Brocade Fabric OS Command Reference Manual Supporting Fabric OS v6.3.0 (53-1001337-01, July 2009)

414 Fabric OS Command Reference
53-1001337-01
ipsecConfig
2
selector Displays IPsec selector parameters including IPsec policy name, IP
address of the local entity, IP address of the remote entity, direction of
traffic flow (inbound or outbound), upper layer protocol used, and IPsec
transform index.
transform Displays IPsec transform parameters including IPsec policy name, key
management protocol (version) or manual SA, processing option for
selected IP traffic, IPsec mode (tunnel or transport), IP address of the
local entity, IP address of the remote entity, and SA proposal.
sa-proposal Displays the parameters of the SA proposal, including proposal name,
lifetime (in seconds and in byte units, or infinite), and associated SA
definitions.
sa Displays security association (SA) parameters for the specified IPsec
policies including policy names, IPsec protocol used (AH or ESP),
encryption and authentication algorithms.
policy ike Displays the IKE policy configuration. No subtype is required with this
command. The command displays the following IKE policy parameters: IKE
version, IP address of the remote entity, IP address of the local entity,
encryption algorithm, hash algorithm, PRF algorithm, DH group,
authentication method, path and filename of the pre-shared key.
manual-sa Displays the Security Associations in the local SADB. No subtype is required
with this command.
arguments Specifies the display selection as one of the following:
-a Displays all configuration information for the specified type and subtype.
-tag name Displays configuration information for the specified IPsec policy only.
--help Displays the command usage. Optionally use --help with a specified
command, type, and subtype to display the syntax for specific commands. Do
not include a double dash when specifying the command.
Examples 1. “Example 1” - Configure an IPsec policy using AH protection with MD5 and configure IKE with
pre-shared keys.
2. “Example 2” - Configure an IPsec policy using ESP protection with 3DES_CBC encryption and
SHA1 authentication, and configure IKE with RSA signed certificates.
3. “Example 3” - Configure an IPsec policy using AH with SHA1 and ESP protection with 3DES and
configure IKE with pre-shared keys.
4. “Example 4” - Secure traffic between two systems using protection with MD5 and Manually
keyed SAs.
5. “IPsec display commands” - Verify your IPsec configurations.
6. “Using the help command” - Use the help command with arguments to get syntax information
on specific parameters.