You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

In this section:

 

Use this object to configure IPsec Security Policy Database (SPD) for the

Unable to show "metadata-from": No such page "_space_variables"
. If action parameter is set to "protect", the SPD establishes the phase 2 criteria for the negotiation between SBC and the IKE peer. The successful completion of this negotiation results in a Security Association (SA).

Command Syntax

% set addressContext <addressContext name> ipsec spd <spd_name> 
	action <bypass | discard | protect> 
	localIpAddr <ipAddress> 
	localIpPrefixLen <unsignedInt 0-128> 
	localPort <0 to 65535>
	mode <transport | tunnel>
	precedence <unsignedShort> 
	protocol <0 to 255> 
	remoteIpAddr <ipAddress> 
	remoteIpPrefixLen <unsignedInt 0-128> 
	remotePort <0 to 65535> 
	state <disabled | enabled>

Command Parameters

IPsec SPD Parameters

 

Parameter

Length/Range

Description

spd

1-23

Specifies the name of an IPsec Security Policy Database (SPD) entry. The IPsec SPD is an ordered list of entries ("rules") that specify sets of packets and determine whether or not to permit, deny, or protect packets between the 

Unable to show "metadata-from": No such page "_space_variables"
and the peer that is referenced from the entry. If the packets are to be protected, this entry references information that specifies how to protect them.

You can configure up to 4,096 SPD entries.

action

N/A

Action applied when packets processed by IPsec found matching the selectors of this SPD rule.

  • Discard – Specifies that the packets are dropped.
  • Bypass – Specifies that the packets are bypassed as clear text.
  • Protect – Specifies that the packets are protected by IPsec based on the protection parameters specified in the configured IPsec protection profile.

localIpAddr

N/A

Specifies the local IPv4 or IPv6 address of the SPD traffic selector.

localIpPrefixLen

0-128

Specifies the local IP prefix length of the SPD traffic selector. Default value is 0.

Note

If IPsec Peer protocol is set to “IKEv2” or “ANY”, localIpPrefixLen must be set to "32" for IPv4 and "128" for IPv6 because the SBC does not support range-based parameters for IKEv2 selectors.

localPort

0-65535

Specifies the local port of the SPD traffic selector. Zero indicates wildcard. Default value is 0.

modeN/A

Set the SPD mode type.

  • transport – Use this mode to encrypt and authenticate the IP payload only. 
  • tunnel (default) – Use this mode to encrypt and authenticate the entire IP packet (both header and payload). This encrypted packet is encapsulated in a new packet containing a new IP header.

precedence

0-65535

Evaluation order of this entry. Zero indicates wildcard.

protocol

0-255

Specifies the IP protocol number of the SPD traffic selector. This parameter uses IANA protocol number assignment, that is, protocol number 6 represents TCP, protocol number 17 represents UDP. Zero indicates wildcard. Default value is 0.

remoteIpAddr

N/A

Specifies the remote IPv4 or IPv6 address of the SPD traffic selector. Zero indicates wildcard.

remoteIpPrefixLen

0-128

Specifies the remote IP prefix length of the peer's SPD traffic selector. Zero indicates wildcard. Default value is 0.

Note
If IPsec Peer protocol is set to “IKEv2” or “ANY”, remoteIpPrefixLen must be set to "32" for IPv4 and "128" for IPv6 because the SBC does not support range-based parameters for IKEv2 selectors.

remotePort

0-65535

Specifies the remote port of the SPD traffic selector. Zero indicates wildcard. Default value is 0.

state

N/A

Administrative state of this SPD entry.

  • disabled (default)
  • enabled

Command Examples

% set addressContext default ipsec spd SPD3 localIpAddr 10.16.230.2 localIpPrefixLen 32 remoteIpAddr 10.16.220.2 remoteIpPrefixLen 32 action protect protocol 17 state enabled precedence 102

% show addressContext default ipsec 
spd SPD3 {
 state enabled;
 precedence 102;
 localIpAddr 10.16.230.2;
 localIpPrefixLen 32;
 remoteIpAddr 10.16.220.2;
 remoteIpPrefixLen 32;
 protocol 17;
 action protect;
}
  • No labels