HP StorageWorks Simple SAN Connection Manager user guide (5697-0083, August 2009)

72 Managing switches
NOTE: IPsec policies must be unique. The unique key for a policy includes the fields Source
Address, Source Port, Source Prefix Length, Destination Address, Destination Port, Destination Prefix
Length, Protocol, ICMP IPv6 Type (if specified), and Direction. No two IPsec associations can
contain duplicate values in these nine fields.
Protocol Select one of the following protocols or applications to which to apply IP
security:
ICMP—Internet Control Message Protocol
ICMP6—Internet Control Message Protocol for IPv6
IP4—Internet Protocol, version 4
TCP—Transmission Control Protocol
UDP—User Datagram Protocol
Any—Any protocol
Or enter a number in the range of 0 to 255.
If you select ICMP6, you must also enter a value in the ICMP IPv6 Type box.
ICMP IPv6 Type (Required if you select ICMP6 for the Protocol) In the ICMP IPv6 Type box, enter
a number in the range of 0 to 255.
Direction Select the direction of data traffic to which to apply the policy:
In—Data entering the destination
Out—Data leaving the source
Priority To control the relative ordering of this policy within the SPD, enter an integer in
the range of2147483647 to 214783647.
Action Specify the processing to apply to data traffic:
Discard—Unconditionally disallow all inbound or outbound data traffic
None—Allow all inbound or outbound data traffic without encryption or
decryption
IPsec—Apply IP security to inbound and outbound data traffic
Protection Desired (Required if you select IPsec for the Action) Select the type of IP security
protection to apply:
AH—Authentication Header
ESP—Encapsulating Security Payload
Both—Apply both AH and ESP protection
AH Level Rule (Required if you select AH or Both for the Protection) Select the rule level to apply
for AH protection:
Default—For Linux, the default is Use. For Windows, the default is Require.
UseIf corresponding SAD entry is found, use IPsec. If corresponding SAD
entry is not found, do not use IPsec.
RequireIf corresponding SAD is entry found, use IPsec. If corresponding
SAD entry is not found, do not communicate at all.
ESP Level Rule (Required if you select ESP or Both for the Protection) Select the rule level to apply
for ESP protection:
Default—For Linux, the default is Use. For Windows, the default is Require.
UseIf corresponding SAD entry is found, use IPsec. If corresponding SAD
entry is not found, do not use IPsec.
RequireIf corresponding SAD is entry found, use IPsec. If corresponding
SAD entry is not found, do not communicate at all.