IBM Books

Access Integration Services Using and Configuring Features Version 3.3


Using IP Security

This chapter explains how to use the IP Security feature and contains the following sections:


IP Security Overview

This section provides an overview of IP security capabilities for both IPv4 and IPv6.

Using Secure Tunnels

To protect IP packets sent to another host, router, or firewall, you may configure a secure tunnel for each IP route that must be secure. An IPSec tunnel is a two-way logical connection to the remote host, router, or firewall over which a local router sends protected IP packets. A secure tunnel is identified by parameters such as the addresses of the source host and destination host, port numbers, and tunnel ID.

With IPv4 you can define a negotiated tunnel by configuring a tunnel policy in the policy database, or you can create a manual tunnel using the Talk 6 add tunnel command as shown at Configuring the Tunnel for Router A. With IPv6, use the Talk 6 add tunnel command.

To establish a secure IPSec tunnel, a policy may specify the IP Authentication Header (AH) function (see IP Authentication Header), which attaches special authentication headers, and the IP Encapsulation Security Payload (ESP) function (see IP Encapsulating Security Payload), which encrypts the data. The policy establishes which of the following security measures are implemented for packets:

Note:For each secure tunnel, the sender and the receiver must select identical options.

IP Security Concepts

Packets sent using the Internet Protocol (IP) can be made secure by using the IP Security feature of the 2212.

Security, as defined by RFC 2401 - Security Architecture for the Internet Protocol, consists of the following functions:

Authentication
Knowing that the data received is the same as the data that was sent and that the claimed sender is, in fact, the actual sender.

Integrity
Ensuring that data is transmitted from source to destination without undetected alteration.

Confidentiality
Communicating so that the intended recipients know what was being sent but unintended parties cannot determine what was sent.

Non-repudiation
Communicating so that the receiver can prove that the sender did, in fact, send certain data even though the sender might later deny ever having sent it.
Note:In some countries, encryption support is not provided because of U.S. export regulations, and the encryption parameters are not displayed. However, the ESP-NULL algorithm is always available. For a definition of the ESP-NULL algorithm, see ESP Encryption Algorithms.

IP Security Terminology

The following terms are used when describing IPSec topics related to IPv4:

Authentication Header (AH)
A data area containing packet header information, which provides data origin authentication and data integrity and replay protection.

Certificate
An ASN.1 encode data item (according to ITU X.509 standands) that binds an end entity's ID to its public key. (In this case, the end entity is the ISAKMP negotiation entity.) The end entity must register its ID and public key with a certificate authority (CA) by submitting a certificate request. The CA verifies the request, signs it, and issues it to the entity. ISAKMP uses the public key certificate during Phase 1 processing to authenticate the initial message exchanges that set up the master secret (cryptographic key) between routers.

Certificate Authority (CA)
A trusted authority that issues "signed" X.509 digital certificates that network users must use to exchange secure user data using ISAKMP. To participate in secure data exchanges with other ISAKMP-enabled parties, a router must register with a CA and obtain an X.509 digital certificate to be used in authentication.

Digital Signature
A data item containing a user's encoded ID, which becomes part of an X.509 digital certificate. Users exchange certificates during Phase 1 negotiations to authenticate one another. The signature is generated by performing a public key operation on an input data area to be signed.

Encapsulating Security Payload (ESP)
An IPSec function that can encapsulate and encrypt a datagram so that its contents cannot be determined by anyone except the recipient. This comprises data integrity and replay protection. ESP also provides data origin authentication. It operates in the following modes: transport mode, which encrypts only the payload of the original datagram, leaving the addressing information visible to unauthorized parties, and tunnel mode, in which the entire original datagram, including the header, are encrypted. This conceals sensitive address information.

Internet Key Exchange (IKE)
A protocol derived from the ISAKMP and Oakley protocols, which is used by the Internet community to exchange cryptographic keys and authenticate the communicating parties.

