Avaya Configuring IPsec Services Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Avaya Configuring IPsec Services. Avaya Configuring IPsec Services User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 122
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
BayRS Version 14.00
Part No. 308630-14.00 Rev 00
September 1999
4401 Great America Parkway
Santa Clara, CA 95054
Configuring IPsec Services
Zobrazit stránku 0
1 2 3 4 5 6 ... 121 122

Shrnutí obsahu

Strany 1 - Configuring IPsec Services

BayRS Version 14.00Part No. 308630-14.00 Rev 00September 19994401 Great America ParkwaySanta Clara, CA 95054Configuring IPsec Services

Strany 2 - Statement of Conditions

x 308630-14.00 Rev 00Appendix B Definitions of k CommandsAppendix C Configuration ExamplesInbound and Outbound Policies ...

Strany 3

Configuring IPsec ServicesC-16308630-14.00 Rev 00Contivity Extranet Switch InteroperabilityBayRS software IPsec functions interoperate with the IPsec

Strany 4

Configuration Examples308630-14.00 Rev 00C-17 TerminologyContivity uses different terminology than BayRS for some IPsec features. The table below comp

Strany 5

Configuring IPsec ServicesC-18308630-14.00 Rev 00Configuration SpecificsConfiguring a Contivity switch to interoperate with BayRS IPsec requires that

Strany 6

Configuration Examples308630-14.00 Rev 00C-19 Feature Comparison SummaryThis section lists the current support status of additional IPsec interoperabi

Strany 7 - Contents

Configuring IPsec ServicesC-20308630-14.00 Rev 00Contivity Features Not Supported by BayRSBayRS does not support the following Contivity features:• Ce

Strany 8

Configuration Examples308630-14.00 Rev 00C-21 • Packet capture: Run packet capture on the interface on which IPsec is configured (or on other interfac

Strany 9 - 308630-14.00 Rev 00 ix

Configuring IPsec ServicesC-22308630-14.00 Rev 00• Encryption or network addressing does not have matching values with the remote IPsec gateway config

Strany 10

Configuration Examples308630-14.00 Rev 00C-23 • IPsec SAs are deleted on the local side. This message is likely due to normal operation after IPsec SA

Strany 12

308630-14.00 Rev 00D-1Appendix DProtocol NumbersIPsec policies may include a protocol criterion that references the 1-byte protocol number field in an

Strany 13 - 308630-14.00 Rev 00 xiii

308630-14.00 Rev 00 xiFiguresFigure 1-1. IPsec Environment: Unique Security Associations (SAs)Between Routers ...

Strany 14

Configuring IPsec ServicesD-2308630-14.00 Rev 00Assigned Internet Protocol Numbers by NameTable D-1 lists the Internet protocol numbers alphabetically

Strany 15 - Before You Begin

Protocol Numbers308630-14.00 Rev 00D-3 14 EMCON n/a98 ENCAP Encapsulation Header50 ESP Encapsulating Security Payload97 ETHERIP Ethernet-within-IP Enc

Strany 16 - Text Conventions

Configuring IPsec ServicesD-4308630-14.00 Rev 0043 IPv6-Route Routing Header for IPv6111 IPX-in-IP IPX in IP28 IRTP Internet Reliable Transaction Prot

Strany 17 - Acronyms

Protocol Numbers308630-14.00 Rev 00D-5 27 RDP Reliable Data Protocol46 RSVP Reservation Protocol66 RVD MIT Remote Virtual Disk Protocol64 SAT-EXPAK SA

Strany 18

Configuring IPsec ServicesD-6308630-14.00 Rev 00Assigned Internet Protocol Numbers by NumberTable D-2 lists the Internet Protocol numbers in order.112

Strany 19 - How to Get Help

Protocol Numbers308630-14.00 Rev 00D-7 14 EMCON n/a15 XNET Cross Net Debugger16 CHAOS Chaos17 UDP User Datagram Protocol18 MUX Multiplexing19 DCN-MEAS

Strany 20

Configuring IPsec ServicesD-8308630-14.00 Rev 0043 IPv6-Route Routing Header for IPv644 IPv6-Frag Fragment Header for IPv645 IDRP Inter-Domain Routing

