Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: corrected hard link

...

Add_workflow_for_techpubs

...

AUTH1

...

eyoustra

...

JIRAIDAUTH

...

SBX-75414
REV5

...

ghoppe
REV6

...

ghoppe
REV3

...

absharma
REV1

...

absharma

Panel

In this section:

Table of Contents
maxLevel4

...

 

The

Spacevars
0company
 Lawful Intercept (LI) solution supports the following:

  • Encrypts media transferred from Session Border Controller (SBC) to the collection device to avoid security issues.
  • Supports Internet Protocol Security (

...

  • IPsec) encapsulation of Call Data interface (X3).
  • Enables

...

  • IPsec encapsulation on the Call Content (media) interface for LI security.
  • Associates

...

  • IPsec to the IP interface group configured in the CDC.
  • Manages

...

  • IPsec at the application level.

This page describes how to configure IPsec support.

 

Excerpt

Access the SBC Configuration Manager

...

  1. Log on to the EMS

...

  1. .

...

...

  1. Click Network

...

  1.  > Cluster

...

  1. Management.

...

  1. The Cluster Management /

...

Create cluster. For more information, see Creating an SBC SWe Cluster.

...

Click Configurations tab.

...

  1. Manage VNFs window opens listing the SBC clusters created on the EMS.

  1. Caption
    0Figure
    1

...

  1. Cluster Management / Manage VNFs window
    Image Modified
  2. Click

...

Select the version of the configuration from the Version drop-down menu.

...

Select an SBC Configurator instance from the Master Configurator drop-down menu.
This node is used to create the configuration. The SBC Configurator nodes are displayed based on the version selected. Only unlocked SBC Configurator nodes are listed.

Enter a name for the configuration in the Configuration Name field. The SBC configuration name can contain only letters, numbers, dashes (-), apostrophes ('), underscores (_), colons (:) and spaces.

Note

The cluster ID is set as the default name for the first configuration. You can modify the name. The name must be unique.

The subsequent configurations are named with a combination of cluster name and some unique identifying information. The default name varies based on how the configuration is created.

  1. the radio button adjacent to the name of the cluster you want to configure. The Details tab for the selected cluster opens. 
  2. Click the Configurations tab. 

...

  1. Caption
    0Figure
    1

...

  1. Configurations Tab

    Image Modified

...

  1. Click Edit Configuration. The SBC Configuration Manager opens in a separate window against the cluster's active OAM node. See the EMA User Guide for information on using the GUI to configure the SBC.

    Caption
    0Figure
    1

...

  1. SBC Configuration Manager Window

    Image Modified

...

 

 

Creating an IKE Protection Profile

In the SBC

...

Configuration Manager window

...

:   

  1. Click Configuration > Profile Management.
  2. On the navigation pane, choose Security Profiles as the Category.
  3. Click IKE Protection Profile > New IKE Protection Profile.

...

Caption
0Figure
1+New IKE Protection Profile

Image Removed

  1. The Create New IKE

...

  1. Protection Profile window is displayed

...

  1. .

    ...

    Caption
    0Figure
    1Creating New IKE Protection Profile

    Image Modified

  2. Use the following table to configure the profile and click Save.

 

Caption
0Table
1IKE Protection Profile Parameters

Parameter

Description

Name

Specifies the name of the IKE Protection Profile.

SA Lifetime
Time

The maximum interval seconds that any one

...

security association is maintained before possible re-keying. This parameter is applied to the IKE SA when it appears in the IKE Protection Profile and to the IPsec SA when it appears in the IPsec Protection Profile.

Default value: 8 hours (28,800 seconds)

Value range: 1200-1000000

DPD Interval

Specifies the IKE Protection Profile Dead Peer Detection test interval period in seconds.

The value '0' corresponds to DPD disabled.

Default value is 30.

...

PfS Required

Enable flag to require PFS use during

...

IPsec SA negotiation.

  • Disabled (default)
  • Enabled

...

Configuring the Algorithm for the Profile

In the SBC Configuration Manager window:  

  1. Click Configuration > Profile Management.
  2. On the navigation pane, choose Security Profiles as Category.
  3. Click IKE Protection Profile > New IKE Protection Profile > Algorithms

...

