Avaya Configuring IPsec Services Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Manuels des logiciels Avaya Configuring IPsec Services. Avaya Configuring IPsec Services User's Manual [English] Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 122
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
BayRS Version 15.1
Part No. 308630-15.1 Rev 00
October 2001
600 Technology Park Drive
Billerica, MA 01821-4130
Configuring IPsec Services
Vue de la page 0
1 2 3 4 5 6 ... 121 122

Résumé du contenu

Page 1 - Configuring IPsec Services

BayRS Version 15.1Part No. 308630-15.1 Rev 00October 2001600 Technology Park DriveBillerica, MA 01821-4130Configuring IPsec Services

Page 3

Configuring IPsec ServicesD-2308630-15.1 Rev 00Web Browser Configuration of the Contivity VPN SwitchUnlike products that use BayRS software, you confi

Page 4

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-3 Configuration ConsiderationsWhen you configure a Contivity switch to interoperate with BayR

Page 5 - Contents

Configuring IPsec ServicesD-4308630-15.1 Rev 00PerformanceThe BayRS implementation of IPsec is slower than the Contivity implementation. Consider perf

Page 6

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-5 BayRS Features Not Supported by the Contivity VPN SwitchContivity does not support the foll

Page 7 - 308630-15.1 Rev 00 vii

Configuring IPsec ServicesD-6308630-15.1 Rev 00Troubleshooting BayRS-Contivity IPsec InteroperabilityUse the following troubleshooting tools to diagno

Page 8

Contivity VPN Switch Interoperability308630-15.1 Rev 00D-7 Symptoms You May SeeIf traffic does not appear to traverse the IPsec tunnel, first check fo

Page 9 - 308630-15.1 Rev 00 ix

Configuring IPsec ServicesD-8308630-15.1 Rev 00• IPsec SAs are deleted on the local side. This message is probably due to normal operation after IPsec

Page 10

308630-15.1 Rev 00E-1Appendix EProtocol NumbersIPsec policies may include a protocol criterion that references the 1-byte protocol number field in an

Page 11 - 308630-15.1 Rev 00 xi

Configuring IPsec ServicesE-2308630-15.1 Rev 00Assigned Internet Protocol Numbers by NameTable E-1 lists the Internet Protocol numbers alphabetically

Page 12

Protocol Numbers308630-15.1 Rev 00E-3 8 EGP Exterior Gateway Protocol88 EIGRP N/A14 EMCON N/A98 ENCAP Encapsulation Header50 ESP Encapsulating Securit

Page 13 - Before You Begin

308630-15.1 Rev 00 xiTablesTable 1-1. Security Policy Specifications ...1-14Table 1-2. M

Page 14 - Text Conventions

Configuring IPsec ServicesE-4308630-15.1 Rev 0041 IPv6 Internet Protocol version 644 IPv6-Frag Fragment Header for IPv658 IPv6-ICMP ICMP for IPv659 IP

Page 15 - Acronyms

Protocol Numbers308630-15.1 Rev 00E-5 103 PIM Protocol Independent Multicast131 PIPE Private IP Encapsulation within IP102 PNNI PNNI over IP21 PRM Pac

Page 16 - Hard-Copy Technical Manuals

Configuring IPsec ServicesE-6308630-15.1 Rev 0077 SUN-ND SUN ND Protocol-Temporary53 SWIPE IP with Encryption87 TCF N/A6 TCP Transmission Control Prot

Page 17 - How to Get Help

Protocol Numbers308630-15.1 Rev 00E-7 Assigned Internet Protocol Numbers by NumberTable E-2 lists the Internet Protocol numbers in order by protocol n

Page 18

Configuring IPsec ServicesE-8308630-15.1 Rev 0026 LEAF-2 Leaf-227 RDP Reliable Data Protocol28 IRTP Internet Reliable Transaction Protocol29 ISO-TP4 I

Page 19 - Overview of IPsec

Protocol Numbers308630-15.1 Rev 00E-9 55 MOBILE IP Mobility56 TLSP Transport Layer Security Protocol using Kryptonet key management57 SKIP N/A58 IPv6-

Page 20 - About IPsec

Configuring IPsec ServicesE-10308630-15.1 Rev 0084 TTP N/A85 NSFNET-IGP N/A86 DGP Dissimilar Gateway Protocol87 TCF N/A88 EIGRP N/A89 OSPFIGP N/A90 Sp