Strany 21 - Overview of IPsec

Protocol Numbers308630-14.00 Rev 00D-9 72 CPNX Computer Protocol Network Executive73 CPHB Computer Protocol Heart Beat74 WSN Wang Span Network75 PVP P

Strany 22 - Note Regarding IPsec and NAT

Configuring IPsec ServicesD-10308630-14.00 Rev 00101 IFMP Ipsilon Flow Management Protocol102 PNNI PNNI over IP103 PIM Protocol Independent Multicast1

Strany 23 - Supported WAN Protocols

308630-14.00 Rev 00Index-1Numbers3DES, 1-16AAccess Node (AN) support, 1-3Access Stack Node (ASN) support, 1-3acronyms, xvAdvanced Remote Node (ARN) su

Strany 25 - How IPsec Works

Index-2308630-14.00 Rev 00IIKEdescription, 1-12enabling, 3-1security associations, 3-8Image Builder, 2-2inbound security policies, 1-5, 1-9initializat

Strany 26 - IPsec Tunnel Mode

308630-14.00 Rev 00Index-3Rrandom number generator (RNG), 2-5random number, generating, 2-6Router Files Manager, 2-2router log, NPK confirmation, 2-8r

Strany 28 - Security Policies

308630-14.00 Rev 00 xiiiTablesTable 1-1. Security Policy Specifications ...1-14Table 1-2

Strany 30

308630-14.00 Rev 00 xv PrefaceThis guide describes the Nortel Networks™ implementation of IP Security and how to configure it on a Nortel Networks rou

Strany 31 - Security Associations

Configuring IPsec Servicesxvi 308630-14.00 Rev 00Text ConventionsThis guide uses the following text conventions:angle brackets (< >) Indicate th

Strany 32

Preface308630-14.00 Rev 00 xvii AcronymsThis guide uses the following acronyms:screen text Indicates system output, for example, prompts and system me

Strany 33

Configuring IPsec Servicesxviii 308630-14.00 Rev 00ISAKMP/Oakley Internet Security Association and Key Management Protocol (also known as IKE)IV initi

Strany 34

Preface308630-14.00 Rev 00 xix Hard-Copy Technical ManualsYou can print selected technical manuals and release notes free, directly from the Internet.

Strany 35 - Security Protocols

ii308630-14.00 Rev 00 Copyright © 1999 Nortel NetworksAll rights reserved. Printed in the USA. September 1999.The information in this document is subj

Strany 37 - Perfect Forward Secrecy

308630-14.00 Rev 001-1 Chapter 1Overview of IPsecThis chapter describes the emerging Internet Engineering Task Force standards for security services o

Strany 38

Configuring IPsec Services1-2308630-14.00 Rev 00About IPsecIP Security (IPsec) is the Internet Engineering Task Force (IETF) set of emerging standards

Strany 39 - Installing IPsec

Overview of IPsec308630-14.00 Rev 001-3 Network Requirements for Nortel Networks RoutersTo install the IP Security (IPsec) software, the router must b

Strany 40 - Installing the IPsec Software

Configuring IPsec Services1-4308630-14.00 Rev 00IPsec ServicesIPsec services consist of confidentiality, integrity, and authentication services for da

Strany 41 - 308630-14.00 Rev 00

Overview of IPsec308630-14.00 Rev 001-5 Additional IPsec ServicesWithin the IPsec framework, additional security services are provided. An access cont

Strany 42 - Securing Your Configuration

Configuring IPsec Services1-6308630-14.00 Rev 00Figure 1-1 shows how IPsec can protect data communications within an enterprise and from external host

Strany 43 - Generating NPKs

Overview of IPsec308630-14.00 Rev 001-7 IPsec ElementsIPsec has three important constructs:• Security gateways• Security policies• Security associatio

Strany 44 - Caution:

Configuring IPsec Services1-8308630-14.00 Rev 00Security GatewaysA security gateway establishes SAs between router interfaces configured with IPsec so

Strany 45

Overview of IPsec308630-14.00 Rev 001-9 There are two types of IPsec policies: inbound and outbound. An inbound policy is used for data packets arrivi

Strany 46 - Monitoring NPKs

308630-14.00 Rev 00iiiTHIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO

Strany 47 - Starting IPsec

Configuring IPsec Services1-10308630-14.00 Rev 00If the packet does not match any policy or matches a drop policy, the router rejects the packet. When

