Reference Guide
Fabric OS FCIP Administrator’s Guide 29
53-1002474-01
IPsec implementation over FCIP tunnels
2
Limitations using IPsec over FCIP tunnels
The following limitations apply to using IPsec:
• Network Address Translation (NAT) is not supported.
• Authentication Header (AH) is not supported.
• IPsec-specific statistics are not supported.
• There is no RAS message support for IPsec.
• IPsec can only be configured on IPv4-based tunnels.
• IPsec is only supported on VE group 12-21 and not on group 22-31 on an FX8-24 blade.
• To enable IPsec with Fabric OS v7.0.0 and later, both ends of the tunnel must use v7.0.0 and
later.
NOTE
IPsec is not allowed with the --connection-type FCIP tunnel option set to anything other than default.
IPsec for the 7800 switch and FX8-24 blade
Advanced Encryption Standard, Galois/Counter Mode, Encapsulating Security Payload
(AES-GCM-ESP) is used as a single, predefined mode of operation for protecting all TCP traffic over
an FCIP tunnel. AES-GCM-ESP is described in RFC 4106. The following list contains key features of
AES-GCM-ESP:
• Encryption is provided by AES with 256-bit keys.
• The IKEv2 key exchange protocol is used by peer switches and blades for mutual
authentication.
• IKEv2 uses UDP port 500 to communicate between the peer switches or blades.
• All IKE traffic is protected using AES-GCM-ESP encryption.
• Authentication requires the generation and configuration of 32-byte pre-shared secrets for
each tunnel.
• An SHA-512 hash message authentication code (HMAC) is used to check data integrity and
detect third-party tampering.
• Pseudo-random function (PRF) is used to strengthen security. The PRF algorithm generates
output that appears to be random data, using the SHA-512 HMAC as the seed value.
• A 2048-bit Diffie-Hellman (DH) group is used for both IKEv2 and IPsec key generation.
• The SA lifetime limits the length of time a key is used. When the SA lifetime expires, a new key
is generated, limiting the amount of time an attacker has to decipher a key. Depending on the
length of time expired or the length of the data being transferred, parts of a message may be
protected by different keys generated as the SA lifetime expires. For the 7800 switch and
FX8-24 blade, the SA lifetime is approximately eight hours or two billion frames of data.
• Encapsulating Security Payload (ESP) is used as the transport mode. ESP uses a hash
algorithm to calculate and verify an authentication value, and also encrypts the IP datagram.
• A circuit in a non-secure tunnel can use the same GbE interface as a circuit in a secure tunnel.
Each circuit can have a route configured on that GbE interface.