User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
129
Key Usage: digital signature, key agreement
Extended Key Usage: (not set)
Name: test2
Pattern: /O=*
Key Usage: (not set)
Extended Key Usage: (not set)
You cannot change the Name of an existing ACE, but you can
edit and/or add to the filter criteria it specifies with
update ace.
# update ace -name
<ACEname>
-pattern
<DNpattern>
-keyusage digitalsignature,keyagreement
-extkeyusage
tlsserver,tlsclient
You can also delete a single ACE or all ACEs from the Mesh
Point configuration.
# del ace -all|-name
<ACEname>
Deleted ACEs no longer appear in the show ace output.
4.4 Internet Protocol Security
NOTE: Fortress’s
IPsec function is
not yet supported on
IPv6 networks.
When a Suite-B license is installed (refer to Section 5.6),
Fortress Mesh Points can be configured to secure private
communications over public networks by implementing the
IPsec protocol suite.
Fortress’s IPsec implementation uses:
NOTE:
Incoming
IKE traffic requires
administrative access. If
the administrative IP
address ACL (disabled
by default) is enabled, it
must include IPsec peer
IP addresses. Section
2.2.5 for more detail.
Traffic is affected by the
per-interface packet fil-
ters. If configured, per-
interface packet filters
must include filters to
permit IKE traffic to and
from the FMP. See Sec-
tion 4.6.3 for more detail.
ISAKMP (Internet Security Association and Key
Management Protocol) as defined in RFC 2408
IKEv1 (Internet Key Exchange version 1) as defined in
RFC 2409, and IKEv2 as defined in RFC 4306
IPsec Tunnel Mode using ESP (Encapsulating Security
Payload) as defined in RFC 4303
Strong standards-based cryptographic algorithm suites
including:
NSA (National Security Agency) Suite B:
AES-128-GCM, 16B ICV
1
AES-256-GCM, 16B ICV
Legacy AES-128-CBC
Legacy AES-256-CBC
In IPsec Phase 1, ISAKMP is used to authenticate the initial
Security Association (SA)—via digital signature or pre-shared
key—and to encrypt the control channel over which IKE
messages are exchanged. The Phase 1 IKE SA secures
negotiation of the Phase 2 IPsec SAs over which network traffic
1. Advanced Encryption Standard-Galois/Counter Mode, 16-bit integrity check value