text conventions:angle brackets (< >) Indicate that

Strany 30

Preface308630-15.1 Rev 00xv AcronymsThis guide uses the following acronyms:screen text Indicates system output, for example, prompts and system messag

Strany 31

Configuring IPsec Servicesxvi308630-15.1 Rev 00Hard-Copy Technical ManualsYou can print selected technical manuals and release notes free, directly fr

Strany 32

Preface308630-15.1 Rev 00xvii How to Get HelpIf you purchased a service contract for your Nortel Networks product from a distributor or authorized res

Strany 34

308630-15.1 Rev 001-1 Chapter 1Overview of IPsecThis chapter describes the emerging Internet Engineering Task Force (IETF) standards for security serv

Strany 35 - Performance Considerations

ii308630-15.1 Rev 00 Copyright © 2001 Nortel NetworksAll rights reserved. October 2001.The information in this document is subject to change without n

Strany 36

Configuring IPsec Services1-2308630-15.1 Rev 00About IPsecIP Security is the IETF set of emerging standards for security services for communications o

Strany 37 - Installing IPsec

Overview of IPsec308630-15.1 Rev 001-3 Network Requirements for Nortel Networks RoutersTo install the IPsec software, the router must be running, at a

Strany 38 - Installing the IPsec Software

Configuring IPsec Services1-4308630-15.1 Rev 00IPsec ServicesIPsec services consist of confidentiality, integrity, and authentication services for dat

Strany 39

Overview of IPsec308630-15.1 Rev 001-5 Additional IPsec ServicesWithin the IPsec framework, additional security services are provided. An access contr

Strany 40 - Securing Your Configuration

Configuring IPsec Services1-6308630-15.1 Rev 00Figure 1-1 shows how IPsec can protect data communications within an enterprise and from external hosts

Strany 41 - Creating and Using NPKs

Overview of IPsec308630-15.1 Rev 001-7 IPsec ElementsIPsec has three important constructs:• Security gateways• Security policies• Security association

Strany 42 - Caution:

Configuring IPsec Services1-8308630-15.1 Rev 00Security GatewaysA security gateway establishes SAs between router interfaces configured with IPsec sof

Strany 43 - Changing an NPK

Overview of IPsec308630-15.1 Rev 001-9 The criteria (“selectors”) and action specifications used in your inbound and outbound policies are stored in t

Strany 44 - Monitoring NPKs

Configuring IPsec Services1-10308630-15.1 Rev 00For an inbound security policy, the action can be one or two of the following:• Drop• Bypass• LogThe d

Strany 45 - Starting IPsec

Overview of IPsec308630-15.1 Rev 001-11 To specify the protocol criterion, you must provide the numeric value assigned to the protocol for use over th

Strany 46 - Creating Policies

308630-15.1 Rev 00iiiNortel Networks Inc. Software License AgreementThis Software License Agreement (“License Agreement”) is between you, the end-user

Strany 47 - Policy Considerations

Configuring IPsec Services1-12308630-15.1 Rev 00To set up these security associations, IKE itself must create a confidential, secure connection betwee

Strany 48 - (continued)

Overview of IPsec308630-15.1 Rev 001-13 Figure 1-4. Security Associations for Bidirectional TrafficUnder most circumstances, you configure the IKE pro

Strany 49

Configuring IPsec Services1-14308630-15.1 Rev 00Examples of Security Policies and Security AssociationsTable 1-1 and Table 1-2 provide examples of how

Strany 50

Overview of IPsec308630-15.1 Rev 001-15 In Table 1-2, the IP source and destination addresses for the SA are the tunnel end points for the IPsec tunne

Strany 51 - Automated SA Creation

Configuring IPsec Services1-16308630-15.1 Rev 00ESP applies the following algorithms and transform identifiers to deliver its services:• DES (56-bit)•

Strany 52

Overview of IPsec308630-15.1 Rev 001-17 Internet Key Exchange ProtocolThe IKE protocol negotiates and provides private and authenticated keying materi

