
vi 304111-A Rev 00
Security Policy Database (SPD) ..............................................................................2-6
Security Associations .....................................................................................................2-6
Security Associations for Bidirectional Traffic ...........................................................2-7
Security Parameter Index (SPI) ................................................................................2-7
Summarizing Security Policies and SAs .........................................................................2-8
Security Protocols ...........................................................................................................2-9
IPsec Services ..............................................................................................................2-10
Confidentiality .........................................................................................................2-10
Integrity ..................................................................................................................2-10
Authentication ........................................................................................................2-10
Installing IP Security (IPsec) Software .........................................................................2-11
Upgrading Software ...............................................................................................2-11
Installation Instructions ..........................................................................................2-11
Chapter 3
Configuring IPsec
Site Security ...................................................................................................................3-1
Configuration Security ....................................................................................................3-1
Encryption Keys .......................................................................................................3-2
Random Number Generator (RNG) .........................................................................3-2
Node Protection Key (NPK) ............................................................................................3-2
Generating and Using NPKs ....................................................................................3-3
Generating an NPK ...........................................................................................3-3
Entering the NPK on the Router ........................................................................3-4
Entering an NPK and a Seed for Encryption ..................................................................3-4
Changing NPKs ........................................................................................................3-5
Monitoring NPKs ......................................................................................................3-6
Enabling IPsec ................................................................................................................3-6
Creating Policies .............................................................................................................3-7
Criteria Specifications ..............................................................................................3-7
Action Specifications ................................................................................................3-7
Policy Considerations ...............................................................................................3-8
Creating Security Associations .....................................................................................3-11
Disabling IPsec .............................................................................................................3-13
Komentáře k této Příručce