Strany 48 - Creating Policies

Overview of IPsec308630-14.00 Rev 001-11 • IP destination address• ProtocolTo specify the protocol criterion, you must provide the numeric value assig

Strany 49 - Policy Considerations

Configuring IPsec Services1-12308630-14.00 Rev 00Automated Security Associations Using Internet Key Exchange (IKE)Internet Key Exchange (IKE) is an au

Strany 50 - Creating an Outbound Policy

Overview of IPsec308630-14.00 Rev 001-13 Figure 1-4. Security Associations for Bidirectional TrafficUnder most circumstances, you will configure the I

Strany 51

Configuring IPsec Services1-14308630-14.00 Rev 00Summarizing Security Policies and SAsTable 1-1 and Table 1-2 provide a framework for understanding IP

Strany 52 - Creating an Inbound Policy

Overview of IPsec308630-14.00 Rev 001-15 In Table 1-2, the IP source and destination addresses for the SA are the tunnel end points for the IPsec tunn

Strany 53

Configuring IPsec Services1-16308630-14.00 Rev 00One or more of these security services must be applied whenever ESP is invoked. ESP applies the follo

Strany 54 - About Automated SA Creation

Overview of IPsec308630-14.00 Rev 001-17 Internet Key Exchange (IKE) ProtocolThe Internet Key Exchange (IKE) protocol negotiates and provides private

Strany 56 - About Manual SA Creation

308630-14.00 Rev 002-1 Chapter 2Installing IPsecThis chapter describes how to install and prepare to use IPsec. Before you configure IPsec, you need t

Strany 57

iv308630-14.00 Rev 00IF NORTEL NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT SHALL THE LIABILITY OF NORTEL NETWORKS RELAT

Strany 58

Configuring IPsec Services2-2308630-14.00 Rev 00Upgrading Router SoftwareTo install the IPsec software, you must be running BayRS Version 13.20 and Si

Strany 59 - Customizing IPsec

Installing IPsec308630-14.00 Rev 002-3 Completing the Installation ProcessTo complete the installation process:1.Open the Image Builder directory:• On

Strany 60 - Editing a Policy

Configuring IPsec Services2-4308630-14.00 Rev 00Securing Your SiteTo enforce IPsec, carefully restrict unauthorized access to the routers that encrypt

Strany 61 - Adding a Policy

Installing IPsec308630-14.00 Rev 002-5 Random Number Generator (RNG)The router software uses the secure random number generator (RNG) to generate init

Strany 62 - Frame Relay Protocol

Configuring IPsec Services2-6308630-14.00 Rev 00To generate an NPK, use a method available at your site to create random 16-digit hexadecimal numbers.

Strany 63

Installing IPsec308630-14.00 Rev 002-7 To enter an initial NPK and a seed for encryption:1.If necessary, create a password for the Technician Interfac

Strany 64 - Reordering Policies

Configuring IPsec Services2-8308630-14.00 Rev 00Changing an NPKTo maintain security, periodically change the NPK on each router.To change an NPK, ente

Strany 65 - Frame Relay

308630-14.00 Rev 003-1 Chapter 3Starting IPsecThis chapter includes the following information:Enabling IPsec and IKETo enable IPsec, configure an IP i

Strany 66

Configuring IPsec Services3-2308630-14.00 Rev 00When you use Site Manager to configure IPsec on an interface for the first time, configure the menu it

Strany 67 - Manual SA Modifications

Starting IPsec308630-14.00 Rev 003-3 Specifying an ActionThe action specification in a policy controls how a packet that matches the specified criteri

Strany 68

308630-14.00 Rev 00vThis software contains a DES implementation written by Eric Young ([email protected]). The implementation was written so as to conf

Strany 69 - Disabling IPsec

Configuring IPsec Services3-4308630-14.00 Rev 00Creating an Outbound PolicyTo create an outbound policy template and policy, complete the following ta

Strany 70

Starting IPsec308630-14.00 Rev 003-5 Policy9. Click on Add Policy. The Create Outbound Policy window opens.10. Enter the policy name in thePolicy Name

Strany 71 - Site Manager Parameters

Configuring IPsec Services3-6308630-14.00 Rev 00Creating an Inbound PolicyThe process for creating inbound policies is virtually identical to the proc

