HP 5500 Ei 5500 Si Switch Series Configuration Guide
Here you can view all the pages of manual HP 5500 Ei 5500 Si Switch Series Configuration Guide. The HP manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 1941
276 Both AH and ESP provide authentication services, but the authentication service provided by AH is stronger. In practice, you can choose either or both security protocols. When both AH and ESP are used, an IP packet is encapsulated first by ESP and then by AH. Figure 98 sho ws the format of IPsec packets. Basic concepts Security association A security association is an agreement negotiated between two communicating parties called IPsec peers. It comprises a set of parameters for data prot...
Page 1942
277 Figure 98 Encapsulation by security pr otocols in different modes Authentication algorithms and encryption algorithms • Authentication algorithms IPsec uses hash algorithms to perform authentication. A hash al gorithm produces a fixed-length digest for an arbitrary-length message. IPsec peers respectively calculate message digests for each packet. If the resulting digests are iden tical, the packet is considered intact. IPsec supports the following hash algorithms for authentication:...
Page 1943
278 IPsec for IPv6 routing protocols You can use IPsec to protect routing information and defend against attacks for these IPv6 routing protocols: OSPFv3, IPv6 BGP, and RIPng. The HP 5500 EI switches support using IPsec for OSPFv3, IPv6 BGP, and RIPng; the HP 5500 SI switches only support using IPsec for RIPng. IPsec enables these IPv6 routing protocols to encapsulate outbound protocol packets and de-encapsulate inbound protocol packets with the AH or ESP prot ocol. If an inbound protocol packet...
Page 1944
279 Step Command Remarks 1. Enter system view. system-view N/A 2. Create an IPsec proposal and enter its view. ipsec proposal proposal-name By default, no IPsec proposal exists. 3. Specify the security protocol for the proposal. transform { ah | ah-esp | esp } Optional. ESP by default. Only when a security protocol is selected, can you configure security algorithms for it. For example, you can specify the ESP-specific security algorithms only when you select ESP as the...
Page 1945
280 Configuring an IPsec policy IPsec policies define which IPsec proposals should be used to protect which data flows. An IPsec policy is uniquely identified by its name and sequence number. The switch supports only manual IPsec policies. The parameters of a manual IPsec policy are all configured manually, such as the keys and the SPIs. Configuration guidelines To ensure successful SA negotiations, follow these guidelines when configuring manual IPsec policies: • Within a certain routed...
Page 1946
281 Step Command Remarks 7. Configure keys for the SAs. • Configure an authentication key in hexadecimal for AH: sa authentication-hex { inbound | outbound } ah hex-key • Configure an authentication key in characters for AH: sa string-key { inbound | outbound } ah string-key • Configure a key in characters for ESP: sa string-key { inbound | outbound } esp string-key • Configure an authentication key in hexadecimal for ESP: sa authentication-hex { inbound | outbound } esp...
Page 1947
282 Network requirements As shown in Figure 99, Switch A, Switch B, and Switch C are connected. They learn IPv6 routing information through RIPng. Configure IPsec for RIPng so that RIPng packets exchanged between the switches are transmitted through an IPsec tunnel. Configure IPsec to use the security protocol ESP, the encryption algorithm DES, and the authentication algorithm SHA1-HMAC-96. Figure 99 Network diagram Configuation considerations To meet the requirements, perform the...
Page 1948
283 [SwitchA-ipsec-policy-manual-policy001-10] sa string-key inbound esp abc\ defg [SwitchA-ipsec-policy-manual-policy001-10] quit # Apply IPsec policy policy001 to the RIPng process. [SwitchA] ripng 1 [SwitchA-ripng-1] enable ipsec-policy policy001 [SwitchA-ripng-1] quit 2. Configure Switch B # Assign an IPv6 address to each interface. (Details not shown.) # Create a RIPng process and enable it on VLAN-interface 100 and VLAN-interface 200. system-view [SwitchB] ripng 1 [SwitchB-ripng-1]...
Page 1949
284 [SwitchC-ripng-1] quit [SwitchC] interface vlan-interface 200 [SwitchC-Vlan-interface200] ripng 1 enable [SwitchC-Vlan-interface200] quit # Create an IPsec proposal named tran1, and set the encapsulation mo de to transport mode, the security protocol to ESP, the encryption algorithm to DES, and authentication algorithm to SHA1-HMAC-96. [SwitchC] ipsec proposal tran1 [SwitchC-ipsec-proposal-tran1] encapsulation-mode transport [SwitchC-ipsec-proposal-tran1] transform esp...
Page 1950
285 Using the display ipsec sa command on Switch A, you will s ee the information about the inbound and outbound SAs. display ipsec sa =============================== Protocol: RIPng =============================== ----------------------------- IPsec policy name: policy001 sequence number: 10 mode: manual ----------------------------- connection id: 1 encapsulation mode: transport perfect forward secrecy: tunnel: flow: [inbound ESP SAs] spi:...