Strany 53 - About Manual SA Creation

Configuring IPsec Services1-18308630-15.1 Rev 00You can optimize performance by using the information in this section to plan and manage CPU resources

Strany 54

308630-15.1 Rev 002-1 Chapter 2Installing IPsecThis chapter describes how to install and prepare to use IPsec. Before you configure IPsec, you must pe

Strany 55

Configuring IPsec Services2-2308630-15.1 Rev 00Installing the IPsec SoftwareBefore you can enable and use IPsec services, you must create an IPsec-cap

Strany 56

Installing IPsec308630-15.1 Rev 002-3 7.Click on Remove.The file capi.exe or capi.ppc is now listed under Available Components.8.Choose File > Save

Strany 57 - Customizing IPsec

iv308630-15.1 Rev 004. Generala. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks Software avail

Strany 58 - Editing a Policy

Configuring IPsec Services2-4308630-15.1 Rev 00Securing Your SiteTo enforce IPsec, carefully restrict unauthorized access to the routers that encrypt

Strany 59 - Adding a Policy

Installing IPsec308630-15.1 Rev 002-5 Random Number GeneratorThe router software uses the secure random number generator (RNG) to generate initializat

Strany 60

Configuring IPsec Services2-6308630-15.1 Rev 00Entering an Initial NPK and a Seed for EncryptionBefore you can enable IPsec on a router, you must ente

Strany 61

Installing IPsec308630-15.1 Rev 002-7 5.Type a random set of keystrokes. The secure shell informs you when you have typed the required number of keyst

Strany 62 - Reordering Policies

Configuring IPsec Services2-8308630-15.1 Rev 005.Enter the following command:kset npk 0x<NPK_value><NPK_value> is the new 16-digit hexadec

Strany 63

308630-15.1 Rev 003-1 Chapter 3Starting IPsecThis chapter provides instructions for configuring IPsec on an interface.Enabling IPsec and IKETo enable

Strany 64 - Modifying Automated SAs (IKE)

Configuring IPsec Services3-2308630-15.1 Rev 00When you configure IPsec on an interface for the first time, configure the menu items displayed in the

Strany 65 - Modifying Manual SAs

Starting IPsec308630-15.1 Rev 003-3 Specifying an ActionThe action specification in a policy controls how a packet that matches the specified criteria

Strany 66

Configuring IPsec Services3-4308630-15.1 Rev 00Creating an Outbound Policy Template and PolicyTo create an outbound policy template and policy, comple

Strany 67 - Disabling IPsec

Starting IPsec308630-15.1 Rev 003-5 11. In the Policy Name field, type a name for the policy.For a description of this parameter, see page A-4.12. Fro

Strany 68

308630-15.1 Rev 00 vContents PrefaceBefore You Begin ...

Strany 69 - Site Manager Parameters

Configuring IPsec Services3-6308630-15.1 Rev 00Creating an Inbound Policy Template and PolicyThe process for creating inbound policies is almost ident

Strany 70 - Node Protection Key Parameter

Starting IPsec308630-15.1 Rev 003-7 Creating Security AssociationsSecurity associations enable you to provide bidirectional protection for data packet

Strany 71 - IPsec Parameters

Configuring IPsec Services3-8308630-15.1 Rev 00Creating an Outbound Protect Policy with Automated SAs (IKE)To use IKE to create automated SAs, complet

Strany 72 - IPsec Policy Parameters

Starting IPsec308630-15.1 Rev 003-9 About Manual SA CreationTo protect (encrypt or authenticate) data packets leaving the local IPsec interface, creat

Strany 73

Configuring IPsec Services3-10308630-15.1 Rev 00For examples of how to configure manual SAs, see “Manual Protect and Unprotect SA Configuration” on pa

Strany 74

Starting IPsec308630-15.1 Rev 003-11 Creating an Unprotect SA ManuallyTo create an Unprotect SA manually, complete the following tasks: Site Manager P

Strany 76

308630-15.1 Rev 004-1 Chapter 4Customizing IPsecThis chapter provides information about changing an existing IPsec configuration. For information abou

