Information About Ipsec Network Security
Information About Ipsec Network Security
c o m
CH A P T E R
7-1
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
IPsec uses the Internet Key Exchange (IKE) protocol to handle protocol and algorithm negotiation and
to generate the encryption and authentication keys used by IPsec. While IKE can be used with other
protocols, its initial implementation is with the IPsec protocol. IKE provides authentication of the IPsec
peers, negotiates IPsec security associations, and establishes IPsec keys. IKE uses RFCs 2408, 2409,
2410, and 2412, and additionally implements the draft-ietf-ipsec-ikev2-16.txt draft.
IPsec provides security for transmission of sensitive information over unprotected networks such as the
Internet. IPsec acts at the network layer, protecting and authenticating IP packets between participating
IPsec devices (peers).
Note
IPsec is not supported by the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco Fabric
Switch for IBM BladeCenter.
IPsec provides security for transmission of sensitive information over unprotected networks such as the
Internet. IPsec acts at the network layer, protecting and authenticating IP packets between participating
IPsec devices (peers).
IPsec provides the following network security services. In general, the local security policy dictates the
use of one or more of these services between two participating IPsec devices:
Note
Data confidentialityThe IPsec sender can encrypt packets before transmitting them across a
network.
Data integrityThe IPsec receiver can authenticate packets sent by the IPsec sender to ensure that
the data has not been altered during transmission.
Data origin authenticationThe IPsec receiver can authenticate the source of the IPsec packets sent.
This service is dependent upon the data integrity service.
Anti-replay protectionThe IPsec receiver can detect and reject replayed packets.
The term data authentication is generally used to mean data integrity and data origin authentication.
Within this chapter it also includes anti-replay services, unless otherwise specified.
With IPsec, data can be transmitted across a public network without fear of observation, modification,
or spoofing. This enables applications such as Virtual Private Networks (VPNs), including intranets,
extranets, and remote user access.
IPsec as implemented in Cisco NX-OS software supports the Encapsulating Security Payload (ESP)
protocol. This protocol encapsulates the data to be protected and provides data privacy services, optional
data authentication, and optional anti-replay services.
Note
The Encapsulating Security Payload (ESP) protocol is a header inserted into an existing TCP/IP packet,
the size of which depends on the actual encryption and authentication algorithms negotiated. To avoid
fragmentation, the encrypted packet fits into the interface maximum transmission unit (MTU). The path
MTU calculation for TCP takes into account the addition of ESP headers, plus the outer IP header in
tunnel mode, for encryption. The MDS switches allow 100 bytes for packet growth for IPsec encryption.
Note
When using IPsec and IKE, each Gigabit Ethernet interface on the IPS module (either on 14+2 LC or
18+4 LC) must be configured in its own IP subnet. If there are multiple Gigabit Ethernet interfaces
configured with IP address or network-mask in the same IP subnet, IKE packets may not be sent to the
right peer and thus IPsec tunnel will not come up.
7-2
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Figure 7-1 shows different IPsec scenarios.
Figure 7-1
iSCSI Servers
IPSec for
securing
iSCSI traffic
IPSec for
securing
FCIP traffic
MDS_Switch1
MDS_Switch 2
FC
FC
WAN
FC
iSCSI Servers
WAN
MDS
Nonsecure
connection
Secure
connection
120481
FC Servers
MDS_Switch 3
7-3
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
About IKE
IKE automatically negotiates IPsec security associations and generates keys for all switches using the
IPsec feature. Specifically, IKE provides these benefits:
IKE is not supported on the Cisco Fabric Switch for HP c-Class BladeSystem and the Cisco Fabric
Switch for IBM BladeSystem.
IPsec Compatibility
IPsec features are compatible with the following Cisco MDS 9000 Family hardware:
Cisco 18/4-port Multi-Service Module (MSM-18/4) modules and MDS 9222i Module-1 modules.
Cisco 14/2-port Multiprotocol Services (MPS-14/2) modules in Cisco MDS 9200 Switches or Cisco
MDS 9500 Directors
Cisco MDS 9216i Switch with the 14/2-port multiprotocol capability in the integrated supervisor
module. Refer to the Cisco MDS 9200 Series Hardware Installation Guide for more information on
the Cisco MDS 9216i Switch.
Two connected Cisco MDS 9200 Switches or Cisco MDS 9500 Directors running Cisco MDS
SAN-OS Release 2.0(1b) or later, or Cisco NX-OS Release 4.1(1).
A Cisco MDS 9200 Switches or Cisco MDS 9500 Directors running Cisco MDS SAN-OS Release
2.0(1b) or later, or Cisco NX-OS Release 4.1(1) connected to any IPsec compliant device.
