Avaya Configuring IPsec Services Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Podręczniki do oprogramowania Avaya Configuring IPsec Services. Avaya Configuring IPsec Services User's Manual [English] Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 122
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
BayRS Version 15.1
Part No. 308630-15.1 Rev 00
October 2001
600 Technology Park Drive
Billerica, MA 01821-4130
Configuring IPsec Services
Przeglądanie stron 0
1 2 3 4 5 6 ... 121 122

Podsumowanie treści

Strona 1 - Configuring IPsec Services

BayRS Version 15.1Part No. 308630-15.1 Rev 00October 2001600 Technology Park DriveBillerica, MA 01821-4130Configuring IPsec Services

Strona 3

Configuring IPsec ServicesD-2308630-15.1 Rev 00Web Browser Configuration of the Contivity VPN SwitchUnlike products that use BayRS software, you confi

Strona 4

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-3 Configuration ConsiderationsWhen you configure a Contivity switch to interoperate with BayR

Strona 5 - Contents

Configuring IPsec ServicesD-4308630-15.1 Rev 00PerformanceThe BayRS implementation of IPsec is slower than the Contivity implementation. Consider perf

Strona 6

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-5 BayRS Features Not Supported by the Contivity VPN SwitchContivity does not support the foll

Strona 7 - 308630-15.1 Rev 00 vii

Configuring IPsec ServicesD-6308630-15.1 Rev 00Troubleshooting BayRS-Contivity IPsec InteroperabilityUse the following troubleshooting tools to diagno

Strona 8

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-7 Symptoms You May SeeIf traffic does not appear to traverse the IPsec tunnel, first check fo

Strona 9 - 308630-15.1 Rev 00 ix

Configuring IPsec ServicesD-8308630-15.1 Rev 00• IPsec SAs are deleted on the local side. This message is probably due to normal operation after IPsec

Strona 10

308630-15.1 Rev 00E-1Appendix EProtocol NumbersIPsec policies may include a protocol criterion that references the 1-byte protocol number field in an

Strona 11 - 308630-15.1 Rev 00 xi

Configuring IPsec ServicesE-2308630-15.1 Rev 00Assigned Internet Protocol Numbers by NameTable E-1 lists the Internet Protocol numbers alphabetically

Strona 12

Protocol Numbers308630-15.1 Rev 00E-3 8 EGP Exterior Gateway Protocol88 EIGRP N/A14 EMCON N/A98 ENCAP Encapsulation Header50 ESP Encapsulating Securit

Strona 13 - Before You Begin

308630-15.1 Rev 00 xiTablesTable 1-1. Security Policy Specifications ...1-14Table 1-2. M

Strona 14 - Text Conventions

Configuring IPsec ServicesE-4308630-15.1 Rev 0041 IPv6 Internet Protocol version 644 IPv6-Frag Fragment Header for IPv658 IPv6-ICMP ICMP for IPv659 IP

Strona 15 - Acronyms

Protocol Numbers308630-15.1 Rev 00E-5 103 PIM Protocol Independent Multicast131 PIPE Private IP Encapsulation within IP102 PNNI PNNI over IP21 PRM Pac

Strona 16 - Hard-Copy Technical Manuals

Configuring IPsec ServicesE-6308630-15.1 Rev 0077 SUN-ND SUN ND Protocol-Temporary53 SWIPE IP with Encryption87 TCF N/A6 TCP Transmission Control Prot

Strona 17 - How to Get Help

Protocol Numbers308630-15.1 Rev 00E-7 Assigned Internet Protocol Numbers by NumberTable E-2 lists the Internet Protocol numbers in order by protocol n

Strona 18

Configuring IPsec ServicesE-8308630-15.1 Rev 0026 LEAF-2 Leaf-227 RDP Reliable Data Protocol28 IRTP Internet Reliable Transaction Protocol29 ISO-TP4 I

Strona 19 - Overview of IPsec

Protocol Numbers308630-15.1 Rev 00E-9 55 MOBILE IP Mobility56 TLSP Transport Layer Security Protocol using Kryptonet key management57 SKIP N/A58 IPv6-

Strona 20 - About IPsec

Configuring IPsec ServicesE-10308630-15.1 Rev 0084 TTP N/A85 NSFNET-IGP N/A86 DGP Dissimilar Gateway Protocol87 TCF N/A88 EIGRP N/A89 OSPFIGP N/A90 Sp

