HP X Unified Security Platform Series User Manual Page 214

  • Download
  • Add to my manuals
  • Print
  • Page
    / 333
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 213
Chapter 7 VPN
198 X Family LSM User’s Guide V 2.5.1
Click Cancel to return to the IPSec Configuration page without saving the changes.
IKE Proposal
Internet Key Exchange (IKE) is used to negotiate the keying material used by the IPSec VPN
encryption and integrity algorithms. IKE uses UDP port number 500 and precedes the actual IPSec
data flow. IKE is a two-stage mechanism for automatically establishing IPSec tunnels with dynamically
generated keying material.
IKE Proposals are divided into two phases:
The device negotiates Phase 1 of the IKE and establishes a shared, secure connection. Phase 1 uses
Aggressive Mode or Main Mode for packet exchange. The default is Main Mode.
•In Phase 2, the device establishes keying material for the VPN. Phase 2 is much quicker than Phase
1, since it can rely on the checks established during Phase 1, without needing to re-establish a shared,
secure connection. Phase 2 uses Quick Mode for packet exchange.
Phase 1 of the IKE negotiation requires authentication between the two devices to be connected over
the VPN tunnel. When you configure the IKE proposal, you can select one of the following
Authentication methods based on your network security requirements.
IKE with Pre-shared Key (Main Mode)
IKE with Pre-shared Key (Aggressive Mode)
IKE with X.509 Certificates (Main Mode)
IKE with X.509 Certificates (Aggressive Mode)
•Manual Keying
On the X family device, you configure the IKE proposals with the authentication and encryption
configuration (used for Phase 1 and Phase 2 IKE negotiation) required for the different types of remote
devices that will connect via the VPN tunnel connection. Then, when you create the IPSec Security
Association required for each remote device, you can select the IKE proposal to use for key exchange
and specify the key information.
For additional information, see the following topics:
Manage IKE Proposals” on page 198
Configuring IKE Proposals on page 200
Manage IKE Proposals
You can view, manage and configure IKE proposals from the IKE Proposals menu page (VPN > IKE
Proposals) in the LSM.
Note To use the X.509 Certificate Authentication, you must first import matching X.509
CA Certificates and Local Certificates on the X family and the remote device (s). On the X
family device, you can create certificates from the X.509 Certificates page
(Authentication > X.509 Certificates).
Page view 213
1 ... 213 214 215 ... 333

Comments to this Manuals

No comments