User Guide

Table Of Contents
Bridge GUI Guide: Security Configuration
128
NOTE: Unlike
Suite B
Key Estab-
lishment
options (Sec-
tion 4.1.3), Suite B IPsec
Cryptographic Algorithm
options are available re-
gardless of whether
Suite B is licensed on the
Bridge (Section 6.3).
Suites - selects the cryptographic algorithm suite(s) that the
Bridge will accept when acting as an IKE responder and will
offer when acting as an IKE initiator.
SuiteB 256 - AES-256-GCM, 16B ICV (default selection)
SuiteB 128 - AES-128-GCM, 16B ICV (default selection)
Legacy - AES-128-CBC
SA Lifetime - specifies a time- and/or data-limited lifespan at
the end of which a new IKE transaction must be negotiated
to establish new IPsec SAs for the connection:
in minutes (mins.) from 1 to 71,582,788 to determine
how long the SA will be used before it expires, or
specify
0 (zero) to impose no time limit.
in kilobytes (KB) from 1 to 4,294,967,295 to determine
how much data will pass on the SA before it expires, or
specify
0 (zero) to impose no data limit.
If both fields are set to positive values, both apply, and
whichever condition occurs first will cause the SA to expire.
The default
SA Lifetime is set, in minutes, at 240 (4 hours),
with an
unlimited amount of traffic permitted.
CAUTION:
If you
disable IPsec when
the function is in use, all
IKE and IPsec SAs will
be immediately termi-
nated, configured SPD
entries will be disabled,
and IPsec traffic will
cease to be sent or re-
ceived on any interface.
To configure global IPsec settings:
1 Log on to the Bridge GUI through an Administrator-level
account and select
Configure -> IPsec from the menu on the
left.
2 On the IPsec Settings screen’s Global Settings frame, enter
new values for the settings you want to change (described
above).
3 Click APPLY in the upper right of the screen (or CANCEL your
changes).
4.2.2 Interface Security Policy Database Entries
When IPsec is globally enabled and configured (refer to
Section 4.2.1), each of the Bridge’s network interfaces can be
associated with up to 100 SPD entries.
An interface with one or more SPD configured for it is enabled
to pass IPsec traffic. An interface with no SPD configured for it
is disabled for IPsec traffic.
Each SPD entry defines the traffic to which it will apply by a
specified local subnet of IP addresses—the source of outbound
traffic and destination of inbound traffic. You can likewise
specify a remote subnet of IP addresses to which an SPD will
apply—defining traffic by its outbound destination/inbound
source—as well as the IP address of the connecting device.