EasyManuals Logo
Home>HP>Switch>3600 v2 Series

HP 3600 v2 Series Configuration Guide

HP 3600 v2 Series
449 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #9 background imageLoading...
Page #9 background image
vii
Configuring IPsec ···················································································································································· 270
Overview ······································································································································································· 270
Basic concepts ····················································································································································· 270
IPsec for IPv6 routing protocols ·························································································································· 273
Protocols and standards ····································································································································· 273
FIPS compliance ··························································································································································· 273
Configuring IPsec ························································································································································· 273
Implementing ACL-based IPsec ··································································································································· 273
Feature restrictions and guidelines ···················································································································· 273
ACL-based IPsec configuration task list ············································································································· 274
Configuring ACLs ················································································································································ 274
Configuring an IPsec proposal ·························································································································· 276
Configuring an IPsec policy ······························································································································· 277
Applying an IPsec policy group to an interface ······························································································· 281
Configuring the IPsec session idle timeout ········································································································ 281
Enabling ACL checking of de-encapsulated IPsec packets ············································································· 282
Configuring the IPsec anti-replay function ········································································································ 282
Configuring packet information pre-extraction ································································································ 283
Configuring IPsec for IPv6 routing protocols ············································································································· 283
Displaying and maintaining IPsec ······························································································································ 284
IPsec configuration examples······································································································································ 285
IKE-based IPsec tunnel for IPv4 packets configuration example ····································································· 285
IPsec for RIPng configuration example ·············································································································· 287
Configuring IKE ······················································································································································· 291
Overview ······································································································································································· 291
IKE security mechanism ······································································································································· 291
IKE operation ······················································································································································· 291
IKE functions ························································································································································· 292
Relationship between IKE and IPsec ·················································································································· 293
Protocols and standards ····································································································································· 293
IKE configuration task list ············································································································································ 293
Configuring a name for the local security gateway ································································································· 294
Configuring an IKE proposal ······································································································································ 294
Configuring an IKE peer ·············································································································································· 295
Setting keepalive timers ··············································································································································· 297
Setting the NAT keepalive timer ································································································································· 297
Configuring a DPD detector ········································································································································ 298
Disabling next payload field checking ······················································································································ 298
Displaying and maintaining IKE ································································································································· 299
IKE configuration example ·········································································································································· 299
Troubleshooting IKE ····················································································································································· 302
Invalid user ID ······················································································································································ 302
Proposal mismatch ·············································································································································· 302
Failing to establish an IPsec tunnel ···················································································································· 303
ACL configuration error ······································································································································ 303
Configuring SSH2.0 ··············································································································································· 304
Overview ······································································································································································· 304
SSH operation ····················································································································································· 304
SSH connection across VPNs ····························································································································· 306
FIPS compliance ··························································································································································· 307
Configuring the switch as an SSH server ·················································································································· 307
SSH server configuration task list ······················································································································ 307
Generating local key pairs ································································································································· 307

Table of Contents

Other manuals for HP 3600 v2 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP 3600 v2 Series and is the answer not in the manual?

HP 3600 v2 Series Specifications

General IconGeneral
BrandHP
Model3600 v2 Series
CategorySwitch
LanguageEnglish

Related product manuals