The following features are not supported in the Cisco NX-OS implementation of the IPsec feature:
Authentication Header (AH)
Transport mode
Security association bundling
Manually configuring security associations
Per host security association option in a crypto map
Security association idle timeout
Dynamic crypto maps
7-4
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Note
Any reference to crypto maps in this document, only refers to static crypto maps.
Security association (SA) An agreement between two participating peers on the entries required
to encrypt and decrypt IP packets. Two SAs are required for each peer in each direction (inbound
and outbound) to establish bidirectional communication between the peers. Sets of bidirectional SA
records are stored in the SA database (SAD). IPsec uses IKE to negotiate and bring up SAs. Each
SA record includes the following information:
Security parameter index (SPI)A number which, together with a destination IP address and
security protocol, uniquely identifies a particular SA. When using IKE to establish the SAs, the
SPI for each SA is a pseudo-randomly derived number.
PeerA switch or other device that participates in IPsec. For example, a Cisco MDS switch or
For example, one transform is the ESP protocol with the HMAC-MD5 authentication algorithm.
Session keyThe key used by the transform to provide security services.
LifetimeA lifetime counter (in seconds and bytes) is maintained from the time the SA is
created. When the time limit expires the SA is no longer operational and, if required, is
automatically renegotiated (rekeyed).
Mode of operationTwo modes of operation are generally available for IPsec: tunnel mode and
transport mode. The Cisco NX-OS implementation of IPsec only supports the tunnel mode. The
IPsec tunnel mode encrypts and authenticates the IP packet, including its header. The gateways
encrypt traffic on behalf of the hosts and subnets.
The Cisco NX-OS implementation of IPsec does not support transport mode.
Note
The term tunnel mode is different from the term tunnel, which is used to indicate a secure
communication path between two peers, such as two switches connected by an FCIP link.
Anti-replayA security service where the receiver can reject old or duplicate packets to protect
itself against replay attacks. IPsec provides this optional service by use of a sequence number
combined with the use of data authentication.
Data authenticationData authentication can refer either to integrity alone or to both integrity and
authentication (data origin authentication is dependent on data integrity).
Data integrityVerifies that data has not been altered.
Data origin authenticationVerifies that the data was actually sent by the claimed sender.
Data confidentialityA security service where the protected data cannot be observed.
Data flowA grouping of traffic, identified by a combination of source address and mask or prefix,
destination address mask or prefix length, IP next protocol field, and source and destination ports,
where the protocol and port fields can have any of these values. Traffic matching a specific
combination of these values is logically grouped together into a data flow. A data flow can represent
a single TCP connection between two hosts, or it can represent traffic between two subnets. IPsec
protection is applied to data flows.
7-5
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Perfect forward secrecy (PFS)A cryptographic characteristic associated with a derived shared
secret value. With PFS, if one key is compromised, previous and subsequent keys are not
compromised, because subsequent keys are not derived from previous keys.
Security Policy Database (SPD)An ordered list of policies applied to traffic. A policy decides if
a packet requires IPsec processing, if it should be allowed in clear text, or if it should be dropped.
The IPsec SPDs are derived from user configuration of crypto maps.
The IKE SPD is configured by the user.
Advanced Encrypted Standard (AES) is an encryption algorithm. It implements either 128 or 256
bits using Cipher Block Chaining (CBC) or counter mode.
Data Encryption Standard (DES) is used to encrypt packet data and implements the mandatory
56-bit DES-CBC. CBC requires an initialization vector (IV) to start encryption. The IV is explicitly
given in the IPsec packet.
Triple DES (3DES) is a stronger form of DES with 168-bit encryption keys that allow sensitive
information to be transmitted over untrusted networks.
Note
Cisco NX-OS images with strong encryption are subject to United States government export
controls, and have a limited distribution. Images to be installed outside the United States require
an export license. Customer orders might be denied or subject to delay due to United States
government regulations. Contact your sales representative or distributor for more information,
or send e-mail to [email protected].
Message Digest 5 (MD5) is a hash algorithm with the HMAC variant. HMAC is a keyed hash variant
used to authenticate data.
Secure Hash Algorithm (SHA-1) is a hash algorithm with the Hash Message Authentication Code
(HMAC) variant.
Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish a
shared secret over an unsecure communications channel. Diffie-Hellman is used within IKE to
establish session keys. Group 1 (768-bit), Group 2 (1024-bit), and Group 5 (1536-bit) are supported.
Advanced Encrypted Standard (AES) is an encryption algorithm. It implements either 128 bits using
Cipher Block Chaining (CBC) or counter mode.