Page 21 - Supported WAN Protocols

Protocol Numbers308630-15.1 Rev 00E-11 113 PGM PGM Reliable Transport Protocol114 Any 0-hop protocol115 L2TP Layer Two Tunneling Protocol116 DDX D-II

Page 23 - How IPsec Works

308630-15.1 Rev 00Index-1Numbers3DES, 1-16AAccess Node (AN) support, 1-3Access Stack Node (ASN) support, 1-3acronyms, xvAdvanced Remote Node (ARN) sup

Page 25 - IPsec Elements

Index-2308630-15.1 Rev 00IIKEdescription, 1-11enabling, 3-1security associations, 3-7Image Builder, 2-1inbound security policies, 1-5, 1-9initializati

Page 26 - Security Policies

308630-15.1 Rev 00Index-3Ssecurityconfiguration, 2-4site considerations, 2-4security associationautomated, 3-7creating, 3-7description, 1-11examples,

Page 28

308630-15.1 Rev 00xiii PrefaceThis guide describes the Nortel Networks* implementation of IP Security (IPsec) and how to configure it on a Nortel Netw

Page 29 - Security Associations

Configuring IPsec Servicesxiv308630-15.1 Rev 00Text ConventionsThis guide uses the following text conventions:angle brackets (< >) Indicate that

Page 30

Preface308630-15.1 Rev 00xv AcronymsThis guide uses the following acronyms:screen text Indicates system output, for example, prompts and system messag

Page 31

Configuring IPsec Servicesxvi308630-15.1 Rev 00Hard-Copy Technical ManualsYou can print selected technical manuals and release notes free, directly fr

Page 32

Preface308630-15.1 Rev 00xvii How to Get HelpIf you purchased a service contract for your Nortel Networks product from a distributor or authorized res

Page 34

308630-15.1 Rev 001-1 Chapter 1Overview of IPsecThis chapter describes the emerging Internet Engineering Task Force (IETF) standards for security serv

Page 35 - Performance Considerations

ii308630-15.1 Rev 00 Copyright © 2001 Nortel NetworksAll rights reserved. October 2001.The information in this document is subject to change without n

Page 36

Configuring IPsec Services1-2308630-15.1 Rev 00About IPsecIP Security is the IETF set of emerging standards for security services for communications o

Page 37 - Installing IPsec

Overview of IPsec308630-15.1 Rev 001-3 Network Requirements for Nortel Networks RoutersTo install the IPsec software, the router must be running, at a

Page 38 - Installing the IPsec Software

Configuring IPsec Services1-4308630-15.1 Rev 00IPsec ServicesIPsec services consist of confidentiality, integrity, and authentication services for dat

Page 39

Overview of IPsec308630-15.1 Rev 001-5 Additional IPsec ServicesWithin the IPsec framework, additional security services are provided. An access contr

Page 40 - Securing Your Configuration

Configuring IPsec Services1-6308630-15.1 Rev 00Figure 1-1 shows how IPsec can protect data communications within an enterprise and from external hosts

Page 41 - Creating and Using NPKs

Overview of IPsec308630-15.1 Rev 001-7 IPsec ElementsIPsec has three important constructs:• Security gateways• Security policies• Security association

Page 42 - Caution:

Configuring IPsec Services1-8308630-15.1 Rev 00Security GatewaysA security gateway establishes SAs between router interfaces configured with IPsec sof

Page 43 - Changing an NPK

Overview of IPsec308630-15.1 Rev 001-9 The criteria (“selectors”) and action specifications used in your inbound and outbound policies are stored in t

Page 44 - Monitoring NPKs

Configuring IPsec Services1-10308630-15.1 Rev 00For an inbound security policy, the action can be one or two of the following:• Drop• Bypass• LogThe d

Page 45 - Starting IPsec

Overview of IPsec308630-15.1 Rev 001-11 To specify the protocol criterion, you must provide the numeric value assigned to the protocol for use over th

Page 46 - Creating Policies

308630-15.1 Rev 00iiiNortel Networks Inc. Software License AgreementThis Software License Agreement (“License Agreement”) is between you, the end-user

Page 47 - Policy Considerations

Configuring IPsec Services1-12308630-15.1 Rev 00To set up these security associations, IKE itself must create a confidential, secure connection betwee

Page 48 - (continued)