Strany 72 - Enabling IPsec Parameters

Starting IPsec308630-14.00 Rev 003-7 Policy9. Click on Add Policy. The Create Inbound Policy window opens.10. Enter the policy name in thePolicy Name

Strany 73 - IPsec Policy Parameters

Configuring IPsec Services3-8308630-14.00 Rev 00Creating Security AssociationsSecurity associations enable you to provide bidirectional protection for

Strany 74

Starting IPsec308630-14.00 Rev 003-9 Creating an Outbound Protect Policy With Automated SAs (IKE)To use IKE to create automated SAs, complete the foll

Strany 75

Configuring IPsec Services3-10308630-14.00 Rev 00About Manual SA CreationTo protect (encrypt or authenticate) data packets leaving the local IPsec int

Strany 76

Starting IPsec308630-14.00 Rev 003-11 Creating a Protect SA ManuallyTo manually create a Protect SA, complete the following tasks: Site Manager Proced

Strany 77

Configuring IPsec Services3-12308630-14.00 Rev 00Creating an Unprotect SA ManuallyTo manually create an Unprotect SA, complete the following tasks: Si

Strany 78

308630-14.00 Rev 004-1 Chapter 4Customizing IPsecThis chapter contains information about changing an IPsec configuration that you have already set up.

Strany 80

Configuring IPsec Services4-2308630-14.00 Rev 00Editing a PolicyTo edit an existing IPsec policy on a router interface, complete the following tasks:S

Strany 81

Customizing IPsec308630-14.00 Rev 004-3 Adding a PolicyThe procedure to add an IPsec policy to a router interface depends on the protocol used on the

Strany 82

Configuring IPsec Services4-4308630-14.00 Rev 00Frame Relay ProtocolTo add an IPsec policy to a router interface configured with frame relay, complete

Strany 83 - Definitions of k Commands

Customizing IPsec308630-14.00 Rev 004-5 10. If the Choose SA Type dialog opens, choose Automated SA and follow the instructions in “Creating an Outbou

Strany 84

Configuring IPsec Services4-6308630-14.00 Rev 00Reordering PoliciesThe procedure to reorder IPsec policies on a router interface depends on the protoc

Strany 85 - Appendix C

Customizing IPsec308630-14.00 Rev 004-7 Frame RelayTo change the order in which existing IPsec policies are applied on a router interface configured w

Strany 86

Configuring IPsec Services4-8308630-14.00 Rev 00Changing Existing Security AssociationsTo ensure the integrity of SAs, vital information such as IKE p

Strany 87

Customizing IPsec308630-14.00 Rev 004-9 Manual SA ModificationsThe procedure to modify manual SAs on a router interface depends on the protocol used o

Strany 88 - RTR4 Subnet 192.32.30.0

Configuring IPsec Services4-10308630-14.00 Rev 00Frame RelayTo change or add manual SAs on a router interface configured with frame relay, complete th

Strany 89 - Manual SA Policy Examples

Customizing IPsec308630-14.00 Rev 004-11 Disabling IPsecTo disable IPsec on all router interfaces configured for it, complete the following tasks: To

Strany 90

308630-14.00 Rev 00 viiContents PrefaceBefore You Begin ...

Strany 91

Configuring IPsec Services4-12308630-14.00 Rev 004. Click on Values and select Disable from the dialog box.5. Click on OK to close the dialog. The dia

Strany 92 - RTR1 and RTR2

308630-14.00 Rev 00A-1 Appendix ASite Manager ParametersThis appendix describes the Site Manager parameters for:• Creating a node protection key (NPK)

Strany 93 - RTR2

Configuring IPsec ServicesA-2308630-14.00 Rev 00Enabling IPsec ParametersParameter:IP Security EnablePath:Configuration Manager > Protocols > IP

Strany 94

Site Manager Parameters308630-14.00 Rev 00A-3 IPsec Policy ParametersParameter:Policy EnablePath: Configuration Manager > Protocols > IP > IP

Strany 95

Configuring IPsec ServicesA-4308630-14.00 Rev 00Manual Security Association ParametersParameter:SA Source IP AddressPath: Configuration Manager > P

Strany 96 - RTR4

Site Manager Parameters308630-14.00 Rev 00A-5 Parameter:Security Parameter IndexPath: Configuration Manager > Protocols > IP > IP Security &g