ISAKMP
Internet Security Association and Key Management Protocol. This function automatically sets up security associations and manages packets' cryptographic keys for the duration of a data exchange.

Management Information Base (MIB)
A data block sent by a router in response to an inquiry from a central, trusted authority that has requested statistical information about router operations. The authority can detect problems in the network and contact a responsible party to take corrective action.

Oakley
The cryptographic key management protocol used by ISAKMP.

Perfect Forward Secrecy (PFS)
The level of data security obtained if Phase 2 negotiations derive new cryptographic keying information for each negotiation. ISAKMP accomplishes this by enabling the exchange of public Diffie Hellman values between parties. This security feature prevents anyone from determining a current cryptographic key from a previously compromised key.

Phase 1 Negotiations
The communication between a sender and receiver that establishes an ISAKMP security association and cryptographic keys that will protect the ISAKMP messages to be exchanged during Phase 2 negotiations. Phase 1 is processor-intensive, and typically is done infrequently, perhaps only daily or weekly.

Phase 2 Negotiations
The exchange of ISAKMP messages between a sender and receiver during which security associations and cryptographic keys are negotiated that will protect user data exchanges. These negotiations typically happen frequently, perhaps every two to three minutes, and are used to refresh cryptographic keys on a regular basis without user intervention.

Proxy
A router that is assigned to operate in behalf of another network device.

Public Key Infrastructure (PKI)
The framework that a CA uses to bind the user's ID with its public key and distributes the bound public key in a way that ensures its security.

Quick Mode
The term used to describe the Phase 2 negotiations for non ISAKMP security associations.

Replay
The act of capturing a datagram and either attempting to determine its contents or mounting a denial-of-service attack by resending it repeatedly.

Security Association (SA)
A data area tying together information about a data packet, such as its cryptographic algorithm and key information, the identities of the participating parties, and so forth.

Transform
A named collection of information about a configuration of authentication and encryption selections.

IP Authentication Header

The Authentication Header (AH) is described in RFC 2402 IP Authentication Header. This header contains authentication data for the IP datagram.

For IPv4 using negotiated IPSec, the policy assigned to a datagram implements a cryptographic authentication function that relies upon the Internet Key Exchange (IKE) protocol and a public/private key pair. For IPv4 manual tunnels and for IPv6, the sender uses a cryptographic function that relies upon a secret authentication key. In either case, the cryptographic authentication function is applied to the contents of the datagram. You may specify AH alone or with ESP. See Using AH and ESP for details.

AH Authentication Algorithms

A secure tunnel that uses the AH tunnel policy must use one of the following authentication algorithms:

These AH algorithms combine a keyed message authentication function using cryptographic hashing (hashed message authentication code, abbreviated as HMAC) with an optional replay prevention function. Replay prevention uses a sequence number contained in the AH to verify that a packet has not been received previously. Replay prevention protects the receiver from denial-of-service attacks, in which the same packet is sent repeatedly and the router becomes so busy processing the duplicate packets that it cannot process legitimate traffic. An authentication code is applied to a secret cryptographic key and the data, then to the output of the secret key and the output of the first operation. See Figure 32 for an illustration of how this is done for HMAC-MD5.

Figure 32. Creation of an HMAC MD5-Authenticated Message

Figure of an HMAC MD5-Authenticated Message

IP Encapsulating Security Payload

IP Encapsulating Security Payload (ESP) is described in RFC 2406 IP Encapsulating Security Payload. ESP encrypts part or all of the IP packet to provide confidentiality in addition to authentication (optional) and integrity. However, if you select the ESP-NULL algorithm, ESP performs only authentication and integrity checking. You may specify ESP alone or with AH. See Using AH and ESP for details.

ESP Authentication Algorithms

The algorithms available for ESP authentication are the same as those for AH, previously shown at AH Authentication Algorithms.