Data Encryption Standard (DES) is used to encrypt packet data and implements the mandatory
56-bit DES-CBC. CBC requires an initialization vector (IV) to start encryption. The IV is explicitly
given in the IPsec packet.
Triple DES (3DES) is a stronger form of DES with 168-bit encryption keys that allow sensitive
information to be transmitted over untrusted networks.
7-6
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Note
Cisco NX-OS images with strong encryption are subject to United States government export
controls, and have a limited distribution. Images to be installed outside the United States require
an export license. Customer orders might be denied or subject to delay due to United States
government regulations. Contact your sales representative or distributor for more information,
or send e-mail to [email protected].
Message Digest 5 (MD5) is a hash algorithm with the HMAC variant. HMAC is a keyed hash variant
used to authenticate data.
Secure Hash Algorithm (SHA-1) is a hash algorithm with the Hash Message Authentication Code
(HMAC) variant.
The switch authentication algorithm uses the preshared keys based on the IP address
Cleartext
data
Encrypted data
Cleartext
data
144693
Figure 7-2
Every time a new switch is added to the IPsec network, you must configure keys between the new switch
and each of the existing switches. (In Figure 7-3, four additional two-part key configurations are
required to add a single encrypting switch to the network).
7-7
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Consequently, the more devices that require IPsec services, the more involved the key administration
becomes. This approach does not scale well for larger, more complex encrypting networks.
Four IPsec Switches Without a CA and Digital Certificates
144694
Figure 7-3
Certificate
authority
144695
Figure 7-4
7-8
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
To add a new IPsec switch to the network, you need only configure that new switch to request a
certificate from the CA, instead of making multiple key configurations with all the other existing IPsec
switches.
The switch FQDN (host name and domain name) must be configured before installing certificates
for IKE.
Only those certificates that are configured for IKE or general usage are used by IKE.
The first IKE or general usage certificate configured on the switch is used as the default certificate
by IKE.
The default certificate is for all IKE peers unless the peer specifies another certificate.
If the peer asks for a certificate which is signed by a CA that it trusts, then IKE uses that certificate,
if it exists on the switch, even if it is not the default certificate.
If the default certificate is deleted, the next IKE or general usage certificate, if any exists, is used by
IKE as the default certificate.
IKE only sends the identity certificate, not the entire CA chain. For the certificate to be verified on
the peer, the same CA chain must also exist there.
7-9
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
IKE version 1 (IKEv1) is implemented using RFC 2407, 2408, 2409, and 2412.
IKE version 2 (IKEv2) is a simplified and more efficient version and does not interoperate with
IKEv1. IKEv2 is implemented using the draft-ietf-ipsec-ikev2-16.txt draft.
Parameter
Accepted Values
Keyword
Default Value
encryption algorithm
56-bit DES-CBC
des
3des
168-bit DES
3des
128-bit AES
aes
sha
md5
authentication method
Preshared keys
Not configurable
Preshared keys
DH group identifier
768-bit DH
1024-bit DH
1536-bit DH
hash algorithm
sha
7-10
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
The following table lists the supported and verified settings for IPsec and IKE encryption authentication
algorithms on the Microsoft Windows and Linux platforms:
Note
Platform
IKE
IPsec
3DES, SHA-1
3DES, MD5
When you configure the hash algorithm, the corresponding HMAC version is used as the authentication
algorithm.
When the IKE negotiation begins, IKE looks for an IKE policy that is the same on both peers. The peer
that initiates the negotiation will send all its policies to the remote peer, and the remote peer will try to
find a match. The remote peer looks for a match by comparing its own highest priority policy against the
other peer's received policies. The remote peer checks each of its policies in order of its priority (highest
priority first) until a match is found.
A match is found when the two peers have the same encryption, hash algorithm, authentication
algorithm, and DH group values. If a match is found, IKE completes the security negotiation and the
IPsec SAs are created.
If an acceptable match is not found, IKE refuses negotiation and the IPsec data flows will not be
established.
The lifetime association within each policyThe lifetime ranges from 600 to 86,400 seconds. The
default is 86,400 seconds (equals one day). The lifetime association within each policy is configured
when you are creating an IKE policy. See the Configuring an IKE Policy section on page 7-24.
The keepalive time for each peer if you use IKEv2The keepalive ranges from 120 to 86,400
seconds. The default is 3,600 seconds (equals one hour).