  1. . The Algorithms window is displayed.

  2. Choose the

...

  1. name of your IKE protection profile in IKE Protection Profile.

    Caption
    0Figure
    1New IKE Protection Profile - Algorithms

    Image Modified



  2. Use the following table to configure algorithm parameters for the profile and click Save.

    Caption
    0Table
    1New IKE Protection Profile - Algorithms Parameters

    Parameter

    Description

    Encryption

    The IKE Protection

...

  1. profile encryption cipher. You can select multiple encryptions.

    Options are:

    • _3DesCbc
    • aesCbc128 (default)

    Integrity

    The IKE Protection

...

  1. profile integrity

...

  1. cipher. You can select multiple parameters.

    Options are:

    • hmacMd5  (default)
    • hmacSha1
    • hmacsha256
    Dh Group

    Specifies the DH group(s) supported in the IKE exchange. The options are:

    • modp768

...

    • modp1024  (default)
    • modp1536
    • modp2048

...

Creating an IPsec - Peer

...

This object creates an entry in the IKE Peer Database (IPD). The IPD is a list of remote devices that may become

...

IPsec peers. The IPD establishes the authentication and other phase 1 criteria for the peer-to-peer negotiation to eventually reach an IKE Security Association (SA) between this specific peer and the SBC.

...

In the SBC Configuration Manager window: 

  1. Click All > Address Context > IPsec > PeerThe Peer window opens and the Peer List is displayed.
  2. Choose an address context to which you want to add the peer from the Address Context list and click New Peer. The Create New Peer window opens

Creating a Peer

...

  1. .

    Caption
    0Figure
    1

...

  1. Create New Peer Window

    Image Modified

...

  1. Use the following table to configure the peer and click Save.

Caption
0

...

...

Table
1Creating New Peer Parameters

...

 

 Parameter

Description

Name

Specifies the name of the peer you are configuring.

IP Address V4 or V6

Specifies the 32-bit IP address of the

...

peer.

Protocol

The SPD traffic selector IP

...

protocol. Valid values for this parameter are:

  • Ikev1: Indicates the version of IKE protocol. Internet Key Exchange Version 1.
  • Ikev2: Indicates the enhanced version of IKE protocol. Internet Key Exchange Version 2.
  • Any: Indicates either IKEv1 is used or IKEv2 version is used.

Pre Shared Key

Specifies the Pre-shared secret with this peer. The Pre Shared Key can be one of the following:

  • A string ranging from 32 to 128 case-sensitive, alphanumeric characters. These characters may only be in the range 0-9, a-z, space, and A-Z
  • A hexadecimal value introduced by "0x" and followed by 16 to 64 hexadecimal digits (0-9, a-f, A-F)

In either case the given value represents a pre-shared secret between the

Spacevars
0product

SBC and the IKE peer. This value is used for mutual authentication for phase 1 negotiation to set up an IKE Security association.

...

Note:

Spacevars
0company
recommends using unpredictable (difficult to guess) values. Use a unique value for each IKE peer

...

.

Protection
Profile

The name of the IKE protection profile to be applied to the Key management protocol exchange with the peer.
Local Identity

...

Specifies the local identity

...

that SBC asserts to the peer during phase 1 authentication.

...

Note

The ipVxAddr attribute is not used at this time. If it is present, ignore it.

Select a Type of identifier in the drop-down list and then provide the specific value in the adjacent entry field. Option are:

  • IP v4Addr (default)
  • IP v4Addr
  • FQDN

Note: The IP VxAddr option is

Viewing a Peer

  1. On the navigation pane, choose Address Context > IPsec > Peer.
  2. In Address Context drop-down menu, choose the Peer. The Peer List is displayed.

    Caption
    0Figure
    1Viewing Peer
    Image Removed

Editing a Peer

Click the radio button adjacent to Peer name.

Caption
0Figure
1Editing Peer
Image Removed

...

Modify the relevant parameters, and click Save.

