beautypg.com

Ipsec for ipv6 routing protocols, Protocols and standards, Configuring ipsec – H3C Technologies H3C SecPath F1000-E User Manual

Page 134

background image

6

policy to the IPsec tunnel interface; if you want to apply QoS to IPsec packets, apply the QoS to the

physical interface.

IPsec for IPv6 Routing Protocols

In IPv6, IPsec uses the AH or ESP protocol to encapsulate and de-encapsulate IPv6 routing protocol

packets to provide authentication and encryption services. At present, IPsec supports OSPFv3, IPv6 BGP,

and RIPng.
IPsec for IPv6 routing protocols is implemented on a per-protocol basis. With IPsec configured for an IPv6
routing protocol, a device uses IPsec to encapsulate the sent packets of that protocol and de-encapsulate

the received packets of that protocol. If a received protocol packet is not IPsec protected, or fails to be

de-encapsulated due to, for example, decryption or authentication failure, the device discards that

packet.
IPsec for IPv4 is implemented on a per-interface basis. Currently, an IPsec-configured interface can

implement IPsec protection for IPv4 packets that are either permitted by an ACL or routed to an IPsec
tunnel interface.
IPsec for IPv6 routing protocols does not need to use an ACL to match specific traffic on an interface or

to specify the start and end points of an IPsec tunnel. An IPsec security policy is bound to a specific IPv6

routing protocol. All the packets of that protocol will be protected by IPsec regardless of where they are

forwarded.
The key exchange mechanism of IPsec is applicable only for one-to-one communications. For
one-to-many communications on broadcast networks, IPsec cannot implement automatic key exchange.

In addition, devices on a broadcast network must use the same SA parameters (SPI and key) to process

received and sent packets. Currently, the device only supports using manually configured SA parameters

in a security policy to protect IPv6 routing protocol packets.

Protocols and Standards

These protocols and standards are relevant to IPsec:

RFC2401: Security Architecture for the Internet Protocol

RFC2402: IP Authentication Header

RFC2406: IP Encapsulating Security Payload

RFC4552: Authentication/Confidentiality for OSPFv3

Configuring IPsec

You can configure IPsec by using these methods:

ACL-based: This method uses ACLs in IPsec policies to identify data flows to be protected. The use

of ACLs adds flexibility to IPsec policies. IPsec policies can take effect only after they are applied to
physical interfaces. For configuration details, refer to

Implementing ACL-Based IPsec

.

Routing-based: Also called IPsec tunnel interface-based. This method depends on the routing
mechanism to select data flows to be protected. The use of IPsec profiles greatly simplifies

configuration and management, and enhances the scalability of large VPN networks. IPsec profiles

can take effect only after they are applied to IPsec tunnel interfaces. For configuration details, refer

to

Implementing Tunnel Interface-Based IPsec

.

Application-based: This method allows you to bind an IPsec policy to an application to protect the
packets of that application. Currently, this method supports IPsec for IPv6 routing protocols. By