Overview of IPsec308630-15.1 Rev 001-13 Figure 1-4. Security Associations for Bidirectional TrafficUnder most circumstances, you configure the IKE pro

Page 49

Configuring IPsec Services1-14308630-15.1 Rev 00Examples of Security Policies and Security AssociationsTable 1-1 and Table 1-2 provide examples of how

Page 50

Overview of IPsec308630-15.1 Rev 001-15 In Table 1-2, the IP source and destination addresses for the SA are the tunnel end points for the IPsec tunne

Page 51 - Automated SA Creation

Configuring IPsec Services1-16308630-15.1 Rev 00ESP applies the following algorithms and transform identifiers to deliver its services:• DES (56-bit)•

Page 52

Overview of IPsec308630-15.1 Rev 001-17 Internet Key Exchange ProtocolThe IKE protocol negotiates and provides private and authenticated keying materi

Page 53 - About Manual SA Creation

Configuring IPsec Services1-18308630-15.1 Rev 00You can optimize performance by using the information in this section to plan and manage CPU resources

Page 54

308630-15.1 Rev 002-1 Chapter 2Installing IPsecThis chapter describes how to install and prepare to use IPsec. Before you configure IPsec, you must pe

Page 55

Configuring IPsec Services2-2308630-15.1 Rev 00Installing the IPsec SoftwareBefore you can enable and use IPsec services, you must create an IPsec-cap

Page 56

Installing IPsec308630-15.1 Rev 002-3 7.Click on Remove.The file capi.exe or capi.ppc is now listed under Available Components.8.Choose File > Save

Page 57 - Customizing IPsec

iv308630-15.1 Rev 004. Generala. If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks Software avail

Page 58 - Editing a Policy

Configuring IPsec Services2-4308630-15.1 Rev 00Securing Your SiteTo enforce IPsec, carefully restrict unauthorized access to the routers that encrypt

Page 59 - Adding a Policy

Installing IPsec308630-15.1 Rev 002-5 Random Number GeneratorThe router software uses the secure random number generator (RNG) to generate initializat

Page 60

Configuring IPsec Services2-6308630-15.1 Rev 00Entering an Initial NPK and a Seed for EncryptionBefore you can enable IPsec on a router, you must ente

Page 61

Installing IPsec308630-15.1 Rev 002-7 5.Type a random set of keystrokes. The secure shell informs you when you have typed the required number of keyst

Page 62 - Reordering Policies

Configuring IPsec Services2-8308630-15.1 Rev 005.Enter the following command:kset npk 0x<NPK_value><NPK_value> is the new 16-digit hexadec

Page 63

308630-15.1 Rev 003-1 Chapter 3Starting IPsecThis chapter provides instructions for configuring IPsec on an interface.Enabling IPsec and IKETo enable

Page 64 - Modifying Automated SAs (IKE)

Configuring IPsec Services3-2308630-15.1 Rev 00When you configure IPsec on an interface for the first time, configure the menu items displayed in the

Page 65 - Modifying Manual SAs

Starting IPsec308630-15.1 Rev 003-3 Specifying an ActionThe action specification in a policy controls how a packet that matches the specified criteria

Page 66

Configuring IPsec Services3-4308630-15.1 Rev 00Creating an Outbound Policy Template and PolicyTo create an outbound policy template and policy, comple

Page 67 - Disabling IPsec

Starting IPsec308630-15.1 Rev 003-5 11. In the Policy Name field, type a name for the policy.For a description of this parameter, see page A-4.12. Fro

Page 68

308630-15.1 Rev 00 vContents PrefaceBefore You Begin ...

Page 69 - Site Manager Parameters

Configuring IPsec Services3-6308630-15.1 Rev 00Creating an Inbound Policy Template and PolicyThe process for creating inbound policies is almost ident

Page 70 - Node Protection Key Parameter

Starting IPsec308630-15.1 Rev 003-7 Creating Security AssociationsSecurity associations enable you to provide bidirectional protection for data packet

Page 71 - IPsec Parameters

Configuring IPsec Services3-8308630-15.1 Rev 00Creating an Outbound Protect Policy with Automated SAs (IKE)To use IKE to create automated SAs, complet

Page 72 - IPsec Policy Parameters

Starting IPsec308630-15.1 Rev 003-9 About Manual SA CreationTo protect (encrypt or authenticate) data packets leaving the local IPsec interface, creat

