beautypg.com

Dell POWEREDGE M1000E User Manual

Page 474

background image

442

Fabric OS Command Reference

53-1001764-02

ipSecConfig

2

selector

Displays IPSec selector parameters including IPSec policy name, IP
address of the local entity, IP address of the remote entity, direction of
traffic flow (inbound or outbound), upper layer protocol used, and IPSec
transform index.

transform

Displays IPSec transform parameters including IPSec policy name, key
management protocol (version) or manual SA, processing option for
selected IP traffic, IPSec mode (tunnel or transport), IP address of the
local entity, IP address of the remote entity, and SA proposal.

sa-proposal

Displays the parameters of the SA proposal, including proposal name,
lifetime (in seconds and in byte units, or infinite), and associated SA
definitions.

sa

Displays security association (SA) parameters for the specified IPSec
policies including policy names, IPSec protocol used (AH or ESP),
encryption and authentication algorithms.

policy ike

Displays the IKE policy configuration. No subtype is required with this
command. The command displays the following IKE policy parameters: IKE
version, IP address of the remote entity, IP address of the local entity,
encryption algorithm, hash algorithm, PRF algorithm, DH group,
authentication method, path and filename of the preshared key.

manual-sa

Displays the Security Associations in the local SADB. No subtype is required
with this command.

arguments

Specifies the display selection as one of the following:

-a

Displays all configuration information for the specified type and subtype.

-tag name

Displays configuration information for the specified IPSec policy only.

--

help

Displays the command usage. Optionally use --help with a specified
command, type, and subtype to display the syntax for specific commands. Do
not include a double dash when specifying the command.

Examples

1.

“Example 1”

- Configure an IPSec policy using AH protection with MD5 and configure IKE with

preshared keys.

2.

“Example 2”

- Configure an IPSec policy using ESP protection with 3DES_CBC encryption and

SHA1 authentication, and configure IKE with RSA signed certificates.

3.

“Example 3”

- Configure an IPSec policy using AH with SHA1 and ESP protection with 3DES and

configure IKE with preshared keys.

4.

“Example 4”

- Secure traffic between two systems using protection with MD5 and Manually

keyed SAs.

5.

“IPSec display commands”

- Verify your IPSec configurations.

6.

“Using the help command”

- Use the help command with arguments to get syntax information

on specific parameters.