ESP Encryption Algorithms

A secure tunnel that uses the ESP encryption policy must either use one of the following encryption algorithms or the ESP-NULL algorithm:

Note:Except for ESP-NULL, the ESP encryption algorithms are subject to U.S. export laws. If your 2212 does not allow you to use some or all of these algorithms, sale of those algorithms may be prohibited in your country. Check with your IBM representative for more information.

The ESP-NULL algorithm does not encrypt the cleartext data and is available in all countries. It enables ESP authentication and integrity checking only, not encryption. If you use ESP-NULL, you must use one of the ESP authentication algorithms.

Using AH and ESP

A secure tunnel may use one of the following authentication/encryption selections: AH, ESP, AH-ESP, or ESP-AH. If you want a combination of AH and ESP, the following statements apply:

Security Associations

A Security Association (SA) is a simplex "connection" that affords security services to the traffic carried by it. Security services are afforded to an SA by the use of AH or ESP, but not both. If both AH and ESP protection are applied to a traffic stream, then two (or more) SAs are created to afford protection to the traffic stream. To secure typical bidirectional communication between two hosts or between two security gateways, two SAs (one in each direction) are required.

Tunnel Mode and Transport Mode

The operational mode (either tunnel or transport) determines how IPSec handles IP packets. Tunnel mode is the default, and is required if the router is acting as a security gateway. It protects data on a single segment of a path through a network. Transport mode is allowed only when the router is acting as a host, and protects data end-to-end, along a complete path.

AH and Operational Modes

In tunnel mode, the AH is placed in front of the IP packet and a new IP header is created and placed in front of the AH. The IP header of the packet being tunnelled (inner header) carries the ultimate source and destination addresses of the packet. The new IP header (outer header) can contain the addresses of security gateways, which are the tunnel endpoints. The AH protects the entire new packet, both the new IP header and the IP packet being tunnelled, except for the mutable fields in the new IP header.

In transport mode, the AH is inserted after the IP header and before the header of an upper-layer protocol, such as TCP or UDP. In this mode, AH authenticates the upper-layer protocol header and the contents of the IP packet, except for the mutable fields in the IP header (such as time-to-live [TTL], checksum, fragment flag, fragment offset, and type of service [TOS]).

Figure 33 shows the format of AH-protected datagrams.

Figure 33. AH-Protected Datagram Format

Figure of an AH-Protected Datagram

ESP and Operational Modes

In tunnel mode, the payload data contains the entire IP packet, and a new IP header is created and placed in front of the ESP header. The IP header of the packet being tunnelled (inner header) contains the ultimate source and destination addresses of the packet, while the new IP header (outer header) contains the addresses of security gateways. ESP encrypts the tunnelled IP packet. If you use ESP authentication, the ESP header, the tunnelled IP packet, and the ESP trailer are authenticated.

In transport mode, the payload data contains encrypted upper-layer protocol data, such as TCP or UDP data. If you use authentication, the ESP header, the upper-layer protocol data, and the ESP trailer are authenticated.

Figure 34 shows the format of ESP-protected datagrams.

Figure 34. ESP-Protected Datagram Format

Figure of an ESP-Protected Datagram

Nesting AH and ESP

You may nest one protocol within another instance of itself or the other protocol. Figure 35 shows the effects of nesting an ESP-protected datagram within an AH tunnel.

Figure 35. Nesting ESP Within an AH Tunnel

Figure of Nesting ESP Within an AH Tunnel

Using IP Security with L2TP Packets

With IPv4, you may also use IPSec to protect L2TP packets. After creating an L2TP tunnel by encapsulating an L2TP frame inside a UDP packet, you may encapsulate the UDP packet inside an IP packet whose source and destination addresses define the tunnel's end points. Then you can apply AH, ESP, and ISAKMP protocols to the IP packet. Figure 36 shows an IP-encapsulated L2TP packet including PPP and its payload protocol for transmission across the Internet.