Page 73

Configuring IPsec Services3-10308630-15.1 Rev 00For examples of how to configure manual SAs, see “Manual Protect and Unprotect SA Configuration” on pa

Page 74

Starting IPsec308630-15.1 Rev 003-11 Creating an Unprotect SA ManuallyTo create an Unprotect SA manually, complete the following tasks: Site Manager P

Page 76

308630-15.1 Rev 004-1 Chapter 4Customizing IPsecThis chapter provides information about changing an existing IPsec configuration. For information abou

Page 77

Configuring IPsec Services4-2308630-15.1 Rev 00Editing a PolicyTo edit an existing IPsec policy on a router interface, complete the following tasks:Si

Page 78

Customizing IPsec308630-15.1 Rev 004-3 Adding a PolicyThe procedure to add an IPsec policy to an existing IPsec interface depends on the connector typ

Page 79

vi 308630-15.1 Rev 00Security Associations ...1-11Automated

Page 80

Configuring IPsec Services4-4308630-15.1 Rev 00WAN Interface with Frame RelayTo add an IPsec policy to a router interface configured with frame relay,

Page 81 - Definitions of k Commands

Customizing IPsec308630-15.1 Rev 004-5 7. In the Policy Name field, type a name for the policy. Click on Help or see the parameter description on page

Page 82

Configuring IPsec Services4-6308630-15.1 Rev 00Reordering PoliciesThe procedure to reorder IPsec policies on a router interface depends on the connect

Page 83 - Configuration Examples

Customizing IPsec308630-15.1 Rev 004-7 WAN Interface with Frame RelayTo change the order in which existing IPsec policies are applied on a router inte

Page 84

Configuring IPsec Services4-8308630-15.1 Rev 00Changing Existing Security AssociationsTo ensure the integrity of SAs, vital information such as IKE pr

Page 85 - 192.32.10.0

Customizing IPsec308630-15.1 Rev 004-9 Modifying Manual SAsThe procedure to modify manual SAs on a router interface depends on the connector type and

Page 86 - 192.32.20.0

Configuring IPsec Services4-10308630-15.1 Rev 00WAN Interface with Frame RelayTo change or add manual SAs on a router interface configured with frame

Page 87 - Manual SA Policy Examples

Customizing IPsec308630-15.1 Rev 004-11 Disabling IPsecTo disable IPsec on all router interfaces configured for it, complete the following tasks: To d

Page 88

Configuring IPsec Services4-12308630-15.1 Rev 005. Click on Done. You return to the Circuit Definition window.6. Choose File > Exit. You return to

Page 89

308630-15.1 Rev 00A-1 Appendix ASite Manager ParametersThis appendix contains the Site Manager parameter descriptions for IPsec and IKE services. You

Page 90

308630-15.1 Rev 00 viiCreating an Outbound Policy Template and Policy ...3-4Creating an Inbound Policy

Page 91

Configuring IPsec ServicesA-2308630-15.1 Rev 00The Technician Interface allows you to modify parameters by issuing set and commit commands with the MI

Page 92 - RTR2

Site Manager Parameters308630-15.1 Rev 00A-3 IPsec ParametersParameter:IP Security EnablePath:Configuration Manager > Protocols > IP > IP Sec

Page 93

Configuring IPsec ServicesA-4308630-15.1 Rev 00IPsec Policy ParametersParameter:Policy EnablePath: Configuration Manager > Protocols > IP > I

Page 94

Site Manager Parameters308630-15.1 Rev 00A-5 Manual Security Association ParametersParameter:SA Source IP AddressPath: Configuration Manager > Edit

Page 95 - RTR4

Configuring IPsec ServicesA-6308630-15.1 Rev 00Parameter:Security Parameter IndexPath: Configuration Manager > Edit Circuit > Protocols > Edi

Page 96

Site Manager Parameters308630-15.1 Rev 00A-7 Parameter:Cipher Key LengthPath: Configuration Manager > Protocols > IP > IP Security > Manua

Page 97

Configuring IPsec ServicesA-8308630-15.1 Rev 00Parameter:Integrity AlgorithmPath: Configuration Manager > Protocols > IP > IP Security > M

Page 98

Site Manager Parameters308630-15.1 Rev 00A-9 Parameter:Integrity Key (16 Byte Hex)Path: Configuration Manager > Protocols > IP > IP Security

Page 99 - Appendix D

Configuring IPsec ServicesA-10308630-15.1 Rev 00Automated Security Association (IKE) ParametersParameter:SA NamePath: Configuration Manager > Proto

Page 100 - IPsec Terminology

Site Manager Parameters308630-15.1 Rev 00A-11 Parameter:Pre-shared Key (hex)Path: Configuration Manager > Protocols > IP > IKEConfiguration M

Page 101 - Configuration Considerations

viii 308630-15.1 Rev 00Appendix B Definitions of k CommandsAppendix C Configuration ExamplesInbound and Outbound Policies ...

