
vi 308630-15.1 Rev 00
Security Associations .............................................................................................1-11
Automated Security Associations Using IKE ...................................................1-11
Manual Security Associations ..........................................................................1-12
Security Associations for Bidirectional Traffic ..................................................1-12
How IKE Negotiates Security Associations .....................................................1-13
Security Parameter Index ................................................................................1-13
Examples of Security Policies and Security Associations ......................................1-14
Security Protocols .........................................................................................................1-15
Encapsulating Security Payload (ESP) Protocol ....................................................1-15
Authentication Header (AH) Protocol .....................................................................1-16
Internet Key Exchange Protocol ...................................................................................1-17
Perfect Forward Secrecy ........................................................................................1-17
Performance Considerations ........................................................................................1-17
Chapter 2
Installing IPsec
Upgrading Router Software ............................................................................................2-1
Installing the IPsec Software ..........................................................................................2-2
Completing the Installation Process .........................................................................2-3
Securing Your Site ..........................................................................................................2-4
Securing Your Configuration ...........................................................................................2-4
Encryption Keys .......................................................................................................2-4
Random Number Generator .....................................................................................2-5
Creating and Using NPKs ...............................................................................................2-5
Generating NPKs .....................................................................................................2-5
Entering an Initial NPK and a Seed for Encryption ..................................................2-6
Changing an NPK ....................................................................................................2-7
Monitoring NPKs ......................................................................................................2-8
Chapter 3
Starting IPsec
Enabling IPsec and IKE ..................................................................................................3-1
Creating Policies .............................................................................................................3-2
Specifying Criteria ....................................................................................................3-2
Specifying an Action .................................................................................................3-3
Policy Considerations ...............................................................................................3-3
Comentarios a estos manuales