Figure 36. IPSec-Protected L2TP Packet

Figure of an IPSec-Protected L2TP Packet

Tunnel-in-Tunnel Mode

For greater security, in addition to the security features already discussed, you may encapsulate the packets of a traffic stream twice and transmit them first through one IPSec tunnel and then through another (tunnel-in-tunnel).
Note:The use of multiple encryption (using tunnel-in-tunnel mode when encryption is preformed for both tunnels) within the router is restricted by U.S.A. Government export regulations. It is only supported in software loads that are under strict export control (software loads that support RC4 with 128 bit keys and Triple DES).

With IPv4, a rule in the policy database designates a packet for encapsulation (inner) for the first tunnel, and before the packet is sent, the rule causes the packet to be submitted to a second tunnel for a second encapsulation (outer). With IPv6, a packet filter access control rule identifies a packet for encapsulation (inner) for the first tunnel, and before the packet is sent, a second rule causes the packet to be submitted to a second tunnel for a second encapsulation (outer).

The two IPSec tunnels originate in the same router and the remote ends of the tunnels are at the same physical location, but on different machines. The remote end of the first tunnel can be either a secure gateway or a host; the remote end of the second tunnel must be a secure gateway router. Because the tunnels have different destinations, they must have different remote IP addresses. Both tunnels used for tunnel-in-tunnel must be configured for tunnel mode, and extra padding is not allowed on the second tunnel.

After it has been encapsulated twice, the packet is transmitted through the second (outer) tunnel. At the end of that tunnel, the outer encapsulation is removed and the packet is forwarded to the first tunnel (inner), based on information in the header created by the first tunnel encapsulation. At the end of this tunnel, the inner encapsulation is removed and the packet is forwarded to its final destination.

Path Maximum Transmission Unit Discovery

For both IPv4 and IPv6, IPSec supports Path Maximum Transmission Unit (PMTU) Discovery if the 2212 is acting as a security gateway. Support of PMTU Discovery is a concern if a packet cannot be fragmented. With IPv4, a packet cannot be fragmented if the Don't Fragment (DF) bit is set. With IPv6, a packet cannot be fragmented by intermediate routers. In these situations, if the packet does not fit on a link in the path from one end of the secure tunnel to the other, a "packet too big" ICMP error message is sent to the packet originator.

Because the router is acting as a security gateway, the error packet is returned to the originating router instead of the true originator of the packet. The receiving router must pass the reported MTU back to the true originator, who can reduce the packet size so that it will reach the final destination. Support for PMTU Discovery is discussed in RFC 2401 - Security Architecture for the Internet Protocol.

IPv4 provides the following options for the DF bit setting in the outer header of the tunnelled packet:

  1. Copy from the inner header

  2. Always set

  3. Always clear
These options are available when configuring secure tunnel-in-tunnel mode, for example, using the policy feature add ipsec-manual-tunn (IPv4) or the Talk 6 add tunnel (IPv6) command. The DF bit is handled according to the option selected except under the following conditions:

In these circumstances, for IPv4, the DF bit is not set, regardless of the configuration, and the secure packet may be fragmented as needed on the path to the receiver. For IPv6, the packet is fragmented as needed as it leaves the security gateway so that it fits on the PMTU for the tunnel. This special action is needed because the incoming packet is already less than or equal to the minimum MTU, so the originating host will not decrease the size any further. If fragmentation were not allowed, this packet would never reach its final destination

Because changes in the network topology or configuration can change the PMTU, the PMTU value must be aged out periodically and reset to the maximum. The aging timer value defaults to 10 minutes and can be configured with the Talk 6 set path command. Setting the aging parameter to 0 disables PMTU aging.

Diagram of a Network with an IP Security Tunnel

Figure 37 shows an example of a network with two IPSec tunnels that connect router A (with IPSec) to router B (with both IPSec and Network Address Translation for IPv4).