The initiator version for each peerIKE v1 or IKE v2 (default). Your choice of initiator version
does not affect interoperability when the remote device initiates the negotiation. Configure this
option if the peer device supports IKEv1 and you can play the initiator role for IKE with the
specified device. Use the following considerations when configuring the initiator version with FCIP
tunnels:
If the switches on both sides of an FCIP tunnel are running MDS SAN-OS Release 3.0(1) or
later, or Cisco NX-OS 4.1(1) you must configure initiator version IKEv1 on both sides of an
FCIP tunnel to use only IKEv1. If one side of an FCIP tunnel is using IKEv1 and the other side
is using IKEv2, the FCIP tunnel uses IKEv2.
If the switch on one side of an FCIP tunnel is running MDS SAN-OS Release 3.0(1) or later, or
Cisco NX-OS 4.1(1b) and the switch on the other side of the FCIP tunnel is running MDS
SAN-OS Release 2.x, configuring IKEv1 on either side (or both) results in the FCIP tunnel
using IKEv1.
7-11
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Only IKE v1 is supported to build IPsec between 2.x and 3.x MDS switches.
Note
Caution
You may need to configure the initiator version even when the switch does not behave as an
IKE initiator under normal circumstances. Always using this option guarantees a faster
recovery of traffic flows in case of failures.
Tip
The keepalive time only applies to IKEv2 peers and not to all peers.
Note
When IPsec implementations in the host prefer to initiate the IPsec rekey, be sure to configure the IPsec
lifetime value in the Cisco MDS switch to be higher than the lifetime value in the host.
Indicate the data flow to be protected by the new SAs (specified by a single permit entry) when
initiating negotiations for IPsec SAs.
Process inbound traffic to filter out and discard traffic that should have been protected by IPsec.
Determine whether or not to accept requests for IPsec SAs on behalf of the requested data flows
when processing IKE negotiation from the IPsec peer.
Tip
If you want some traffic to receive one type of IPsec protection (for example, encryption only) and other
traffic to receive a different type of IPsec protection (for example, both authentication and encryption),
create two IPv4-ACLs. Use both IPv4-ACLs in different crypto maps to specify different IPsec policies.
Note
7-12
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Tip
The crypto map entries themselves must also support common transforms and must refer to the other
system as a peer.
Figure 7-5 shows some sample scenarios with and without mirror image IPv4-ACLs.
Figure 7-5
Subnet Y
Host B
Subnet X
Switch M
Router N
S0
Mirror image
access lists at
Switch M S0
and
Router N S1
Case 1
Case 2
Case 3
Case 4
Internet
Host C
S1
permits
Subnet X
Subnet Y
permits
Subnet Y
Subnet X
permits
Switch M
Host B
permits
Subnet Y
Subnet X
1st packet
M
B
or B
M
M
B
or B
M
or M
C
M
Result
SAs established for
Traffic M
B (good
SAs established for
Traffic X
Y (good
As Figure 7-5 indicates, IPsec SAs can be established as expected whenever the two peers' crypto
IPv4-ACLs are mirror images of each other. However, an IPsec SA can be established only some of the
time when the IPv4-ACLs are not mirror images of each other. This can happen in the case when an entry
in one peer's IPv4-ACL is a subset of an entry in the other peer's IPv4-ACL, such as shown in cases 3
and 4 of Figure 7-5. IPsec SA establishment is critical to IPsec. Without SAs, IPsec does not work,
causing any packets matching the crypto IPv4-ACL criteria to be silently dropped instead of being
forwarded with IPsec security.
In case 4, an SA cannot be established because SAs are always requested according to the crypto
IPv4-ACLs at the initiating packet's end. In case 4, router N requests that all traffic between subnet X
and subnet Y be protected, but this is a superset of the specific flows permitted by the crypto IPv4-ACL
at switch M so the request is not permitted. Case 3 works because switch M's request is a subset of the
specific flows permitted by the crypto IPv4-ACL at router N.
7-13
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Because of the complexities introduced when crypto IPv4-ACLs are not configured as mirror images at
peer IPsec devices, we strongly encourage you to use mirror image crypto IPv4-ACLs.
We recommend that you configure mirror image crypto IPv4-ACLs for use by IPsec and that you avoid
using the any option.
The any keyword in a permit statement is discouraged when you have multicast traffic flowing through
the IPsec interface. This configuration can cause multicast traffic to fail.
The permit any statement causes all outbound traffic to be protected (and all protected traffic sent to the
peer specified in the corresponding crypto map entry) and requires protection for all inbound traffic.
Then, all inbound packets that lack IPsec protection are silently dropped, including packets for routing
protocols, NTP, echo, echo response, and so forth.
You need to be sure you define which packets to protect. If you must use any in a permit statement, you
must preface that statement with a series of deny statements to filter out any traffic (that would otherwise
fall within that permit statement) that you do not want to be protected.
