beautypg.com

Dell POWEREDGE M1000E User Manual

Page 519

background image

Fabric OS Command Reference

491

53-1002746-01

ipSecConfig

2

Example 3

The following example illustrates how to secure traffic between two systems using AH with SHA1 and
ESP protection with 3DES and configure IKE with preshared keys. The two systems are a switch, a
Brocade 300 (IP address 10.33.74.13), and an external UNIX host (IPv4 address 10.33.69.132).

1.

On the system console, log in to the switch as Admin and enable IPSec.

switch:admin> ipsecconfig --enable

2.

Create an IPSec SA policy named AH01, which uses AH protection with SHA1.

switch:admin> ipsecconfig --add policy ips sa \
-t AH01 -p ah -auth hmac_sha1

3.

Create an IPSec SA policy named ESP01, which uses ESP protection with 3DES.

switch:admin> ipsecconfig --add policy ips sa \
-t ESP01 -p esp -enc 3des_cbc

4.

Create an IPSec proposal IPSEC-AHESP to use an AH01 and ESP01 bundle.

switch:admin> ipsecconfig --add policy ips sa-proposal \
-t IPSEC-AHESP -sa AH01,ESP01

5.

Import the preshared key file (e.g., ipseckey.psk) using the secCertUtil import command.

6.

Create an IKE policy for the remote peer.

switch:admin> ipsecconfig --add policy ike -t IKE01 \
-remote 10.33.69.132 -id 10.33.74.13 \
-remoteid 10.33.69.132 -enc 3des_cbc \
-hash hmac_md5 -prf hmac_md5 \
-auth psk -dh modp1024 -psk ipseckey.psk

7.

Create an IPSec transform TRANSFORM01 configured with transport mode to protect traffic
identified for IPSec protection and use IKE01 as a key management policy.

switch:admin> ipsecconfig --add policy ips transform \
-t TRANSFORM01 -mode transport -sa-proposal IPSEC \
-AHESP -action protect -ike IKE01

8.

Create traffic selectors to protect outbound and inbound traffic.

switch:admin> ipsecconfig --add policy ips selector \
-t SELECTOR-OUT -d out -l 10.33.74.13 -r 10.33.69.132 \
-transform TRANSFORM01

switch:admin> ipsecconfig --add policy ips selector \
-t SELECTOR-IN -d in -l 10.33.69.132 -r 10.33.74.13 \
-transform TRANSFORM01

9.

Verify the IPSec SAs using ipSecConfig --show manual-sa -a. Refer to the "IPSec display
commands" section for an example.

10. Perform the equivalent steps on the remote peer to complete the IPSec configuration. Refer to your

server administration guide for instructions.