Figure 37. Network with IPSec and NAT

Figure of a Network with IPSec and NAT

In this network, an IPSec tunnel with IPSec tunnel ID 1 has been configured from IPv4 address 223.252.252.216 in router A to IPv4 address 223.252.252.210 in router B. Router A is configured for IPSec. Router B is configured for both IPSec and NAT.

Also in this network, an IPSec tunnel with IPSec tunnel ID 2 has been configured from IPv6 address 2000::A in Router A to IPv6 address 2000::B in Router B.

With IPv4, to configure this network for IKE, follow the steps starting at "Configuring Internet Key Exchange (IPv4)". For IPv4 with manual IPSec, follow the steps starting at "Configuring a Manual Tunnel (IPv4)". For IPv6, follow the steps starting at "Configuring a Manual Tunnel (IPv6)".
Note:Even if you do not plan to use NAT in your network, the description of configuring router B can help you understand the relationships between the parameters at each end of the IPSec tunnel more clearly.


Using the Internet Key Exchange

This section explains how you can use the Internet Key Exchange (IKE) to automate the definition and creation of IPSec security associations (SAs). IKE is a standard supported by the IETF (RFC 2409), which provides a standard way for IPSec-enabled products from the same or different vendors to communicate about their security requirements.

IKE provides a framework by means of which the following security requirements are met:

Authentication of the remote negotiating entity (IKE peer)
Through the use of either a pre-shared key or a digital certificate, IKE authenticates the identity of the entity you are communicating with by making the entity prove it is who it claims to be.

Creation of identical keying material in both peers
By using the Diffie-Hellman public key/private key mechanism, IKE provides for the exchange of the public key component and for the independent generation of identical keys by each peer.

Provide protection for the negotiation of IPSec security associations
Through a two-phase process, described in the following topic, IKE provides for the creation of security associations that are used solely to protect the negotiation of IPSec tunnels, and for the actual negotiation and creation of security associations that IPSec uses to protect user data.

Internet Key Exchange Phases

IKE defines two distinct negotiation exchanges: Phase 1 and Phase 2. Phase 1 sets up a secure tunnel between the two IKE peers, which will provide protection for the subsequent IPSec tunnel negotiations. The following actions occur during Phase 1 in the order shown:

  1. The characteristics of the Phase 1 security association are negotiated and agreed upon by the IKE peers. These characteristics include the encryption algorithm that will be used to encrypt the IKE communications, the hash algorithm to be used, the authentication method, and the Diffie-Hellman group to be used when generating keys.

  2. The Diffie-Hellman keys are generated and the public portions are exchanged with the IKE peer. These keys are used to generate encryption keys that will encrypt both the Phase 1 negotiations and will also allow the generation of keys that will be used by IPSec tunnels.

  3. The IKE peer is authenticated using one of two supported methods--pre-shared key mode and signature mode.

    In pre-shared key mode, both IKE peers, by means of a previous off-line process, have exchanged a key, and this is used during Phase 1 to authenticate the peer. You configure the pre-shared key using the policy feature's add user command.

    In signature mode, a signed X.509 digital certificate is used to provide keys that are used to encrypt and decrypt the payloads of Phase 1 messages.Successful signing and verifying comprises authentication of the peer. For a detailed discussion of signature mode and the use of X.509 digital certificates, see Using Public Key Infrastructure.

Phase 1 negotiations can take place using either of two exchange modes:

Negotiating an IP Security Tunnel

The processing discussed in this topic occurs when a router prepares to send a packet whose attributes match those defined in a rule in a policy database. Negotiating a tunnel occurs in two phases. During Phase 1, the sending router initiates communication by transmitting the first message of a six-message exchange, which establishes the security options to be used during Phase 2. The receiver responds and the two parties negotiate the ISAKMP security association (SA) characteristics, the authentication and encryption algorithms to be used, and they authenticate each other's identity. During Phase 2, the parties exchange a total of three messages to negotiate the SAs and keys to be used to protect IP datagrams sent between the two. Phase 1 proceeds as follows:

  1. Message 1: The sender proposes how the communication activity will take place--the authentication method (for example, digital signatures), the authentication algorithm (for example, HMAC-MD5), and the encryption algorithm (for example, DES-CBC) to be used.