Tip
If you change a transform set definition, the change is only applied to crypto map entries that reference
the transform set. The change is not applied to existing security associations, but used in subsequent
negotiations to establish new security associations. If you want the new settings to take effect sooner,
you can clear all or part of the security association database.
Note
When you enable IPsec, the Cisco NX-OS software automatically creates a default transform set
(ipsec_default_tranform_set) using AES-128 encryption and SHA-1 authentication algorithms.
Table 7-2 provides a list of allowed transform combinations for IPsec.
7-14
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Table 7-2
Parameter
Accepted Values
Keyword
encryption algorithm
56-bit DES-CBC
esp-des
168-bit DES
esp-3des
128-bit AES-CBC
128-bit AES-CTR
esp-aes 128
256-bit AES-CBC
256-bit AES-CTR
hash/authentication algorithm
(optional)
esp-sha1-hmac
esp-md5-hmac
AES-XCBC-MAC
esp-aes-xcbc-mac
1. If you configure the AES counter (CTR) mode, you must also configure the authentication algorithm.
The following table lists the supported and verified settings for IPsec and IKE encryption authentication
algorithms on the Microsoft Windows and Linux platforms:
Platform
IKE
IPsec
3DES, SHA-1
3DES, MD5
The traffic to be protected by IPsec (per the crypto IPv4-ACL). A crypto map set can contain
multiple entries, each with a different IPv4-ACL.
The IPsec-protected traffic destination (who the remote IPsec peer is).
The local address to be used for the IPsec traffic (applying to an interface).
The IPsec security to be applied to this traffic (selecting from a list of one or more transform sets).
Crypto map entries with the same crypto map name (but different map sequence numbers) are grouped
into a crypto map set.
When you apply a crypto map set to an interface, the following events occur:
All IP traffic passing through the interface is evaluated against the SPD.
7-15
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
If a crypto map entry sees outbound IP traffic that requires protection, an SA is negotiated with the
remote peer according to the parameters included in the crypto map entry.
The policy derived from the crypto map entries is used during the negotiation of SAs. If the local switch
initiates the negotiation, it will use the policy specified in the crypto map entries to create the offer to be
sent to the specified IPsec peer. If the IPsec peer initiates the negotiation, the local switch checks the
policy from the crypto map entries and decides whether to accept or reject the peer's request (offer).
For IPsec to succeed between two IPsec peers, both peers' crypto map entries must contain compatible
configuration statements.
The crypto map entries must contain compatible crypto IPv4-ACLs (for example, mirror image
IPv4-ACLs). If the responding peer entry is in the local crypto, the IPv4-ACL must be permitted by
the peer's crypto IPv4-ACL.
The crypto map entries must each identify the other peer or must have auto peer configured.
If you create more than one crypto map entry for a given interface, use the seq-num of each map
entry to rank the map entries: the lower the seq-num, the higher the priority. At the interface that has
the crypto map set, traffic is evaluated against higher priority map entries first.
The crypto map entries must have at least one transform set in common, where IKE negotiations are
carried out and SAs are established. During the IPsec SA negotiation, the peers agree to use a
particular transform set when protecting a particular data flow.
When a packet matches a permit entry in a particular IPv4-ACL, the corresponding crypto map entry is
tagged, and the connections are established.
7-16
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Figure 7-6 shows a scenario where the auto-peer option can simplify configuration. Using the auto-peer
option, only one crypto map entry is needed for all the hosts from subnet X to set up SAs with the switch.
Each host will set up its own SA, but will share the crypto map entry. Without the auto-peer option, each
host needs one crypto map entry.
Figure 7-6
Subnet X
Host 2
Host 1
iPSEC
MDS A
iPSEC
iPSEC
Router
Host 3
120879
iPSEC
7-17
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
IPsec Maintenance
Certain configuration changes will only take effect when negotiating subsequent security associations.
If you want the new settings to take immediate effect, you must clear the existing security associations
so that they will be reestablished with the changed configuration. If the switch is actively processing
IPsec traffic, it is desirable to clear only the portion of the security association database that would be
affected by the configuration changes (that is, clear only the security associations established by a given
crypto map set). Clearing the full security association database should be reserved for large-scale
changes, or when the router is processing very little other IPsec traffic.
If you use IKEv1 to set up IPsec SAs, the SA lifetime values are chosen to be the smaller of the two
proposals. The same values are programmed on both the ends of the tunnel.
If you use IKEv2 to set up IPsec SAs, the SAs on each end have their own set up of lifetime values
and thus the SAs on both sides expire independently.
