EasyManua.ls Logo

HPE FlexNetwork MSR Series

HPE FlexNetwork MSR Series
547 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
v
Troubleshooting port security ························································································································· 147
Cannot set the port security mode ········································································································· 147
Cannot configure secure MAC addresses ····························································································· 147
Cannot change port security mode when a user is online ····································································· 148
Configuring IPsec ························································································ 149
Overview ························································································································································ 149
Basic concepts ······································································································································· 149
IPsec implementation on an encryption card ························································································· 151
IPsec tunnel interface ····························································································································· 152
IPsec for IPv6 routing protocols ············································································································· 153
IPsec RRI ··············································································································································· 153
Protocols and standards ························································································································ 154
FIPS compliance ············································································································································ 154
Implementing IPsec ······································································································································· 154
Implementing ACL-based IPsec ···················································································································· 155
Configuring an ACL ································································································································ 156
Configuring an IPsec transform set ········································································································ 158
Configuring an IPsec policy ···················································································································· 160
Applying an IPsec policy group to an interface ······················································································ 165
Binding an IPsec policy, IPsec policy group, or IPsec profile to an encryption card ······························ 166
Enabling the encryption engine ·············································································································· 167
Enabling the IPsec module backup function ·························································································· 167
Configuring the IPsec session idle timeout ···························································································· 168
Enabling ACL checking of de-encapsulated IPsec packets ··································································· 168
Configuring the IPsec anti-replay function ····························································································· 168
Configuring a shared source interface policy group ··············································································· 169
Configuring packet information pre-extraction ······················································································· 170
Enabling invalid SPI recovery ················································································································ 170
Configuring IPsec RRI ···························································································································· 171
Enabling transparent data transmission without NAT ············································································ 172
Enabling fragmentation before/after encryption ····················································································· 172
Implementing tunnel interface-based IPsec ··································································································· 173
Configuring an IPsec profile ··················································································································· 174
Configuring an IPsec tunnel interface ···································································································· 175
Enabling packet information pre-extraction on the IPsec tunnel interface ············································· 176
Applying a QoS policy to an IPsec tunnel interface ··············································································· 177
Configuring IPsec for IPv6 routing protocols ·································································································· 177
Displaying and maintaining IPsec ·················································································································· 178
IPsec configuration examples ························································································································ 179
Configuring manual mode IPsec tunnel ································································································· 179
Configuring IKE-based IPsec tunnel ······································································································ 181
Configuring encryption cards for IPsec services ···················································································· 183
Configuring IPsec interface backup ······································································································· 185
Configuring IPsec with IPsec tunnel interfaces ······················································································ 189
Configuring IPsec for RIPng ··················································································································· 193
Configuring IPsec RRI ···························································································································· 196
Configuring IKE ··························································································· 200
Overview ························································································································································ 200
IKE security mechanism ························································································································· 200
IKE operation ········································································································································· 200
IKE functions ·········································································································································· 201
Relationship between IKE and IPsec ····································································································· 202
Protocols and standards ························································································································ 202
FIPS compliance ············································································································································ 202
IKE configuration task list ······························································································································· 203
Configuring a name for the local security gateway ························································································ 203
Configuring an IKE proposal ·························································································································· 204
Configuring an IKE peer ································································································································· 205
Setting keepalive timers ································································································································· 207
Setting the NAT keepalive timer ···················································································································· 207

Table of Contents

Other manuals for HPE FlexNetwork MSR Series

Related product manuals