  2. Message 2: The receiver indicates to the sender which, if any, of the security options it will support.

  3. Message 3: The sender transmits its Diffie Hellman public value and a random value from which encryption keys will be created.

  4. Message 4: The receiver transmits its own Diffie Hellman public value and a random value from which encryption keys will be created. At this point, both parties create public and private keys and key-related information to be used in ISAKMP message exchanges.

  5. Message 5: The sender transmits a digital signature and may include an X.509 digital certificate signed by a trusted certificate authority (CA). If the sender does not include a valid certificate, the receiver must use the LDAP protocol to obtain a certificate from either a trusted CA, a secure DNS server, a secure local cache that maps previously used certificates to their respective ID values, or may request a certificate from the sender, who must immediately send it.

  6. Message 6: After verifying the sender's digital signature, the receiver transmits the same kind of identifying information about itself to the sender.

At this point, both parties have authenticated themselves to the other, agreed on the characteristics of the SA, and have derived keys and key-related information for handling ISAKMP SAs. Now the parties enter Phase 2 to negotiate the non ISAKMP SAs and keys, which will be used to protect IP datagrams exchanged between them. Phase 2 proceeds as follows:

  1. Message 1: The sender proposes a non ISAKMP SA by transmitting an AH or ESP algorithm selection, and also includes other security-related information.

  2. Message 2: The receiver indicates to the sender which proposal it has selected, and also includes security-related information.

  3. Message 3: The sender transmits a hash record of several items to indicate to the receiver that it is ready to proceed using the negotiated security protocols. When the receiver verifies the information, the link is complete and the parties can begin to exchange protected data streams.

Using Public Key Infrastructure

This section explains how to use the public key infrastructure (PKI). Through PKI, IKE supports public key signature mode for authenticating IKE entities. Although this release supports pre-shared key mode, which does not require PKI support, this mode contains an inherent disadvantage. For authentication, it requires that you configure each IKE entity with the pre-shared key of each of its peers. This severely limits the scalability of IKE operations. Public key-based signature or public encryption mode provides much better scalability. In this release, the X.509 digital certificate is used in signature mode IKE Phase 1 negotiations to authenticate IKE entities.

You assign an identity to each IKE entity that you want to participate in IKE negotiations by specifying a unique value in the ISAKMP ID field when you configure its user policy profile. Each IKE entity authenticates its identity with its peers.

PKI is currently being defined and developed to support public key operation. In PKI, an X.509 digital certificate binds an entity's public key to its claimed identity. An IKE entity can extract the public key contained in a certificate. It can then perform a public key operation to authenticate the identity of a peer that is participating in an IKE negotiation. A public key is used for IKE signature mode. In this mode, the signer uses its private key to sign the digital signature. The receiver extracts the signer's public key from the certificate and uses it to verify the signature. The digital certificate function provides a scalable way for one IKE entity to authenticate the identity of another IKE entity.

Configuring PKI

This release assumes that both IKE entities in a negotiation use the same CA. Before starting IKE negotiations using the signature, you must configure PKI for the router. You must also generate the router private key and router certificate, and have downloaded the root CA's certificate. The following steps explain how to configure PKI:

  1. Generate the key pair and request the certificate.

    Because public key operation involves a key pair (signature mode uses the private key to sign and the public key to verify), you must generate a key pair for the router. For a certificate request, you must send the generated public key to the CA to be put into an X.509 digital certificate. Then every potential IKE peer can extract this public key from the CA-issued certificate. The private key resides in the router and is kept secret, known only to the router.

    In this version, you may issue a certificate request command, which does the following:

    1. Generates a key pair, whose key length you may specify as either 512, 768, or 1024 bits. The generated private key stays in cache.

