Managing ipsec tunnels – H3C Technologies H3C Intelligent Management Center User Manual

Page 38

Advertising
background image

28

The Registration Information Details window appears.
Registration Information Details contents

{

Device Name—Name of the VAM client.

{

Interval (s)—Interval at which the client retransmits the VAM protocol packet when it does not
receive a response from the server, in seconds. A VAM protocol packet can be a connection

request, negotiation acknowledgement, registration request, or authentication request.

{

Username—User name used by the VAM client for authentication.

{

Prim Server Encryption Algorithm—Encryption algorithm used for encrypting authentication
packets that are exchanged between the primary VAM server and client.

{

Prim Server Auth Algorithm—Authentication algorithm used for authenticating connection

requests from the VAM client and authentication responses from the primary VAM server.

{

Prim Server Duration—How long the VAM client has been connected to the primary VAM
server.

{

Sec Server Encryption Algorithm—Encryption algorithm used for encrypting authentication
packets that are exchanged between the secondary VAM server and client.

{

Sec Server Auth Algorithm—Authentication algorithm used for authenticating connection
requests from the VAM client and authentication responses from the secondary VAM server.

{

Sec Server Duration—How long the VAM client has been connected to the secondary VAM
server.

8.

Click Close to close the Registration Information Details window.

Managing IPsec tunnels

An IPsec tunnel is a bidirectional channel created between two peers. IVM periodically synchronizes

IPsec devices to discover the IPsec tunnels established on the devices. The tunnels can be deployed by

IVM, manually configured on the device by operators, or established through automatic negotiation in

the DVPN. The IPsec tunnel can be in Ready state or Disconnected state:

Ready state—IPsec tunnels that are established through IPsec SA negotiation, and protected data
can be transmitted in the tunnel.

Disconnected state—The lifetime timer of the IPsec SAs has expired, and new SAs failed to be
established due to the lack of protected data flows or failure to receive a SA negotiation response

from the tunnel peer end.

An IPsec SA can be set up manually or through IKE negotiation (ISAKMP). A manually created SA never

ages out. An IKE created SA has a specified lifetime, which can be time-based or traffic-based. IVM only

supports IKE created SAs when deploying IPsec tunnels.
If no traffic that requires IPsec protection is transmitted after the lifetime timer of an IKE-negotiated SA

expires, the system disconnects the IPsec tunnel established between the SAs. With tunnel traps

configured for an IPsec device, the device sends a trap to IVM whenever a tunnel is set up or

disconnected. IVM updates the tunnel status of the device based on the received tunnel traps, and
records the tunnel setup and disconnect history. For more information about setting tunnel traps for a

device, see "

Setting tunnel traps

."

You can query, view, delete, enable or disable monitoring of an IPsec tunnel. You can also query, view,

and export the tunnel event history of an IPsec device.

Advertising