Caption
0Figure
1Editing Selected Peer
Image Removed

Copying a Peer

Click the radio button adjacent to the Peer. Click Copy Peer.

Caption
0Figure
1Copying Peer
Image Removed

...

Type the relevant parameters, and click Save.

Caption
0Figure
1Copying Selected Peer
Image Removed

...

not used at this time.

...

Deleting a Peer

  1. Click the radio button adjacent to the Peer. Click Delete.

    Caption
    0Figure
    1Deleting Peer
    Image Removed
  2. A delete confirmation message appears. Click Yes.

    Caption
    0Figure
    1Deleting Peer Prompt
    Image Removed

Peer - Local Identity

The object specifies the local identity type  that 

Spacevars
0product
asserts to the peer during phase 1 authentication.

Viewing and Editing Local Identity

...

On the navigation pane, choose Address Context > IPsec > Peer > Local Identity. The Local Identity window is displayed.

Caption
0Figure
1Editing Local Identity

Image Removed

...

In Address Context drop-down menu, choose the Local Identity.

...

IN Peer drop-down menu, choose the Peer.

...

Configuring the Peer Remote Identity

This object specifies the remote IKE identity that is authorized to be negotiated with during phase I negotiation.

In the SBC Configuration Manager window: 

  1. Click All > Address Context > IPsec > Peer > Remote Identity. The Remote Identity window opens.
  2. In the drop-down lists, select the Address Context and Peer names for the peer you are configuring. 
  3. Select a Type of identifier in the drop-down list and then provide the specific value in the adjacent entry field. Option are:

    • IP v4Addr (default)
    • IP v4Addr
    • FQDN

...

  1. Click Save.

Caption
0

...

Figure
1Editing

...

Remote Identity

...

...

Parameter

 Description

 ipV6Addr <ipAddress> This parameter specifies that the local identity will be presented in IPv6 address hexadecimal/colon format, taking as its value the IP address of the 
Spacevars
0product
specified by the next argument (example: 1280:1276:3350:2224:2222:3333:8888:1245 or fd00:21:445:128::7880).
Note

The ipVxAddr attribute is not used at this time. If it is present, ignore it.

Peer - Remote Identity

The object specifies the remote Identity that 

Spacevars
0product
asserts to the PEER during phase 1 authentication.

Viewing and Editing Remote Identity

...

On the navigation pane, choose Address Context > IPsec > Peer > Remote Identity. The Remote Identity window is displayed.

Caption
0Figure
1Editing Remote Identity

Image Removed

...

In Address Context drop-down menu, choose the Remote Identity.

...

IN Peer drop-down menu, choose the Peer.

...

Image Added

Creating an IPsec - SPD

This object is an IPsec Security Policy Database (SPD) entry. The IPsec SPD is an ordered list of entries ("rules") that specify sets of packets and determine whether or not to permit, deny, or protect packets between the SBC and the peer that is referenced from the entry. If the packets are to be protected, this entry references information that specifies how to protect them. The

...

Caption
0Table
1Editing Remote Identity Parameters

Parameter

 Description

ipV4Addr <ipAddress>This parameter specifies that the remote identity will be presented in IPv4 address dotted decimal format, taking as its value the IP address of the SBC specified by the next argument (example: 128.127.50.224).
ipV6Addr <ipAddress>This parameter specifies that the remote identity will be presented in IPv6 address hexadecimal/colon format, taking as its value the IP address of the SBC specified by the next argument (example: 1280:1276:3350:2224:2222:3333:8888:1245 or fd00:21:445:128::7880).

IPsec - SPD

...

SPD establishes the phase 2 criteria for the negotiation between the SBC and the IKE peer. The successful completion of this negotiation results in a Security Association (SA).

Creating an SPD

...

In the SBC Configuration Manager window: 

  1. Click AllAddress Context > IPsec > SPD. The SPD window is displayed.

...

  1. Choose an address context to which you want to add the SPD from the Address Context list. The Create New SPD window opens.

    Caption
    0Figure
    1Creating New SPD

    Image Modified

  2. Use the following table to configure the SPD and click Save.

 

Caption
0Table
1Creating New SPD Parameters

Parameter

...

