Avaya Configuring IPsec Services Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie Avaya Configuring IPsec Services. Avaya Configuring IPsec Services User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 0
BayRS Version 14.00
Part No. 308630-14.00 Rev 00
September 1999
4401 Great America Parkway
Santa Clara, CA 95054
Configuring IPsec Services
Przeglądanie stron 0
1 2 3 4 5 6 ... 121 122

Podsumowanie treści

Strona 1 - Configuring IPsec Services

BayRS Version 14.00Part No. 308630-14.00 Rev 00September 19994401 Great America ParkwaySanta Clara, CA 95054Configuring IPsec Services

Strona 2 - Statement of Conditions

x 308630-14.00 Rev 00Appendix B Definitions of k CommandsAppendix C Configuration ExamplesInbound and Outbound Policies ...

Strona 3

Configuring IPsec ServicesC-16308630-14.00 Rev 00Contivity Extranet Switch InteroperabilityBayRS software IPsec functions interoperate with the IPsec

Strona 4

Configuration Examples308630-14.00 Rev 00C-17 TerminologyContivity uses different terminology than BayRS for some IPsec features. The table below comp

Strona 5

Configuring IPsec ServicesC-18308630-14.00 Rev 00Configuration SpecificsConfiguring a Contivity switch to interoperate with BayRS IPsec requires that

Strona 6

Configuration Examples308630-14.00 Rev 00C-19 Feature Comparison SummaryThis section lists the current support status of additional IPsec interoperabi

Strona 7 - Contents

Configuring IPsec ServicesC-20308630-14.00 Rev 00Contivity Features Not Supported by BayRSBayRS does not support the following Contivity features:• Ce

Strona 8

Configuration Examples308630-14.00 Rev 00C-21 • Packet capture: Run packet capture on the interface on which IPsec is configured (or on other interfac

Strona 9 - 308630-14.00 Rev 00 ix

Configuring IPsec ServicesC-22308630-14.00 Rev 00• Encryption or network addressing does not have matching values with the remote IPsec gateway config

Strona 10

Configuration Examples308630-14.00 Rev 00C-23 • IPsec SAs are deleted on the local side. This message is likely due to normal operation after IPsec SA

Strona 12

308630-14.00 Rev 00D-1Appendix DProtocol NumbersIPsec policies may include a protocol criterion that references the 1-byte protocol number field in an

Strona 13 - 308630-14.00 Rev 00 xiii

308630-14.00 Rev 00 xiFiguresFigure 1-1. IPsec Environment: Unique Security Associations (SAs)Between Routers ...

Strona 14

Configuring IPsec ServicesD-2308630-14.00 Rev 00Assigned Internet Protocol Numbers by NameTable D-1 lists the Internet protocol numbers alphabetically

Strona 15 - Before You Begin

Protocol Numbers308630-14.00 Rev 00D-3 14 EMCON n/a98 ENCAP Encapsulation Header50 ESP Encapsulating Security Payload97 ETHERIP Ethernet-within-IP Enc

Strona 16 - Text Conventions

Configuring IPsec ServicesD-4308630-14.00 Rev 0043 IPv6-Route Routing Header for IPv6111 IPX-in-IP IPX in IP28 IRTP Internet Reliable Transaction Prot

Strona 17 - Acronyms

Protocol Numbers308630-14.00 Rev 00D-5 27 RDP Reliable Data Protocol46 RSVP Reservation Protocol66 RVD MIT Remote Virtual Disk Protocol64 SAT-EXPAK SA

Strona 18

Configuring IPsec ServicesD-6308630-14.00 Rev 00Assigned Internet Protocol Numbers by NumberTable D-2 lists the Internet Protocol numbers in order.112

Strona 19 - How to Get Help

Protocol Numbers308630-14.00 Rev 00D-7 14 EMCON n/a15 XNET Cross Net Debugger16 CHAOS Chaos17 UDP User Datagram Protocol18 MUX Multiplexing19 DCN-MEAS

Strona 20

Configuring IPsec ServicesD-8308630-14.00 Rev 0043 IPv6-Route Routing Header for IPv644 IPv6-Frag Fragment Header for IPv645 IDRP Inter-Domain Routing

Strona 21 - Overview of IPsec

Protocol Numbers308630-14.00 Rev 00D-9 72 CPNX Computer Protocol Network Executive73 CPHB Computer Protocol Heart Beat74 WSN Wang Span Network75 PVP P