The SA (and corresponding keys) will expire according to whichever comes sooner, either after the
specified amount of time (in seconds) has passed or after the specified amount of traffic (in bytes) has
passed.
A new SA is negotiated before the lifetime threshold of the existing SA is reached to ensure that
negotiation completes before the existing SA expires.
The new SA is negotiated when one of the following thresholds is reached (whichever comes first):
If no traffic has passed through when the lifetime expires, a new SA is not negotiated. Instead, a new SA
will be negotiated only when IPsec sees another packet that should be protected.
Obtain the ENTERPRISE_PKG license (see the Cisco MDS 9000 Family NX-OS Licensing Guide).
Configure IKE as described in the About IKE Initialization section on page 7-9.
7-18
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Note
The IPsec feature only considers the source and destination IPv4 addresses and subnet masks,
protocol, and single port number. There is no support for IPv6 in IPsec.
Note
The IPsec feature does not support port number ranges and ignores higher port number field,
if specified.
The permit option causes all IP traffic that matches the specified conditions to be protected by
crypto, using the policy described by the corresponding crypto map entry.
The deny option prevents traffic from being protected by crypto. The first deny statement causes the
traffic to be in clear text.
The crypto IPv4-ACL you define is applied to an interface after you define the corresponding crypto
map entry and apply the crypto map set to the interface.
Different IPv4-ACLs must be used in different entries of the same crypto map set.
Inbound and outbound traffic is evaluated against the same outbound IPv4-ACL. Therefore, the
IPv4-ACL's criteria is applied in the forward direction to traffic exiting your switch, and the reverse
direction to traffic entering your switch.
Each IPv4-ACL filter assigned to the crypto map entry is equivalent to one security policy entry. The
IPsec feature supports up to 120 security policy entries for each MPS-14/2 module and Cisco MDS
9216i Switch.
IPsec protection (see Figure 7-7) is applied to traffic between switch interface S0 (IPv4 address
10.0.0.1) and switch interface S1 (IPv4 address 20.0.0.2) as the data exits switch A's S0 interface
enroute to switch interface S1. For traffic from 10.0.0.1 to 20.0.0.2, the IPv4-ACL entry on switch
A is evaluated as follows:
source = IPv4 address 10.0.0.1
dest = IPv4 address 20.0.0.2
For traffic from 20.0.0.2 to 10.0.0.1, that same IPv4-ACL entry on switch A is evaluated as follows:
7-19
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
source = IPv4 address 20.0.0.2
dest = IPv4 address 10.0.0.1
Figure 7-7
IPSec peers
MDS_Switch A
MDS_Switch N
S0
Internet
S1
120485
If you configure multiple statements for a given crypto IPv4-ACL that is used for IPsec, the first
permit statement that is matched is used to determine the scope of the IPsec SA. Later, if traffic
matches a different permit statement of the crypto IPv4-ACL, a new, separate IPsec SA is negotiated
to protect traffic matching the newly matched IPv4-ACL statement.
Unprotected inbound traffic that matches a permit entry in the crypto IPv4-ACL for a crypto map
entry flagged as IPsec is dropped, because this traffic was expected to be protected by IPsec.
For IPsec to interoperate effectively with Microsoft iSCSI initiators, specify the TCP protocol and
the local iSCSI TCP port number (default 3260) in the IPv4-ACL. This configuration ensures the
speedy recovery of encrypted iSCSI sessions following disruptions such as Gigabit Ethernet
interfaces shutdowns, VRRP switchovers, and port failures.
The sequence number for each crypto map decides the order in which the policies are applied. A
lower sequence number is assigned a higher priority.
Only one IPv4-ACL is allowed for each crypto map entry (the IPv4-ACL itself can have multiple
permit or deny entries).
When the tunnel endpoint is the same as the destination address, you can use the auto-peer option
to dynamically configure the peer.
For IPsec to interoperate effectively with Microsoft iSCSI initiators, specify the TCP protocol and
the local iSCSI TCP port number (default 3260) in the IPv4-ACL. This configuration ensures the
speedy recovery of encrypted iSCSI sessions following disruptions such as Gigabit Ethernet
interfaces shutdowns, VRRP switchovers, and port failures.
7-20
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Default Settings
Table 7-3 lists the default settings for IKE parameters.
Table 7-3
Parameters
Default
IKE
Disabled.
IKE version
IKE version 2.
3DES.
SHA.
Group 1.
IKE keepalive time for each peer (v2) 3,600 seconds (equals 1 hour).
Table 7-4 lists the default settings for IPsec parameters.
Table 7-4
Parameters
Default
IPsec
Disabled.