Strona 21 - Supported WAN Protocols

Protocol Numbers308630-15.1 Rev 00E-11 113 PGM PGM Reliable Transport Protocol114 Any 0-hop protocol115 L2TP Layer Two Tunneling Protocol116 DDX D-II

Strona 23 - How IPsec Works

308630-15.1 Rev 00Index-1Numbers3DES, 1-16AAccess Node (AN) support, 1-3Access Stack Node (ASN) support, 1-3acronyms, xvAdvanced Remote Node (ARN) sup

Strona 25 - IPsec Elements

Index-2308630-15.1 Rev 00IIKEdescription, 1-11enabling, 3-1security associations, 3-7Image Builder, 2-1inbound security policies, 1-5, 1-9initializati

Strona 26 - Security Policies

308630-15.1 Rev 00Index-3Ssecurityconfiguration, 2-4site considerations, 2-4security associationautomated, 3-7creating, 3-7description, 1-11examples,

Strona 28

308630-15.1 Rev 00xiii PrefaceThis guide describes the Nortel Networks* implementation of IP Security (IPsec) and how to configure it on a Nortel Netw

Strona 29 - Security Associations

Configuring IPsec Servicesxiv308630-15.1 Rev 00Text ConventionsThis guide uses the following text conventions:angle brackets (< >) Indicate that

Strona 30

Preface308630-15.1 Rev 00xv AcronymsThis guide uses the following acronyms:screen text Indicates system output, for example, prompts and system messag

Strona 31

Configuring IPsec Servicesxvi308630-15.1 Rev 00Hard-Copy Technical ManualsYou can print selected technical manuals and release notes free, directly fr

Strona 32

Preface308630-15.1 Rev 00xvii How to Get HelpIf you purchased a service contract for your Nortel Networks product from a distributor or authorized res

Strona 34

308630-15.1 Rev 001-1 Chapter 1Overview of IPsecThis chapter describes the emerging Internet Engineering Task Force (IETF) standards for security serv

Strona 35 - Performance Considerations

ii308630-15.1 Rev 00 Copyright © 2001 Nortel NetworksAll rights reserved. October 2001.The information in this document is subject to change without n

Strona 36

Configuring IPsec Services1-2308630-15.1 Rev 00About IPsecIP Security is the IETF set of emerging standards for security services for communications o

Strona 37 - Installing IPsec

Overview of IPsec308630-15.1 Rev 001-3 Network Requirements for Nortel Networks RoutersTo install the IPsec software, the router must be running, at a

Strona 38 - Installing the IPsec Software

Configuring IPsec Services1-4308630-15.1 Rev 00IPsec ServicesIPsec services consist of confidentiality, integrity, and authentication services for dat

Strona 39

Overview of IPsec308630-15.1 Rev 001-5 Additional IPsec ServicesWithin the IPsec framework, additional security services are provided. An access contr

Strona 40 - Securing Your Configuration

Configuring IPsec Services1-6308630-15.1 Rev 00Figure 1-1 shows how IPsec can protect data communications within an enterprise and from external hosts

Strona 41 - Creating and Using NPKs

Overview of IPsec308630-15.1 Rev 001-7 IPsec ElementsIPsec has three important constructs:• Security gateways• Security policies• Security association

Strona 42 - Caution:

Configuring IPsec Services1-8308630-15.1 Rev 00Security GatewaysA security gateway establishes SAs between router interfaces configured with IPsec sof

Strona 43 - Changing an NPK

Overview of IPsec308630-15.1 Rev 001-9 The criteria (“selectors”) and action specifications used in your inbound and outbound policies are stored in t

Strona 44 - Monitoring NPKs

Configuring IPsec Services1-10308630-15.1 Rev 00For an inbound security policy, the action can be one or two of the following:• Drop• Bypass• LogThe d

Strona 45 - Starting IPsec

Overview of IPsec308630-15.1 Rev 001-11 To specify the protocol criterion, you must provide the numeric value assigned to the protocol for use over th

Strona 46 - Creating Policies

308630-15.1 Rev 00iiiNortel Networks Inc. Software License AgreementThis Software License Agreement (“License Agreement”) is between you, the end-user

Strona 47 - Policy Considerations

Configuring IPsec Services1-12308630-15.1 Rev 00To set up these security associations, IKE itself must create a confidential, secure connection betwee

Strona 48 - (continued)