Strany 77

Configuring IPsec Services4-2308630-15.1 Rev 00Editing a PolicyTo edit an existing IPsec policy on a router interface, complete the following tasks:Si

Strany 78

Customizing IPsec308630-15.1 Rev 004-3 Adding a PolicyThe procedure to add an IPsec policy to an existing IPsec interface depends on the connector typ

Strany 79

vi 308630-15.1 Rev 00Security Associations ...1-11Automated

Strany 80

Configuring IPsec Services4-4308630-15.1 Rev 00WAN Interface with Frame RelayTo add an IPsec policy to a router interface configured with frame relay,

Strany 81 - Definitions of k Commands

Customizing IPsec308630-15.1 Rev 004-5 7. In the Policy Name field, type a name for the policy. Click on Help or see the parameter description on page

Strany 82

Configuring IPsec Services4-6308630-15.1 Rev 00Reordering PoliciesThe procedure to reorder IPsec policies on a router interface depends on the connect

Strany 83 - Configuration Examples

Customizing IPsec308630-15.1 Rev 004-7 WAN Interface with Frame RelayTo change the order in which existing IPsec policies are applied on a router inte

Strany 84

Configuring IPsec Services4-8308630-15.1 Rev 00Changing Existing Security AssociationsTo ensure the integrity of SAs, vital information such as IKE pr

Strany 85 - 192.32.10.0

Customizing IPsec308630-15.1 Rev 004-9 Modifying Manual SAsThe procedure to modify manual SAs on a router interface depends on the connector type and

Strany 86 - 192.32.20.0

Configuring IPsec Services4-10308630-15.1 Rev 00WAN Interface with Frame RelayTo change or add manual SAs on a router interface configured with frame

Strany 87 - Manual SA Policy Examples

Customizing IPsec308630-15.1 Rev 004-11 Disabling IPsecTo disable IPsec on all router interfaces configured for it, complete the following tasks: To d

Strany 88

Configuring IPsec Services4-12308630-15.1 Rev 005. Click on Done. You return to the Circuit Definition window.6. Choose File > Exit. You return to

Strany 89

308630-15.1 Rev 00A-1 Appendix ASite Manager ParametersThis appendix contains the Site Manager parameter descriptions for IPsec and IKE services. You

Strany 90

308630-15.1 Rev 00 viiCreating an Outbound Policy Template and Policy ...3-4Creating an Inbound Policy

Strany 91

Configuring IPsec ServicesA-2308630-15.1 Rev 00The Technician Interface allows you to modify parameters by issuing set and commit commands with the MI

Strany 92 - RTR2

Site Manager Parameters308630-15.1 Rev 00A-3 IPsec ParametersParameter:IP Security EnablePath:Configuration Manager > Protocols > IP > IP Sec

Strany 93

Configuring IPsec ServicesA-4308630-15.1 Rev 00IPsec Policy ParametersParameter:Policy EnablePath: Configuration Manager > Protocols > IP > I

Strany 94

Site Manager Parameters308630-15.1 Rev 00A-5 Manual Security Association ParametersParameter:SA Source IP AddressPath: Configuration Manager > Edit

Strany 95 - RTR4

Configuring IPsec ServicesA-6308630-15.1 Rev 00Parameter:Security Parameter IndexPath: Configuration Manager > Edit Circuit > Protocols > Edi

Strany 96

Site Manager Parameters308630-15.1 Rev 00A-7 Parameter:Cipher Key LengthPath: Configuration Manager > Protocols > IP > IP Security > Manua

Strany 97

Configuring IPsec ServicesA-8308630-15.1 Rev 00Parameter:Integrity AlgorithmPath: Configuration Manager > Protocols > IP > IP Security > M

Strany 98

Site Manager Parameters308630-15.1 Rev 00A-9 Parameter:Integrity Key (16 Byte Hex)Path: Configuration Manager > Protocols > IP > IP Security

Strany 99 - Appendix D

Configuring IPsec ServicesA-10308630-15.1 Rev 00Automated Security Association (IKE) ParametersParameter:SA NamePath: Configuration Manager > Proto

Strany 100 - IPsec Terminology

Site Manager Parameters308630-15.1 Rev 00A-11 Parameter:Pre-shared Key (hex)Path: Configuration Manager > Protocols > IP > IKEConfiguration M

Strany 101 - Configuration Considerations

viii 308630-15.1 Rev 00Appendix B Definitions of k CommandsAppendix C Configuration ExamplesInbound and Outbound Policies ...