Strona 22 - Note Regarding IPsec and NAT

Configuring IPsec ServicesD-10308630-14.00 Rev 00101 IFMP Ipsilon Flow Management Protocol102 PNNI PNNI over IP103 PIM Protocol Independent Multicast1

Strona 23 - Supported WAN Protocols

308630-14.00 Rev 00Index-1Numbers3DES, 1-16AAccess Node (AN) support, 1-3Access Stack Node (ASN) support, 1-3acronyms, xvAdvanced Remote Node (ARN) su

Strona 25 - How IPsec Works

Index-2308630-14.00 Rev 00IIKEdescription, 1-12enabling, 3-1security associations, 3-8Image Builder, 2-2inbound security policies, 1-5, 1-9initializat

Strona 26 - IPsec Tunnel Mode

308630-14.00 Rev 00Index-3Rrandom number generator (RNG), 2-5random number, generating, 2-6Router Files Manager, 2-2router log, NPK confirmation, 2-8r

Strona 28 - Security Policies

308630-14.00 Rev 00 xiiiTablesTable 1-1. Security Policy Specifications ...1-14Table 1-2

Strona 30

308630-14.00 Rev 00 xv PrefaceThis guide describes the Nortel Networks™ implementation of IP Security and how to configure it on a Nortel Networks rou

Strona 31 - Security Associations

Configuring IPsec Servicesxvi 308630-14.00 Rev 00Text ConventionsThis guide uses the following text conventions:angle brackets (< >) Indicate th

Strona 32

Preface308630-14.00 Rev 00 xvii AcronymsThis guide uses the following acronyms:screen text Indicates system output, for example, prompts and system me

Strona 33

Configuring IPsec Servicesxviii 308630-14.00 Rev 00ISAKMP/Oakley Internet Security Association and Key Management Protocol (also known as IKE)IV initi

Strona 34

Preface308630-14.00 Rev 00 xix Hard-Copy Technical ManualsYou can print selected technical manuals and release notes free, directly from the Internet.

Strona 35 - Security Protocols

ii308630-14.00 Rev 00 Copyright © 1999 Nortel NetworksAll rights reserved. Printed in the USA. September 1999.The information in this document is subj

Strona 37 - Perfect Forward Secrecy

308630-14.00 Rev 001-1 Chapter 1Overview of IPsecThis chapter describes the emerging Internet Engineering Task Force standards for security services o

Strona 38

Configuring IPsec Services1-2308630-14.00 Rev 00About IPsecIP Security (IPsec) is the Internet Engineering Task Force (IETF) set of emerging standards

Strona 39 - Installing IPsec

Overview of IPsec308630-14.00 Rev 001-3 Network Requirements for Nortel Networks RoutersTo install the IP Security (IPsec) software, the router must b

Strona 40 - Installing the IPsec Software

Configuring IPsec Services1-4308630-14.00 Rev 00IPsec ServicesIPsec services consist of confidentiality, integrity, and authentication services for da

Strona 41 - 308630-14.00 Rev 00

Overview of IPsec308630-14.00 Rev 001-5 Additional IPsec ServicesWithin the IPsec framework, additional security services are provided. An access cont

Strona 42 - Securing Your Configuration

Configuring IPsec Services1-6308630-14.00 Rev 00Figure 1-1 shows how IPsec can protect data communications within an enterprise and from external host

Strona 43 - Generating NPKs

Overview of IPsec308630-14.00 Rev 001-7 IPsec ElementsIPsec has three important constructs:• Security gateways• Security policies• Security associatio

Strona 44 - Caution:

Configuring IPsec Services1-8308630-14.00 Rev 00Security GatewaysA security gateway establishes SAs between router interfaces configured with IPsec so

Strona 45

Overview of IPsec308630-14.00 Rev 001-9 There are two types of IPsec policies: inbound and outbound. An inbound policy is used for data packets arrivi

Strona 46 - Monitoring NPKs

308630-14.00 Rev 00iiiTHIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN THIS AGREEMENT ARE THE ONLY TERMS UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO

Strona 47 - Starting IPsec

Configuring IPsec Services1-10308630-14.00 Rev 00If the packet does not match any policy or matches a drop policy, the router rejects the packet. When