Page 102 - Feature Comparison Summary

Configuring IPsec ServicesA-12308630-15.1 Rev 00Parameter:Anti-Replay Window SizePath:Configuration Manager > Add Circuit > WAN Protocols > P

Page 103 - 308630-15.1 Rev 00

308630-15.1 Rev 00B-1Appendix BDefinitions of k CommandsThis appendix contains definitions of the “k” commands that you use to work in the Technician

Page 105 - Symptoms You May See

308630-15.1 Rev 00C-1 Appendix CConfiguration ExamplesThis appendix provides configuration examples for both automated and manual security association

Page 106

Configuring IPsec ServicesC-2308630-15.1 Rev 00Automated SA (IKE) Policy ExamplesAs you review the security policy examples in this section, refer to

Page 107 - Appendix E

Configuration Examples308630-15.1 Rev 00C-3 Example 1: Required Policies, Proposals, and SA Destinations on RTR1 and RTR2 to Protect Data Between RTR1

Page 108

Configuring IPsec ServicesC-4308630-15.1 Rev 00Example 2: Required Policies, Proposals, and SA Destinations on RTR1 and RTR3 to Protect Data Between R

Page 109

Configuration Examples308630-15.1 Rev 00C-5 Example 3: Required Policies, Proposals, and SA Destinations on RTR1 and RTR4 to Protect Data Between RTR1

Page 110

Configuring IPsec ServicesC-6308630-15.1 Rev 00Figure C-2. IPsec Manual Outbound PoliciesExample 1: Required Policies on RTR1 to Protect Data Between

Page 111

Configuration Examples308630-15.1 Rev 00C-7 Example 2: Required Policies on RTR2 to Protect Data Between RTR1 Subnet 192.32.5.0 and RTR2 Subnet 192.28

Page 112

308630-15.1 Rev 00 ixFiguresFigure 1-1. IPsec Environment: Unique SAs Between Routers ...1-6Figure 1-2. IPsec Security

Page 113

Configuring IPsec ServicesC-8308630-15.1 Rev 00Example 4: Required Outbound Policies on RTR3 to Protect DataBetween RTR2 Subnet 192.28.41.0 and RTR3 S

Page 114

Configuration Examples308630-15.1 Rev 00C-9 Example 6: Required Policies on RTR2 to Allow ESP Traffic to Pass Through and OSPF to Exchange Routing Upd

Page 115

Configuring IPsec ServicesC-10308630-15.1 Rev 00Manual Protect and Unprotect SA ConfigurationSAs specify which IPsec services are applied to the data

Page 116

Configuration Examples308630-15.1 Rev 00C-11 SA Example 1: Configuring a Single Protect/Unprotect SA PairIn this example, a single Protect/Unprotect S

Page 117

Configuring IPsec ServicesC-12308630-15.1 Rev 00SA Example 2: Configuring Two Protect/Unprotect SA PairsIn this example, two Protect/Unprotect SA pair

Page 118

Configuration Examples308630-15.1 Rev 00C-13 SA Example 3: Configuring Multiple Protect/Unprotect SA PairsIn this example, multiple Protect/Unprotect

Page 119

Configuring IPsec ServicesC-14308630-15.1 Rev 00The following two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR2 (r

Page 120

Configuration Examples308630-15.1 Rev 00C-15 The next two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR3 (refer to

Page 121

Configuring IPsec ServicesC-16308630-15.1 Rev 00The final two tables show the settings for the Protect/Unprotect SA pairs between RTR1 and RTR4 (refer

Page 122

308630-15.1 Rev 00D-1 Appendix DContivity VPN Switch InteroperabilityThe BayRS implementation of IPsec can interoperate with the IPsec implementation

Commentaires sur ces manuels

Pas de commentaire