Strany 97

Configuring IPsec ServicesA-6308630-14.00 Rev 00Parameter:Cipher Key LengthPath: Configuration Manager > Protocols > IP > IP Security > Ma

Strany 98

Site Manager Parameters308630-14.00 Rev 00A-7 Parameter:Integrity AlgorithmPath: Configuration Manager > Protocols > IP > IP Security > Ma

Strany 99

Configuring IPsec ServicesA-8308630-14.00 Rev 00Parameter:Integrity KeyPath: Configuration Manager > Protocols > IP > IP Security > Manual

Strany 100 - Configuring Through a Browser

Site Manager Parameters308630-14.00 Rev 00A-9 Automated Security Association (IKE) ParametersParameter:SA NamePath: Configuration Manager > Protoco

Strany 101 - Terminology

viii 308630-14.00 Rev 00Security Associations ...1-11Automa

Strany 102 - Configuration Specifics

Configuring IPsec ServicesA-10308630-14.00 Rev 00Parameter:Pre-Shared Key (hex)Path: Configuration Manager > Protocols > IP > IKEConfiguratio

Strany 103 - Feature Comparison Summary

Site Manager Parameters308630-14.00 Rev 00A-11 Parameter:Anti-Replay Window SizePath:Configuration Manager > Add Circuit > WAN Protocols > PP

Strany 105 - Configuration Examples

308630-14.00 Rev 00B-1Appendix BDefinitions of k CommandsThis appendix contains definitions of the “k” commands that you use to work in the Technician

Strany 107

308630-14.00 Rev 00C-1 Appendix CConfiguration ExamplesThis appendix provides configuration examples for both automated and manual security associatio

Strany 108

Configuring IPsec ServicesC-2308630-14.00 Rev 00Automated SA (IKE) Policy ExamplesAs you review the security policy examples in this section, refer to

Strany 109 - Appendix D

Configuration Examples308630-14.00 Rev 00C-3 Example 1: Required Policies, Proposals, and SA Destinations on RTR1 and RTR2 to Protect Data Between RTR

Strany 110

Configuring IPsec ServicesC-4308630-14.00 Rev 00Example 3: Required Policies, Proposals, and SA Destinations on RTR1 and RTR4 to Protect Data Between

Strany 111

Configuration Examples308630-14.00 Rev 00C-5 Manual SA Policy ExamplesAs you review the security policy examples in this section, refer to Figure C-2.

Strany 112

308630-14.00 Rev 00 ixCreating an Outbound Policy ...3-4Creating an I

Strany 113

Configuring IPsec ServicesC-6308630-14.00 Rev 00Example 2: Required Policies on RTR2 to Protect Data Between RTR1 Subnet 192.32.5.0 and RTR2 Subnet 19

Strany 114

Configuration Examples308630-14.00 Rev 00C-7 Example 3: Required Policies on RTR2 to Protect Data Between RTR2 Subnet 192.28.41.0 and RTR3 Subnet 192.

Strany 115

Configuring IPsec ServicesC-8308630-14.00 Rev 00Example 6: Required Policies on RTR2 to Allow ESP Traffic to Pass Through and OSPF to Exchange Routing

Strany 116

Configuration Examples308630-14.00 Rev 00C-9 Example 7: Required Policies on RTR3 to Protect Data BetweenRTR3 Subnet 192.131.141.0 and RTR1 192.32.5.0

Strany 117

Configuring IPsec ServicesC-10308630-14.00 Rev 00SA Example 1: Configuring a Single Protect/Unprotect SA PairIn this example, a single Protect/Unprote

Strany 118

Configuration Examples308630-14.00 Rev 00C-11 SA Example 2: Configuring Two Protect/Unprotect SA PairsIn this example, two Protect/Unprotect SA pairs

Strany 119

Configuring IPsec ServicesC-12308630-14.00 Rev 00SA Example 3: Configuring Multiple Protect/Unprotect SA PairsIn this example, multiple Protect/Unprot

Strany 120

Configuration Examples308630-14.00 Rev 00C-13 The following two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR2 (ref

Strany 121

Configuring IPsec ServicesC-14308630-14.00 Rev 00The next two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR3 (refer

Strany 122

Configuration Examples308630-14.00 Rev 00C-15 The final two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR4 (refer t

Komentáře k této Příručce

Žádné komentáře