Overview of IPsec308630-15.1 Rev 001-13 Figure 1-4. Security Associations for Bidirectional TrafficUnder most circumstances, you configure the IKE pro

Strona 49

Configuring IPsec Services1-14308630-15.1 Rev 00Examples of Security Policies and Security AssociationsTable 1-1 and Table 1-2 provide examples of how

Strona 50

Overview of IPsec308630-15.1 Rev 001-15 In Table 1-2, the IP source and destination addresses for the SA are the tunnel end points for the IPsec tunne

Strona 51 - Automated SA Creation

Configuring IPsec Services1-16308630-15.1 Rev 00ESP applies the following algorithms and transform identifiers to deliver its services:• DES (56-bit)•

Strona 52

Overview of IPsec308630-15.1 Rev 001-17 Internet Key Exchange ProtocolThe IKE protocol negotiates and provides private and authenticated keying materi

Strona 53 - About Manual SA Creation

Configuring IPsec Services1-18308630-15.1 Rev 00You can optimize performance by using the information in this section to plan and manage CPU resources

Strona 54

308630-15.1 Rev 002-1 Chapter 2Installing IPsecThis chapter describes how to install and prepare to use IPsec. Before you configure IPsec, you must pe

Strona 55

Configuring IPsec Services2-2308630-15.1 Rev 00Installing the IPsec SoftwareBefore you can enable and use IPsec services, you must create an IPsec-cap

Strona 56

Installing IPsec308630-15.1 Rev 002-3 7.Click on Remove.The file capi.exe or capi.ppc is now listed under Available Components.8.Choose File > Save

Strona 57 - Customizing IPsec

iv308630-15.1 Rev 004. Generala. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks Software avail

Strona 58 - Editing a Policy

Configuring IPsec Services2-4308630-15.1 Rev 00Securing Your SiteTo enforce IPsec, carefully restrict unauthorized access to the routers that encrypt

Strona 59 - Adding a Policy

Installing IPsec308630-15.1 Rev 002-5 Random Number GeneratorThe router software uses the secure random number generator (RNG) to generate initializat

Strona 60

Configuring IPsec Services2-6308630-15.1 Rev 00Entering an Initial NPK and a Seed for EncryptionBefore you can enable IPsec on a router, you must ente

Strona 61

Installing IPsec308630-15.1 Rev 002-7 5.Type a random set of keystrokes. The secure shell informs you when you have typed the required number of keyst

Strona 62 - Reordering Policies

Configuring IPsec Services2-8308630-15.1 Rev 005.Enter the following command:kset npk 0x<NPK_value><NPK_value> is the new 16-digit hexadec

Strona 63

308630-15.1 Rev 003-1 Chapter 3Starting IPsecThis chapter provides instructions for configuring IPsec on an interface.Enabling IPsec and IKETo enable

Strona 64 - Modifying Automated SAs (IKE)

Configuring IPsec Services3-2308630-15.1 Rev 00When you configure IPsec on an interface for the first time, configure the menu items displayed in the

Strona 65 - Modifying Manual SAs

Starting IPsec308630-15.1 Rev 003-3 Specifying an ActionThe action specification in a policy controls how a packet that matches the specified criteria

Strona 66

Configuring IPsec Services3-4308630-15.1 Rev 00Creating an Outbound Policy Template and PolicyTo create an outbound policy template and policy, comple

Strona 67 - Disabling IPsec

Starting IPsec308630-15.1 Rev 003-5 11. In the Policy Name field, type a name for the policy.For a description of this parameter, see page A-4.12. Fro

Strona 68

308630-15.1 Rev 00 vContents PrefaceBefore You Begin ...

Strona 69 - Site Manager Parameters

Configuring IPsec Services3-6308630-15.1 Rev 00Creating an Inbound Policy Template and PolicyThe process for creating inbound policies is almost ident

Strona 70 - Node Protection Key Parameter

Starting IPsec308630-15.1 Rev 003-7 Creating Security AssociationsSecurity associations enable you to provide bidirectional protection for data packet

Strona 71 - IPsec Parameters

Configuring IPsec Services3-8308630-15.1 Rev 00Creating an Outbound Protect Policy with Automated SAs (IKE)To use IKE to create automated SAs, complet

Strona 72 - IPsec Policy Parameters

Starting IPsec308630-15.1 Rev 003-9 About Manual SA CreationTo protect (encrypt or authenticate) data packets leaving the local IPsec interface, creat