Strona 48 - Creating Policies

Overview of IPsec308630-14.00 Rev 001-11 • IP destination address• ProtocolTo specify the protocol criterion, you must provide the numeric value assig

Strona 49 - Policy Considerations

Configuring IPsec Services1-12308630-14.00 Rev 00Automated Security Associations Using Internet Key Exchange (IKE)Internet Key Exchange (IKE) is an au

Strona 50 - Creating an Outbound Policy

Overview of IPsec308630-14.00 Rev 001-13 Figure 1-4. Security Associations for Bidirectional TrafficUnder most circumstances, you will configure the I

Strona 51

Configuring IPsec Services1-14308630-14.00 Rev 00Summarizing Security Policies and SAsTable 1-1 and Table 1-2 provide a framework for understanding IP

Strona 52 - Creating an Inbound Policy

Overview of IPsec308630-14.00 Rev 001-15 In Table 1-2, the IP source and destination addresses for the SA are the tunnel end points for the IPsec tunn

Strona 53

Configuring IPsec Services1-16308630-14.00 Rev 00One or more of these security services must be applied whenever ESP is invoked. ESP applies the follo

Strona 54 - About Automated SA Creation

Overview of IPsec308630-14.00 Rev 001-17 Internet Key Exchange (IKE) ProtocolThe Internet Key Exchange (IKE) protocol negotiates and provides private

Strona 56 - About Manual SA Creation

308630-14.00 Rev 002-1 Chapter 2Installing IPsecThis chapter describes how to install and prepare to use IPsec. Before you configure IPsec, you need t

Strona 57

iv308630-14.00 Rev 00IF NORTEL NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT SHALL THE LIABILITY OF NORTEL NETWORKS RELAT

Strona 58

Configuring IPsec Services2-2308630-14.00 Rev 00Upgrading Router SoftwareTo install the IPsec software, you must be running BayRS Version 13.20 and Si

Strona 59 - Customizing IPsec

Installing IPsec308630-14.00 Rev 002-3 Completing the Installation ProcessTo complete the installation process:1.Open the Image Builder directory:• On

Strona 60 - Editing a Policy

Configuring IPsec Services2-4308630-14.00 Rev 00Securing Your SiteTo enforce IPsec, carefully restrict unauthorized access to the routers that encrypt

Strona 61 - Adding a Policy

Installing IPsec308630-14.00 Rev 002-5 Random Number Generator (RNG)The router software uses the secure random number generator (RNG) to generate init

Strona 62 - Frame Relay Protocol

Configuring IPsec Services2-6308630-14.00 Rev 00To generate an NPK, use a method available at your site to create random 16-digit hexadecimal numbers.

Strona 63

Installing IPsec308630-14.00 Rev 002-7 To enter an initial NPK and a seed for encryption:1.If necessary, create a password for the Technician Interfac

Strona 64 - Reordering Policies

Configuring IPsec Services2-8308630-14.00 Rev 00Changing an NPKTo maintain security, periodically change the NPK on each router.To change an NPK, ente

Strona 65 - Frame Relay

308630-14.00 Rev 003-1 Chapter 3Starting IPsecThis chapter includes the following information:Enabling IPsec and IKETo enable IPsec, configure an IP i

Strona 66

Configuring IPsec Services3-2308630-14.00 Rev 00When you use Site Manager to configure IPsec on an interface for the first time, configure the menu it

Strona 67 - Manual SA Modifications

Starting IPsec308630-14.00 Rev 003-3 Specifying an ActionThe action specification in a policy controls how a packet that matches the specified criteri

Strona 68

308630-14.00 Rev 00vThis software contains a DES implementation written by Eric Young ([email protected]). The implementation was written so as to conf

Strona 69 - Disabling IPsec

Configuring IPsec Services3-4308630-14.00 Rev 00Creating an Outbound PolicyTo create an outbound policy template and policy, complete the following ta

Strona 70

Starting IPsec308630-14.00 Rev 003-5 Policy9. Click on Add Policy. The Create Outbound Policy window opens.10. Enter the policy name in thePolicy Name

Strona 71 - Site Manager Parameters

Configuring IPsec Services3-6308630-14.00 Rev 00Creating an Inbound PolicyThe process for creating inbound policies is virtually identical to the proc

