Technical data

Web Tools Administrator’s Guide 221
53-1002934-02
IPsec over management ports
16
6. Select the IPsec Protection Type option.
7. Select the IKE Policy Name option.
IKE policies need to be created before adding a transform policy. If there are no names to
select from, you must create an IKE policy.
8. Optional: Enter a local and peer IP address.
9. Click OK.
Adding an IPsec selector
Selectors are used to apply transform policies to an IP flow. Flows are uni-directional. Selectors are
associated with a specific source IP address, a specific peer IP address, and a specific transform.
1. Select the Selectors tab.
The Selectors window displays.
2. Select Add.
The Add Selector dialog box displays.
3. Enter a name in the Selector Name field.
4. Select the Traffic Flow Direction (in or out).
IPsec policies are unidirectional, and must be applied separately to inbound and outbound
flows.
5. Enter the IP address of the sender in the Source IP Address field.
6. Enter the IP address of the receiver in the Peer IP Address field.
7. En ter t he Transform Name value.
8. The Protocol Name selector allows you to select a specific protocol.
9. Click OK.
Manually creating an SA
Part of manually creating an security association (SA) is to select an IPsec Protection Type. The
choices are discard, bypass, and protect:
Discard causes data packets to be rejected if there is an invalid pair of source and destination
addresses or invalid port addresses.
Bypass allows a data packet to be transmitted or received without IPsec protection.
Process indicates a data packet is processed using IPsec encryption, IKE authentication, or
both, using encapsulation security protocol (ESP) processing, or authentication header (AH)
protocol processing.
To manually create a SA, perform the following steps.
1. Select the SA(Manual) tab.
2. Select Add.
The Add Manual-SA dialog box displays.