beautypg.com

Configuring ipsec for ospfv3 – Brocade Multi-Service IronWare Routing Configuration Guide (Supporting R05.6.00) User Manual

Page 686

background image

658

Multi-Service IronWare Routing Configuration Guide

53-1003033-02

Configuring OSPFv3

Interface

Area

Virtual link

With respect to traffic classes, this implementation of IPSec uses a single security association (SA)
between the source and destination to support all traffic classes and so does not differentiate
between the different classes of traffic that the DSCP bits define.

Instructions for configuring IPsec on these entities appear in

“Configuring IPsec for OSPFv3”

on

page 658.

IPsec on a virtual link is a global configuration. Interface and area IPsec configurations are more
granular.

Among the entities that can have IPsec protection, the interfaces and areas can overlap. The
interface IPsec configuration takes precedence over the area IPsec configuration when an area
and an interface within that area use IPsec. Therefore, if you configure IPsec for an interface and
an area configuration also exists that includes this interface, the interface’s IPsec configuration is
used by that interface. However, if you disable IPsec on an interface, IPsec is disabled on the
interface even if the interface has its own, specific authentication. Refer to

“Disabling IPsec on an

interface”

on page 664.

For IPsec, the system generates two types of databases. The security association database (SAD)
contains a security association for each interface or one global database for a virtual link. Even if
IPsec is configured for an area, each interface that uses the area’s IPsec still has its own security
association in the SAD. Each SA in the SAD is a generated entry that is based on your specifications
of an authentication protocol (ESP in the current release), destination address, and a security
policy index (SPI). The SPI number is user-specified according to the network plan. Consideration
for the SPI values to specify must apply to the whole network.

The system-generated security policy databases (SPDs) contain the security policies against which
the system checks the for-us packets. For each for-us packet that has an ESP header, the
applicable security policy in the security policy database (SPD) is checked to see if this packet
complies with the policy. The IPsec task drops the non-compliant packets. Compliant packets
continue on to the OSPFv3 task.

Configuring IPsec for OSPFv3

This section describes how to configure IPsec for an interface, area, and virtual link. It also
describes how to change the key rollover timer if necessary and how to disable IPsec on a
particular interface for special purposes.

By default, OSPFv3 IPsec authentication is disabled. The following IPsec parameters are
configurable:

ESP security protocol

Authentication

HMAC-SHA1-96 authentication algorithm

Security parameter index (SPI)

A 40-character key using hexadecimal characters

An option for not encrypting the keyword when it appears in show command output

Key rollover timer

Specifying the key add remove timer