Strona 72 - Enabling IPsec Parameters

Starting IPsec308630-14.00 Rev 003-7 Policy9. Click on Add Policy. The Create Inbound Policy window opens.10. Enter the policy name in thePolicy Name

Strona 73 - IPsec Policy Parameters

Configuring IPsec Services3-8308630-14.00 Rev 00Creating Security AssociationsSecurity associations enable you to provide bidirectional protection for

Strona 74

Starting IPsec308630-14.00 Rev 003-9 Creating an Outbound Protect Policy With Automated SAs (IKE)To use IKE to create automated SAs, complete the foll

Strona 75

Configuring IPsec Services3-10308630-14.00 Rev 00About Manual SA CreationTo protect (encrypt or authenticate) data packets leaving the local IPsec int

Strona 76

Starting IPsec308630-14.00 Rev 003-11 Creating a Protect SA ManuallyTo manually create a Protect SA, complete the following tasks: Site Manager Proced

Strona 77

Configuring IPsec Services3-12308630-14.00 Rev 00Creating an Unprotect SA ManuallyTo manually create an Unprotect SA, complete the following tasks: Si

Strona 78

308630-14.00 Rev 004-1 Chapter 4Customizing IPsecThis chapter contains information about changing an IPsec configuration that you have already set up.

Strona 80

Configuring IPsec Services4-2308630-14.00 Rev 00Editing a PolicyTo edit an existing IPsec policy on a router interface, complete the following tasks:S

Strona 81

Customizing IPsec308630-14.00 Rev 004-3 Adding a PolicyThe procedure to add an IPsec policy to a router interface depends on the protocol used on the

Strona 82

Configuring IPsec Services4-4308630-14.00 Rev 00Frame Relay ProtocolTo add an IPsec policy to a router interface configured with frame relay, complete

Strona 83 - Definitions of k Commands

Customizing IPsec308630-14.00 Rev 004-5 10. If the Choose SA Type dialog opens, choose Automated SA and follow the instructions in “Creating an Outbou

Strona 84

Configuring IPsec Services4-6308630-14.00 Rev 00Reordering PoliciesThe procedure to reorder IPsec policies on a router interface depends on the protoc

Strona 85 - Appendix C

Customizing IPsec308630-14.00 Rev 004-7 Frame RelayTo change the order in which existing IPsec policies are applied on a router interface configured w

Strona 86

Configuring IPsec Services4-8308630-14.00 Rev 00Changing Existing Security AssociationsTo ensure the integrity of SAs, vital information such as IKE p

Strona 87

Customizing IPsec308630-14.00 Rev 004-9 Manual SA ModificationsThe procedure to modify manual SAs on a router interface depends on the protocol used o

Strona 88 - RTR4 Subnet 192.32.30.0

Configuring IPsec Services4-10308630-14.00 Rev 00Frame RelayTo change or add manual SAs on a router interface configured with frame relay, complete th

Strona 89 - Manual SA Policy Examples

Customizing IPsec308630-14.00 Rev 004-11 Disabling IPsecTo disable IPsec on all router interfaces configured for it, complete the following tasks: To

Strona 90

308630-14.00 Rev 00 viiContents PrefaceBefore You Begin ...

Strona 91

Configuring IPsec Services4-12308630-14.00 Rev 004. Click on Values and select Disable from the dialog box.5. Click on OK to close the dialog. The dia

Strona 92 - RTR1 and RTR2

308630-14.00 Rev 00A-1 Appendix ASite Manager ParametersThis appendix describes the Site Manager parameters for:• Creating a node protection key (NPK)

Strona 93 - RTR2

Configuring IPsec ServicesA-2308630-14.00 Rev 00Enabling IPsec ParametersParameter:IP Security EnablePath:Configuration Manager > Protocols > IP

Strona 94

Site Manager Parameters308630-14.00 Rev 00A-3 IPsec Policy ParametersParameter:Policy EnablePath: Configuration Manager > Protocols > IP > IP

Strona 95

Configuring IPsec ServicesA-4308630-14.00 Rev 00Manual Security Association ParametersParameter:SA Source IP AddressPath: Configuration Manager > P

Strona 96 - RTR4

Site Manager Parameters308630-14.00 Rev 00A-5 Parameter:Security Parameter IndexPath: Configuration Manager > Protocols > IP > IP Security &g

