Dell POWEREDGE M1000E User Manual

Page 516

Advertising
background image

488

Fabric OS Command Reference

53-1002746-01

ipSecConfig

2

type

Specifies the policy to be displayed. Valid values for type include the following:

policy ips

Displays the IPSec policy configuration. A policy subtype must be specified when
displaying the IPSec policy configuration. Valid subtypes include the following:

selector

Displays IPSec selector parameters including IPSec policy name, IP address
of the local entity, IP address of the remote entity, direction of traffic flow
(inbound or outbound), upper layer protocol used, and IPSec transform index.

transform

Displays IPSec transform parameters including IPSec policy name, key
management protocol (version) or manual SA, processing option for selected
IP traffic, IPSec mode (tunnel or transport), IP address of the local entity, IP
address of the remote entity, and SA proposal.

sa-proposal

Displays the parameters of the SA proposal, including proposal name,
lifetime (in seconds and in byte units, or infinite), and associated SA
definitions.

sa

Displays security association (SA) parameters for the specified IPSec policies
including policy names, IPSec protocol used (AH or ESP), encryption and
authentication algorithms.

policy ike

Displays the IKE policy configuration. No subtype is required with this command.
The command displays the following IKE policy parameters: IKE version, IP
address of the remote entity, IP address of the local entity, encryption algorithm,
hash algorithm, PRF algorithm, DH group, authentication method, path and
filename of the preshared key.

manual-sa

Displays the Security Associations in the local SADB. No subtype is required with
this command.

arguments

Specifies the display selection as one of the following:

-a

Displays all configuration information for the specified type and subtype.

-tag name

Displays configuration information for the specified IPSec policy only.

--help

Displays the command usage. Optionally use --help with a specified command,
type, and subtype to display the syntax for specific commands. Do not include a
double dash when specifying the command.

EXAMPLES

Example 1

The following example illustrates how to secure traffic between two systems using AH protection with
MD5 and configure IKE with preshared keys. The two systems are a switch, BROCADE300 (IPv4
address 10.33.74.13), and an external UNIX server (10.33.69.132).

1.

On the system console, log in to the switch as Admin and enable IPSec.

switch:admin> ipsecconfig --enable

Advertising