IPsec PFS
Disabled.
450 Gigabytes.
Detailed Steps
To enable IPsec using the FCIP Wizard, follow these steps:
Step 1
7-21
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Figure 7-8
Step 2
FCIP Wizard
Choose the switches that act as end points for the FCIP link and click Next.
Note
These switches must have MPS-14/2 modules installed to configure IPsec on this FCIP link.
Step 3
Choose the Gigabit Ethernet ports on each MPS-14/2 module that will form the FCIP link.
Step 4
Check the Enforce IPSEC Security check box and set IKE Auth Key (see Figure 7-9).
Figure 7-9
Step 5
Click Next. In the Specify Tunnel Properties dialog box, you see the TCP connection characteristics.
Step 6
Set the minimum and maximum bandwidth settings and round-trip time for the TCP connections on this
FCIP link. Click the Measure button to measure the round-trip time between the Gigabit Ethernet
endpoints.
Step 7
Check the Enable Write Acceleration check box to enable FCIP write acceleration on this FCIP link.
Step 8
Check the Enable Optimum Compression check box to enable IP compression on this FCIP link.
Step 9
Step 10
Set the Port VSAN for nontrunk/auto and allowed VSAN list for the trunk tunnel. Choose a Trunk Mode
for this FCIP link. See the IP Services Configuration Guide, Cisco DCNM for SAN.
7-22
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Step 11
Click Finish to create this FCIP link or click Cancel to exit the FCIP Wizard without creating an FCIP
link.
Detailed Steps
To verify that IPsec and IKE are enabled, follow these steps:
Step 1
Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
Step 2
The Control tab is the default. Verify that the switches you want to modify for IPSec are enabled in the
Status column.
Step 3
Expand Switches > Security, and then select IKE in the Physical Attributes pane.
Step 4
The Control tab is the default. Verify that the switches you want to modify for IKE are enabled in the
Status column.
Prerequisites
After you have completed IKE configuration, configure IPsec.
Detailed Steps
To configure IPsec in each participating IPsec peer, follow these steps:
Step 1
Identify the peers for the traffic to which secure tunnels should be established.
Step 2
Configure the transform set with the required protocols and algorithms.
Step 3
Create the crypto map and apply access control lists (IPv4-ACLs), transform sets, peers, and lifetime
values as applicable.
Step 4
7-23
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Using IPsec
To use the IPsec feature, follow these steps:
Step 1
Obtain the ENTERPRISE_PKG license to enable IPsec for iSCSI and to enable IPsec for FCIP. See the
Cisco MDS 9000 Family NX-OS Licensing Guide for more information.
Step 2
Configure IKE as described in the Configuring IPsec and IKE Manually section on page 7-23.
Note
The IPsec feature inserts new headers in existing packets (see the IP Services Configuration
Guide, Cisco DCNM for SAN for more information).
Step 2
Step 3
Step 4
Enter the Priority for this switch. You can enter a value from one through 255, one being the highest.
Step 5
Select appropriate values for the encryption, hash, authentication, and DHGroup fields.
Step 6
Enter the lifetime for the policy. You can enter a lifetime from 600 to 86400 seconds.
Step 7
Click Create to create this policy, or click Close to discard any unsaved changes.
Step 2
7-24
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Step 3
Enter a value (in seconds) in the KeepAliveInterval (sec). The keepalive interval in seconds is used by
the IKE entity on the managed device with all the peers for the DOI corresponding to this conceptual
row.
Step 4
Step 2
Step 3
Step 4
Select the Switches for the remote peer for which this IKE protocol initiator is configured.
Step 5
Step 6
Click Create to create this initiator version or click Close to discard any unsaved changes.
Detailed Steps
To clear all the IKE tunnels or domains, follow these steps:
Step 1
Expand Switches > Security, and then select IKE in the Physical Attributes pane.
Step 2
Step 3
Click the Action column and select Clear to clear the tunnel.
7-25
Chapter 7
Configuring Crypto
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Refreshing SAs
Detailed Steps
To refresh the SAs after changing the IKEv2 configuration, follow these steps:
Step 1
Expand Switches > Security, and then select IKE in the Physical Attributes pane.
Step 2
Step 3
Configuring Crypto
This sections includes the following topics:
Expand Switches > Security, and then select IPSec in the Physical Attributes pane.
Step 2
Step 3
7-26
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Figure 7-10
Create IPSEC
Step 4
Select the switches that you want to create a transform set for in the Create Transform Set dialog box.
Step 5
Step 6
Select the encryption and authentication algorithm. See Table 7-2 to verify the allowed transform
combinations.