    2. Requests that you enter information to include in the certificate request (for example, the router ID in the form of the IP address, domain name, or email name.

    3. Creates a certificate request (in PKCS#10 format) containing the generated public key and the information you have entered.

    4. TFTPs the certificate request to a host machine.

  2. Issue the certificate (outside the router)

    The CA receives the PKCS#10 certificate request. The CA may manually verify the request and issue a certificate. The certificate contains the router public key and the information that you entered. The CA signs the certificate using its private key, thus it becomes trusted digital information as long as you trust the signing CA. The certificate is now ready to be used in IKE negotiations. (This processing is outside the scope of the router operation and is not discussed in further detail in this book.)

  3. Download the router certificate

    Once the CA has issued the certificate, PKI can download it into the router. Depending on how the CA publishes the certificate, PKI can use either TFTP or LDAP to do the download.

    Note that the private key and the public key in the router certificate must match in order to perform public key operation such as digital signature. When PKI downloads the certificate into the router, the private key that was generated with the public key must be in the router key cache. The downloaded certificate is useless if it loses its matching private key. This means that from the time you issue the certificate request to the time the certificate downloads, you must not restart or reload the router, clear cache, or issue a new certificate request. Any of these operations destroy the private key in the router running cache.

  4. Download the CA certificate

    To verify the IKE peer's certificate, PKI must obtain the peer's root CA certificate. This release supports single level CA operation, which means that the IKE entities must be assigned to the same CA. Each IKE entity (in this case, each router) must download the CA's certificate (using either TFPT or LDAP) to verify that the certificate received from the peer is valid.

  5. Save and reload the certificate

    After the router has obtained the certificate, its matching private key, and the CA's certificate, you can start IKE negotiation. Since a certificate is typically valid for months or years, you may want to save the certificate and the private key in SRAM so that you do not have to issue a certificate request and do a download each time you reload or restart the router. This version provides the cert save and cert load commands to save or retrieve the certificate and private key in SRAM.

    Note that the router certificate and private key must be processed as a pair (for example, they are always saved or retrieved from SRAM together.

Use Talk 6 commands to configure and list both TFTP and LDAP server information as shown in the following examples:

Example: Add Server (T6)

Config>f ipsec
IP Security feature user configuration
IPsec config>pki
PKI config>add server
Name ? (max 65 chars) []? test
Enter server IP Address []? 8.8.8.8
Transport type (Choices: TFTP/LDAP)  [TFTP]? 
PKI config>
 
 

Example: List Server Configuration (T6)

PKI config>li server
 
1)  Name: SERVER1
    Type: TFTP
    IP addr: 8.8.8.8
 
 
2)  Name: TEST
    Type: TFTP
    IP addr: 8.8.8.8
 
 

Example: List Root Certificate (T6)

PKI config>li cert
 
Root CA  certificate:
       SRAM    Name:   R1
       Subject Name:   /c=US/o=ibm/ou=nhd
       Issuer  Name:   /c=US/o=ibm/ou=nhd
           Validity:   1998/12/19 -- 2018/12/19
  Default Root Cert:   No
 
       SRAM    Name:   R2
       Subject Name:   /c=US/o=ibm/ou=nhd
       Issuer  Name:   /c=US/o=ibm/ou=nhd
           Validity:   1998/12/19 -- 2018/12/19
  Default Root Cert:   Yes
 
 
 
Router   Certificate:
       SRAM    Name:   B1
       Subject Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA/cn=ibm3
       Issuer  Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA
   Subject alt Name:   1.1.1.1
         Key Usuage:   Sign & Encipherment 
           Validity:   1998/10/29 -- 2001/10/29
       Default Cert:   No
 
       SRAM    Name:   B2
       Subject Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA/cn=ibm3
       Issuer  Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA
   Subject alt Name:   1.1.1.1
         Key Usuage:   Sign & Encipherment 
           Validity:   1998/10/29 -- 2001/10/29
       Default Cert:   Yes
 