Strona 73

Configuring IPsec Services3-10308630-15.1 Rev 00For examples of how to configure manual SAs, see “Manual Protect and Unprotect SA Configuration” on pa

Strona 74

Starting IPsec308630-15.1 Rev 003-11 Creating an Unprotect SA ManuallyTo create an Unprotect SA manually, complete the following tasks: Site Manager P

Strona 76

308630-15.1 Rev 004-1 Chapter 4Customizing IPsecThis chapter provides information about changing an existing IPsec configuration. For information abou

Strona 77

Configuring IPsec Services4-2308630-15.1 Rev 00Editing a PolicyTo edit an existing IPsec policy on a router interface, complete the following tasks:Si

Strona 78

Customizing IPsec308630-15.1 Rev 004-3 Adding a PolicyThe procedure to add an IPsec policy to an existing IPsec interface depends on the connector typ

Strona 79

vi 308630-15.1 Rev 00Security Associations ...1-11Automated

Strona 80

Configuring IPsec Services4-4308630-15.1 Rev 00WAN Interface with Frame RelayTo add an IPsec policy to a router interface configured with frame relay,

Strona 81 - Definitions of k Commands

Customizing IPsec308630-15.1 Rev 004-5 7. In the Policy Name field, type a name for the policy. Click on Help or see the parameter description on page

Strona 82

Configuring IPsec Services4-6308630-15.1 Rev 00Reordering PoliciesThe procedure to reorder IPsec policies on a router interface depends on the connect

Strona 83 - Configuration Examples

Customizing IPsec308630-15.1 Rev 004-7 WAN Interface with Frame RelayTo change the order in which existing IPsec policies are applied on a router inte

Strona 84

Configuring IPsec Services4-8308630-15.1 Rev 00Changing Existing Security AssociationsTo ensure the integrity of SAs, vital information such as IKE pr

Strona 85 - 192.32.10.0

Customizing IPsec308630-15.1 Rev 004-9 Modifying Manual SAsThe procedure to modify manual SAs on a router interface depends on the connector type and

Strona 86 - 192.32.20.0

Configuring IPsec Services4-10308630-15.1 Rev 00WAN Interface with Frame RelayTo change or add manual SAs on a router interface configured with frame

Strona 87 - Manual SA Policy Examples

Customizing IPsec308630-15.1 Rev 004-11 Disabling IPsecTo disable IPsec on all router interfaces configured for it, complete the following tasks: To d

Strona 88

Configuring IPsec Services4-12308630-15.1 Rev 005. Click on Done. You return to the Circuit Definition window.6. Choose File > Exit. You return to

Strona 89

308630-15.1 Rev 00A-1 Appendix ASite Manager ParametersThis appendix contains the Site Manager parameter descriptions for IPsec and IKE services. You

Strona 90

308630-15.1 Rev 00 viiCreating an Outbound Policy Template and Policy ...3-4Creating an Inbound Policy

Strona 91

Configuring IPsec ServicesA-2308630-15.1 Rev 00The Technician Interface allows you to modify parameters by issuing set and commit commands with the MI

Strona 92 - RTR2

Site Manager Parameters308630-15.1 Rev 00A-3 IPsec ParametersParameter:IP Security EnablePath:Configuration Manager > Protocols > IP > IP Sec

Strona 93

Configuring IPsec ServicesA-4308630-15.1 Rev 00IPsec Policy ParametersParameter:Policy EnablePath: Configuration Manager > Protocols > IP > I

Strona 94

Site Manager Parameters308630-15.1 Rev 00A-5 Manual Security Association ParametersParameter:SA Source IP AddressPath: Configuration Manager > Edit

Strona 95 - RTR4

Configuring IPsec ServicesA-6308630-15.1 Rev 00Parameter:Security Parameter IndexPath: Configuration Manager > Edit Circuit > Protocols > Edi

Strona 96

Site Manager Parameters308630-15.1 Rev 00A-7 Parameter:Cipher Key LengthPath: Configuration Manager > Protocols > IP > IP Security > Manua

Strona 97

Configuring IPsec ServicesA-8308630-15.1 Rev 00Parameter:Integrity AlgorithmPath: Configuration Manager > Protocols > IP > IP Security > M

Strona 98

Site Manager Parameters308630-15.1 Rev 00A-9 Parameter:Integrity Key (16 Byte Hex)Path: Configuration Manager > Protocols > IP > IP Security