Length/Range

Description

Name

...

1-23

Specifies the name

...

Spacevars
0product

...

for the SPD entry. You can configure up to 4,096 SPD entries.

State

...

Administrative state

...

of the SPD entry.

...

Options are:

  • Disabled (default)
  • Enabled
Precedence

...

Evaluation order of this entry. Zero indicates wildcard.
Local

...

IP AddrSpecifies the local IPv4 or IPv6 address of the SPD traffic selector. Zero indicates wildcard.
Local IP Prefix Len

...

Specifies the local IP prefix length of the SPD traffic selector. Default value is 0.
Local Port

...

Specifies the local port of the SPD traffic selector. Zero indicates wildcard. Default value is 0.
Remote

...

IP Addr

...

Specifies the remote IPv4 or IPv6 address of the SPD traffic selector. Zero indicates wildcard.
Remote

...

IP Prefix Len

...

Specifies the remote IP prefix length of the SPD traffic selector. Zero indicates wildcard. Default value is 0.
Remote Port

...

Specifies the remote port of the SPD traffic selector. Zero indicates wildcard. Default value is 0.
Protocol

...

Specifies the IP protocol number of the SPD traffic selector. This parameter uses IANA protocol number assignment, that is, protocol number 6 represents TCP, protocol number 17 represents UDP. Zero indicates wildcard. Default value is 0.

Action

...

Action applied when packets processed by

...

IPsec are found matching the selectors of this SPD rule.

Discard – Specifies that the packets are dropped.

Bypass – Specifies that the packets are bypassed as clear text.

Protect – Specifies that the packets are protected by

...

IPsec based on the protection parameters specified in the configured

...

IPsec protection profile.

Mode

...

IPsec mode:

  • Tunnel (default) – Use this mode to encrypt and authenticate the entire IP packet (both header and payload). This encrypted packet is encapsulated in a new packet containing a new IP header.
  • Transport - Use this mode to encrypt and authenticate the IP payload only.

...

Protection Profile

...

Specifies an encryption cipher, a maximum time period for maintaining a security association between these peers (the SA "lifetime"), and an

...

anti-replay policy.

Note: This option only appears when you specify Protect as the Action.

Peer

...

Specifies the the name of the Internet Key Exchange (IKE) peer database entry.

...

Local Ip Addr Var

...

N/A

...

Specifies the local IPv4 or IPv6 address of the SPD traffic selector.

Note: This option only appears when you specify Protect as the Action.

Saving and Activating the Configuration in the Cluster

Once you have completed making configuration changes, click Apply Saved Changes and Close at the top-right of the SBC Configuration Manager window. When prompted, confirm that you want to save and activate your configuration changes. The SBC Configuration Manager window closes. The OAM node notifies the SBC nodes in the cluster of the configuration changes and stores a record of the updated configuration back to the EMS. 

Viewing an SPD

  1. On the SBC Configuration Manager page, click All.
  2. On the navigation pane, choose Address Context > IPsec > SPD. The SPD window is displayed.

    Caption
    0Figure
    1Viewing an SPD

    Image Removed

  3. In Address Context drop-down menu, choose the appropriate address context to view the SPD.

Editing an SPD

  1. Click the radio button adjacent to SPD name.

    Caption
    0Figure
    1Editing an SPD

    Image Removed

    The Edit Selected SPD window is displayed.

  2. Modify the relevant parameters, and click Save.

    Caption
    0Figure
    1Editing Selected SPD Parameters

    Image Removed

Copying an SPD

Click the radio button adjacent to SPD name. Click Copy SDP.

Caption
0Figure
1Copying an SPD

 Image Removed

...

Type the relevant parameters, and click Save.

Caption
0Figure
1Copying Selected SPD Parameters

Image Removed

Deleting an SPD

...

Click the radio button adjacent to the SPD. Click Delete.

Caption
0Figure
1Deleting an SPD

Image Removed

A delete confirmation message appears. Click Yes.

...

0Figure
1Deleting SPD Prompt

...

Pagebreak