Administrators Guide (Supporting Fabric OS v7.3.0) Manual

The choices are ah (for authentication header) and esp (for encapsulated security protocol).
6. Select the Authentication Algorithm option.
7. Select the Encryption Algorithm option.
8. Optionally, enter a value in the SPI number field.
A Security Parameter Index (SPI) number is automatically assigned, but may be manually
overridden.
9. Click OK.
Creating an SA proposal
An SA proposal is sent from one endpoint to another to negotiate IKE and IPsec policies. An SA
proposal contains one or more security associations (SA). The endpoints must find a match for each of
the following in the SAs sent in the SA proposal:
The IKE authentication method.
The IKE encryption algorithm.
The IKE hash algorithm.
The Diffie-Hellman group number.
The IKE SA lifetime.
The IP addresses of the endpoints.
The IPsec protocol (AH or ESP).
The IPsec Transform policy.
To create an SA proposal, perform the following steps.
1. Select the SA Proposal tab on the IPsec Policies window.
2. Select Add.
The Add-SA Proposal dialog box displays.
3. Enter a name in the SA Proposal Name field.
4. Enter the SAs in the SA(s) to use field.
5. Optionally, define SA lifetime parameters.
The SA lifetime may be defined as a time value in seconds (LifeTime in seconds), as the number
of bytes transmitted before the SA is rekeyed (LifeTime in bytes), or both. When both are used,
the SA lifetime is determined by the threshold that is first reached.
6. Click OK.
Adding an IPsec transform policy
The IPsec transform policy is the combination of protocols and algorithms applied to a flow of IP
packets. IPsec unidirectional, and policies need to be applied to both inbound and outbound flows.
Part of adding an IPsec transform policy is to select an IPsec Protection Type. The choices are
discard, bypass, and protect:
Discard causes data packets to be rejected if there is an invalid pair of source and destination
addresses or invalid port addresses.
Bypass allows a data packet to be transmitted or received without IPsec protection.
Process indicates a data packet is processed using IPsec encryption, IKE authentication, or both,
using encapsulation security protocol (ESP) processing, or authentication header (AH) protocol
processing.
To add an IPsec transform policy, perform the following steps.
Creating an SA proposal
230 Web Tools Administrator's Guide
53-1003169-01