Strona 99 - Appendix D

Configuring IPsec ServicesA-10308630-15.1 Rev 00Automated Security Association (IKE) ParametersParameter:SA NamePath: Configuration Manager > Proto

Strona 100 - IPsec Terminology

Site Manager Parameters308630-15.1 Rev 00A-11 Parameter:Pre-shared Key (hex)Path: Configuration Manager > Protocols > IP > IKEConfiguration M

Strona 101 - Configuration Considerations

viii 308630-15.1 Rev 00Appendix B Definitions of k CommandsAppendix C Configuration ExamplesInbound and Outbound Policies ...

Strona 102 - Feature Comparison Summary

Configuring IPsec ServicesA-12308630-15.1 Rev 00Parameter:Anti-Replay Window SizePath:Configuration Manager > Add Circuit > WAN Protocols > P

Strona 103 - 308630-15.1 Rev 00

308630-15.1 Rev 00B-1Appendix BDefinitions of k CommandsThis appendix contains definitions of the “k” commands that you use to work in the Technician

Strona 105 - Symptoms You May See

308630-15.1 Rev 00C-1 Appendix CConfiguration ExamplesThis appendix provides configuration examples for both automated and manual security association

Strona 106

Configuring IPsec ServicesC-2308630-15.1 Rev 00Automated SA (IKE) Policy ExamplesAs you review the security policy examples in this section, refer to

Strona 107 - Appendix E

Configuration Examples308630-15.1 Rev 00C-3 Example 1: Required Policies, Proposals, and SA Destinations on RTR1 and RTR2 to Protect Data Between RTR1

Strona 108

Configuring IPsec ServicesC-4308630-15.1 Rev 00Example 2: Required Policies, Proposals, and SA Destinations on RTR1 and RTR3 to Protect Data Between R

Strona 109

Configuration Examples308630-15.1 Rev 00C-5 Example 3: Required Policies, Proposals, and SA Destinations on RTR1 and RTR4 to Protect Data Between RTR1

Strona 110

Configuring IPsec ServicesC-6308630-15.1 Rev 00Figure C-2. IPsec Manual Outbound PoliciesExample 1: Required Policies on RTR1 to Protect Data Between

Strona 111

Configuration Examples308630-15.1 Rev 00C-7 Example 2: Required Policies on RTR2 to Protect Data Between RTR1 Subnet 192.32.5.0 and RTR2 Subnet 192.28

Strona 112

308630-15.1 Rev 00 ixFiguresFigure 1-1. IPsec Environment: Unique SAs Between Routers ...1-6Figure 1-2. IPsec Security

Strona 113

Configuring IPsec ServicesC-8308630-15.1 Rev 00Example 4: Required Outbound Policies on RTR3 to Protect DataBetween RTR2 Subnet 192.28.41.0 and RTR3 S

Strona 114

Configuration Examples308630-15.1 Rev 00C-9 Example 6: Required Policies on RTR2 to Allow ESP Traffic to Pass Through and OSPF to Exchange Routing Upd

Strona 115

Configuring IPsec ServicesC-10308630-15.1 Rev 00Manual Protect and Unprotect SA ConfigurationSAs specify which IPsec services are applied to the data

Strona 116

Configuration Examples308630-15.1 Rev 00C-11 SA Example 1: Configuring a Single Protect/Unprotect SA PairIn this example, a single Protect/Unprotect S

Strona 117

Configuring IPsec ServicesC-12308630-15.1 Rev 00SA Example 2: Configuring Two Protect/Unprotect SA PairsIn this example, two Protect/Unprotect SA pair

Strona 118

Configuration Examples308630-15.1 Rev 00C-13 SA Example 3: Configuring Multiple Protect/Unprotect SA PairsIn this example, multiple Protect/Unprotect

Strona 119

Configuring IPsec ServicesC-14308630-15.1 Rev 00The following two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR2 (r

Strona 120

Configuration Examples308630-15.1 Rev 00C-15 The next two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR3 (refer to

Strona 121

Configuring IPsec ServicesC-16308630-15.1 Rev 00The final two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR4 (refer

Strona 122

308630-15.1 Rev 00D-1 Appendix DContivity VPN Switch InteroperabilityThe BayRS implementation of IPsec can interoperate with the IPsec implementation

Komentarze do niniejszej Instrukcji

Brak uwag