Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Caption
0Table
1Spd Parameters

Parameter

Length/Range

Description

Name

1-23

Specifies the name of an IPsec Security Policy Database (SPD) entry. The IPsec SPD is an ordered list of entries ("rules") that specify sets of packets and determine whether or not to permit, deny, or protect packets between the 

Spacevars
0product
and the peer that is referenced from the entry. If the packets are to be protected, this entry references information that specifies how to protect them.

You may create and configure up to 4,096 SPD entries.

StateNAAdministrative state to disable or enable a SPD entry. Zero indicates wildcard. 
Precedence0-65535Evaluation order of this entry. Zero indicates wildcard.A unique precedence (evaluation order) for this SPD.
Local Ip AddrN/ASpecifies the local IPv4 or IPv6 address of the SPD traffic selector. Zero indicates wildcard.
Local Ip Prefix Len0-128Specifies the local IP prefix length of the SPD traffic selector. Default value is 0.
Local Port0-65535Specifies the local port of the SPD traffic selector. Zero indicates wildcard. Default value is 0.
Remote Ip AddrNASpecifies the remote IPv4 or IPv6 address of the SPD traffic selector. Zero indicates wildcard.
Remote Ip Prefix Len0-128Specifies the remote IP prefix length of the SPD traffic selector. Zero indicates wildcard. Default value is 0.
Remote Port0-65535Specifies the remote port of the SPD traffic selector. Zero indicates wildcard. Default value is 0.
Protocol0-255Specifies the IP protocol number of the SPD traffic selector. This parameter uses IANA protocol number assignment, that is, protocol number 6 represents TCP, protocol number 17 represents UDP. Zero indicates wildcard. Default value is 0.

Action

N/A

Action applied when packets processed by IPSEC found matching the selectors of this SPD rule.

  • Discard – Specifies that the packets are dropped.
  • Bypass – Specifies that the packets are bypassed as clear text.
  • Protect – Specifies that the packets are protected by IPSEC based on the protection parameters specified in the configured ipsec protection profile.

Mode

NA

Note

This parameter is only applicable if the Action parameter is set to Protect.

Use this parameter to set the IPsec mode for the SPD.

  • Tunnel (default) – Use this mode to encrypt and authenticate the entire IP packet (both header and payload). This encrypted packet is encapsulated in a new packet containing a new IP header.
  • Transport – Use this mode to encrypt and authenticate the IP payload only.

...