Strona 97

Configuring IPsec ServicesA-6308630-14.00 Rev 00Parameter:Cipher Key LengthPath: Configuration Manager > Protocols > IP > IP Security > Ma

Strona 98

Site Manager Parameters308630-14.00 Rev 00A-7 Parameter:Integrity AlgorithmPath: Configuration Manager > Protocols > IP > IP Security > Ma

Strona 99

Configuring IPsec ServicesA-8308630-14.00 Rev 00Parameter:Integrity KeyPath: Configuration Manager > Protocols > IP > IP Security > Manual

Strona 100 - Configuring Through a Browser

Site Manager Parameters308630-14.00 Rev 00A-9 Automated Security Association (IKE) ParametersParameter:SA NamePath: Configuration Manager > Protoco

Strona 101 - Terminology

viii 308630-14.00 Rev 00Security Associations ...1-11Automa

Strona 102 - Configuration Specifics

Configuring IPsec ServicesA-10308630-14.00 Rev 00Parameter:Pre-Shared Key (hex)Path: Configuration Manager > Protocols > IP > IKEConfiguratio

Strona 103 - Feature Comparison Summary

Site Manager Parameters308630-14.00 Rev 00A-11 Parameter:Anti-Replay Window SizePath:Configuration Manager > Add Circuit > WAN Protocols > PP

Strona 105 - Configuration Examples

308630-14.00 Rev 00B-1Appendix BDefinitions of k CommandsThis appendix contains definitions of the “k” commands that you use to work in the Technician

Strona 107

308630-14.00 Rev 00C-1 Appendix CConfiguration ExamplesThis appendix provides configuration examples for both automated and manual security associatio

Strona 108

Configuring IPsec ServicesC-2308630-14.00 Rev 00Automated SA (IKE) Policy ExamplesAs you review the security policy examples in this section, refer to

Strona 109 - Appendix D

Configuration Examples308630-14.00 Rev 00C-3 Example 1: Required Policies, Proposals, and SA Destinations on RTR1 and RTR2 to Protect Data Between RTR

Strona 110

Configuring IPsec ServicesC-4308630-14.00 Rev 00Example 3: Required Policies, Proposals, and SA Destinations on RTR1 and RTR4 to Protect Data Between

Strona 111

Configuration Examples308630-14.00 Rev 00C-5 Manual SA Policy ExamplesAs you review the security policy examples in this section, refer to Figure C-2.

Strona 112

308630-14.00 Rev 00 ixCreating an Outbound Policy ...3-4Creating an I

Strona 113

Configuring IPsec ServicesC-6308630-14.00 Rev 00Example 2: Required Policies on RTR2 to Protect Data Between RTR1 Subnet 192.32.5.0 and RTR2 Subnet 19

Strona 114

Configuration Examples308630-14.00 Rev 00C-7 Example 3: Required Policies on RTR2 to Protect Data Between RTR2 Subnet 192.28.41.0 and RTR3 Subnet 192.

Strona 115

Configuring IPsec ServicesC-8308630-14.00 Rev 00Example 6: Required Policies on RTR2 to Allow ESP Traffic to Pass Through and OSPF to Exchange Routing

Strona 116

Configuration Examples308630-14.00 Rev 00C-9 Example 7: Required Policies on RTR3 to Protect Data BetweenRTR3 Subnet 192.131.141.0 and RTR1 192.32.5.0

Strona 117

Configuring IPsec ServicesC-10308630-14.00 Rev 00SA Example 1: Configuring a Single Protect/Unprotect SA PairIn this example, a single Protect/Unprote

Strona 118

Configuration Examples308630-14.00 Rev 00C-11 SA Example 2: Configuring Two Protect/Unprotect SA PairsIn this example, two Protect/Unprotect SA pairs

Strona 119

Configuring IPsec ServicesC-12308630-14.00 Rev 00SA Example 3: Configuring Multiple Protect/Unprotect SA PairsIn this example, multiple Protect/Unprot

Strona 120

Configuration Examples308630-14.00 Rev 00C-13 The following two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR2 (ref

Strona 121

Configuring IPsec ServicesC-14308630-14.00 Rev 00The next two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR3 (refer

Strona 122

Configuration Examples308630-14.00 Rev 00C-15 The final two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR4 (refer t

Komentarze do niniejszej Instrukcji

Brak uwag