EasyManuals Logo

HPE FlexNetwork 5510 HI Series Security Configuration Guide

HPE FlexNetwork 5510 HI Series
551 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #308 background imageLoading...
Page #308 background image
295
Step
Command
Remarks
10. (Optional.) Specify an inside
VPN instance.
inside-vpn
vpn-instance
vpn-name
By default, no inside VPN
instance is specified for an IKE
profile, and the device
forwards protected data to the
VPN instance where the
interface receiving the data
resides.
11. (Optional.) Specify a priority
for the IKE profile.
priority
number
By default, the priority of an
IKE profile is 100.
Configuring an IKE proposal
An IKE proposal defines a set of attributes describing how IKE negotiation in phase 1 should take
place. You can create multiple IKE proposals with different priorities. The priority of an IKE proposal
is represented by its sequence number. The lower the sequence number, the higher the priority.
Two peers must have at least one matching IKE proposal for successful IKE negotiation. During IKE
negotiation:
• The initiator sends its IKE proposals to the peer.
ï‚¡ If the initiator is using an IPsec policy with an IKE profile, the initiator sends all IKE proposals
specified for the IKE profile to the peer. An IKE proposal specified earlier for the IKE profile
has a higher priority.
ï‚¡ If the initiator is using an IPsec policy with no IKE profile, the initiator sends all its IKE
proposals to the peer. An IKE proposal with a smaller number has a higher priority.
• The peer searches its own IKE proposals for a match. The search starts from the IKE proposal
with the highest priority and proceeds in descending order of priority until a match is found. The
matching IKE proposals are used to establish the IKE SA. If all user-defined IKE proposals are
found mismatching, the two peers use their default IKE proposals to establish the IKE SA.
Two matching IKE proposals have the same encryption algorithm, authentication method,
authentication algorithm, and DH group. The SA lifetime takes the smaller one of the two proposals'
SA lifetime settings.
To configure an IKE proposal:
Step
Command
Remarks
1. Enter system view.
system-view
N/A
2.
Create an IKE proposal
and enter its view.
ike
proposal
proposal-number
By default, there is an IKE
proposal that is used as the
default IKE proposal.
3. Specify
an encryption
algorithm for the IKE
proposal.
• In non-FIPS mode:
encryption-algorithm
{ 3des-cbc | aes-cbc-128 |
aes-cbc-192 | aes-cbc-256 |
des-cbc }
• In FIPS mode:
encryption-algorithm
{ aes-cbc-128 | aes-cbc-192 |
aes-cbc-256 }
By default:
• In non-FIPS mode, an IKE
proposal uses the 56-bit
DES encryption algorithm
in CBC mode.
• In FIPS mode,
an IKE
proposal uses the 128-bit
A
ES encryption algorithm
in CBC mode.
4.
Specify an authentication
method for the IKE
proposal.
authentication-method
{
dsa-signature
|
pre-share
|
rsa-signature
}
By default, an IKE proposal uses
the pre-
shared key
authentication method.

Table of Contents

Other manuals for HPE FlexNetwork 5510 HI Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HPE FlexNetwork 5510 HI Series and is the answer not in the manual?

HPE FlexNetwork 5510 HI Series Specifications

General IconGeneral
BrandHPE
ModelFlexNetwork 5510 HI Series
CategorySwitch
LanguageEnglish

Related product manuals