       SRAM    Name:   B3
       Subject Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA/cn=ibm3
       Issuer  Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA
   Subject alt Name:   1.1.1.1
         Key Usuage:   Sign & Encipherment 
           Validity:   1998/10/29 -- 2001/10/29
       Default Cert:   No
 
       SRAM    Name:   YYY
       Subject Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA/cn=ibm3
       Issuer  Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA
   Subject alt Name:   1.1.1.1
         Key Usuage:   Sign & Encipherment 
           Validity:   1998/10/29 -- 2001/10/29
       Default Cert:   No
 
 

Example: Certificate Request (T5)

PKI Console>cert-req
Enter the following part for the subject name
   Country Name(Max 16 characters) []? us
   Organization Name(Max 32 characters) []? IBM
   Organization Unit Name(Max 32 characters) []? NHD
   Common Name(Max 32 characters) []? router1
Key modulus size
 [512]? 
Certificate subject-alt-name type:
   1--IPv4 Address
   2--User FQDN
   3--FQDN
Select choice [1]? 
Enter an IPv4 addr) []? 12.1.1.1
Generating a key pair. This may take some time. Please wait ...
PKCS10 message successfully generated 
Enter tftp server IP Address []? 8.8.8.8
Remote file name (max 63 chars) [/tmp/tftp_pkcs10_file]? 
Memory transfer starting.
.Memory transfer completed - successfully.
Certificate request TFTP to remote host successfully.
Private Key Alias [ROUTER_KEY]? local
Generated private key LOCAL stored into cache
 
 

Example: List Router Certificate (T5)

PKI Console>li cert
Router   certificate
      Serial Number:   909343811
      Subject  Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA/cn=ibm3
      Issuer   Name:   /c=CA/o=Entrust Technologies/ou=PartnerCA
   Subject alt Name:   1.1.1.1
         Key Usuage:   Sign & Encipherment 
           Validity:   1998/10/29 -- 2001/10/29
 
Root CA  certificate
      Serial Number:   914034740
      Subject  Name:   /c=US/o=ibm/ou=nhd
      Issuer   Name:   /c=US/o=ibm/ou=nhd
           Validity:   1998/12/19 -- 2018/12/19
 
 

Example: Cert Save (T5)

PKI Console>cert-save
Enter type of certificate to be stored into SRAM:
     1)Root certificate; 
     2)Box  certificate with private key; 
Select the certificate type (1-2) [2]? 
SRAM Name for certificate and private key []? yyy
Load as default router certificate at initialization?? [No]: 
Private key YYY written into SRAM 
Both Certificate and private key saved into SRAM successfully
PKI Console>
 
 

Example: Cert Load (T5)

PKI Console>cert-load
Enter type of certificate to be stored into SRAM:
     1)Root certificate; 
     2)Box  certificate with private key; 
Select the certificate type (1-2) [2]? 
Name []? yyy
Box certificate and private key saved into cache successfully
PKI Console>
 
 

Using Manual IP Security (IPv4)

The IP security feature contained in IPv4 for the 2212, in conjunction with the policy feature and other IPSec-related processes, provides authentication, integrity, confidentiality, and non-repudiation. To implement IPSec manually, you preconfigure a policy containing a subset of IPSec options in a policy database to define the manual tunnel's profile and validity period. You may also preconfigure the full set of IPSec options (policy) in the database so that when a policy-enabled router prepares to send an IPSec packet, it dynamically negotiates and establishes IPSec options with the destination router, based on the policy's contents. To define a manual tunnel, see "Configuring Manual IP Security (IPv4)". For an explanation of the policy options, see "Using the Policy Feature".


Using Manual IP Security (IPv6)

The IP security feature contained in IPv6 for the 2212 provides authentication, integrity, and confidentiality. To define a manual tunnel, see "Configuring Manual IP Security (IPv6)".


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]