Step 7
Expand Switches > Security, and then select IPSEC in the Physical Attributes pane.
Step 2
Step 3
Step 4
Select the switch that you want to configure or modify. If you are creating a crypto map, set the setName
and priority for this crypto map.
Step 5
Select the IPv4-ACL Profile and TransformSetIdList from the drop-down list for this crypto map.
Step 6
(Optional) Check the AutoPeer check box or set the peer address if you are creating a crypto map. See
the About the AutoPeer Option section on page 7-17.
Step 7
Choose the appropriate PFS selection. See the About Perfect Forward Secrecy section on page 7-17.
Step 8
Supply the Lifetime and LifeSize. See the About SA Lifetime Negotiation section on page 7-16.
Step 9
Click Create if you are creating a crypto map, or click Apply Changes if you are modifying an existing
crypto map.
7-27
Chapter 7
Configuring Crypto
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
Step 2
Step 3
Step 4
Step 5
Expand Switches > Security and then select IPSEC in the Physical Attributes pane.
Step 2
Step 3
From the drop-down list in the PFS column select the appropriate value.
Step 4
Expand Switches > Security, and then select IPSEC in the Physical Attributes pane.
7-28
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Step 2
Step 3
Step 4
Enter the name of the crypto map that you want to apply to this interface in the CryptomapSetName field.
Step 5
Click Create to apply the crypto map to the selected interface or click Close to exit the dialog box
without applying the crypto map.
Choose Switches > Security, and then select IPSEC in the Physical Attributes pane.
Step 2
Step 3
Step 4
Step 5
IPsec
Field
Description
Interface, CryptomapName
Field
Description
RemIdentity
Displays the keepalive interval in seconds used by the IKE entity on the
managed device with all the peers for the DOI corresponding to this
conceptual row.
Key
IKE Global
7-29
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Description
KeepAliveInterval (sec)
The Phase 1 ID identity of the peer for which this pre-shared key is
configured on the local entity.
IdentityType
Field
Description
Priority
The priority of this ISAKMP policy entry. The policy with lower value
would take precedence over the policy with higher value in the same
DOI.
Encr
Hash
Auth
DHGroup
Specifies the Oakley group used for Diffie Hellman exchange in the
Main Mode. If this policy item is selected to negotiate Main Mode with
an IKE peer, the local entity chooses the group specified by this object
to perform Diffie Hellman exchange with the peer.
Lifetime (sec)
Specifies the lifetime in seconds of the IKE tunnels generated using this
policy specification.
IKE Policies
Description
Address
Version
7-30
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
IKE Tunnels
Field
Description
LocalAddress
RemoteAddresss
AuthMethod
Action
The action to be taken on this tunnel. If clear, then this tunnel is cleared.
If re-key, then re-keying is forced on this tunnel. The value none would
be returned on doing read of this object.
Field
Description
Lifetime (sec)
Lifesize (KB)
IPSEC Global
Description
Id
This is the sequence number of the transform set that uniquely identifies
the transform set. Distinct transform sets must have distinct sequence
numbers.
Protocol
ESP Encryption
ESP Authentication
Mode
7-31
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Description
IpFilter
TransformSetIdList
AutoPeer
If true the destination address is taken as the peer address, while creating
the tunnel.
Peer Address
PFS
Identifies whether the tunnels instantiated due to this policy item should
use Perfect Forward Secrecy (PFS) and if so, what group of Oakley they
should use.
LifeTime
Lifesize Value
Identifies the life size (maximum traffic in bytes that may be carried) of
the IPSec SAs created using this IPSec policy entry. When a Security
Association (SA) is created using this IPsec policy entry, its life size
takes the value of this object.
IPSEC Interfaces
Field
Description
CryptomapName
The index of the static cryptomap table. The value of the string is the
name string assigned by the NMS when defining a cryptomap set.
InterfaceList
IPSEC Tunnels
Field
Description
Local Address
The IP address of the local endpoint for the IPsec Phase-2 tunnel.
RemoteAdddress
The type of the IP address of the remote endpoint for the IPsec Phase-2
tunnel.
ESP Encryption
7-32
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
Field
Description
The key size in bits of the negotiated key to be used with the algorithm
denoted by ceipSecTunOutSaEncryptAlgo. For DES and 3DES the key
size is respectively 56 and 168. For AES, this will denote the negotiated
key size.
ESP Authentication
LifeSize (KB)
LifeTime (sec)
Action
7-33
Chapter 7
Se n d d o c u m e n t a t i o n c o m m e n t s t o d c n m - s a n - d o c f e e d b a ck @ c i s c o . c o m
7-34