Strany 102 - Feature Comparison Summary

Configuring IPsec ServicesA-12308630-15.1 Rev 00Parameter:Anti-Replay Window SizePath:Configuration Manager > Add Circuit > WAN Protocols > P

Strany 103 - 308630-15.1 Rev 00

308630-15.1 Rev 00B-1Appendix BDefinitions of k CommandsThis appendix contains definitions of the “k” commands that you use to work in the Technician

Strany 105 - Symptoms You May See

308630-15.1 Rev 00C-1 Appendix CConfiguration ExamplesThis appendix provides configuration examples for both automated and manual security association

Strany 106

Configuring IPsec ServicesC-2308630-15.1 Rev 00Automated SA (IKE) Policy ExamplesAs you review the security policy examples in this section, refer to

Strany 107 - Appendix E

Configuration Examples308630-15.1 Rev 00C-3 Example 1: Required Policies, Proposals, and SA Destinations on RTR1 and RTR2 to Protect Data Between RTR1

Strany 108

Configuring IPsec ServicesC-4308630-15.1 Rev 00Example 2: Required Policies, Proposals, and SA Destinations on RTR1 and RTR3 to Protect Data Between R

Strany 109

Configuration Examples308630-15.1 Rev 00C-5 Example 3: Required Policies, Proposals, and SA Destinations on RTR1 and RTR4 to Protect Data Between RTR1

Strany 110

Configuring IPsec ServicesC-6308630-15.1 Rev 00Figure C-2. IPsec Manual Outbound PoliciesExample 1: Required Policies on RTR1 to Protect Data Between

Strany 111

Configuration Examples308630-15.1 Rev 00C-7 Example 2: Required Policies on RTR2 to Protect Data Between RTR1 Subnet 192.32.5.0 and RTR2 Subnet 192.28

Strany 112

308630-15.1 Rev 00 ixFiguresFigure 1-1. IPsec Environment: Unique SAs Between Routers ...1-6Figure 1-2. IPsec Security

Strany 113

Configuring IPsec ServicesC-8308630-15.1 Rev 00Example 4: Required Outbound Policies on RTR3 to Protect DataBetween RTR2 Subnet 192.28.41.0 and RTR3 S

Strany 114

Configuration Examples308630-15.1 Rev 00C-9 Example 6: Required Policies on RTR2 to Allow ESP Traffic to Pass Through and OSPF to Exchange Routing Upd

Strany 115

Configuring IPsec ServicesC-10308630-15.1 Rev 00Manual Protect and Unprotect SA ConfigurationSAs specify which IPsec services are applied to the data

Strany 116

Configuration Examples308630-15.1 Rev 00C-11 SA Example 1: Configuring a Single Protect/Unprotect SA PairIn this example, a single Protect/Unprotect S

Strany 117

Configuring IPsec ServicesC-12308630-15.1 Rev 00SA Example 2: Configuring Two Protect/Unprotect SA PairsIn this example, two Protect/Unprotect SA pair

Strany 118

Configuration Examples308630-15.1 Rev 00C-13 SA Example 3: Configuring Multiple Protect/Unprotect SA PairsIn this example, multiple Protect/Unprotect

Strany 119

Configuring IPsec ServicesC-14308630-15.1 Rev 00The following two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR2 (r

Strany 120

Configuration Examples308630-15.1 Rev 00C-15 The next two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR3 (refer to

Strany 121

Configuring IPsec ServicesC-16308630-15.1 Rev 00The final two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR4 (refer

Strany 122

308630-15.1 Rev 00D-1 Appendix DContivity VPN Switch InteroperabilityThe BayRS implementation of IPsec can interoperate with the IPsec implementation

Komentáře k této Příručce

Žádné komentáře