In this section:
The Ribbon Lawful Intercept (LI) solution
This section describes how to configure the IPsec support.
Select Network > Cluster Management.
Click Manage VNFs. The Cluster Management / Manage VNFs window lists the SBC clusters created on the EMS.
Click the Configurations tab.
Click Edit Configuration. The SBC Configuration Manager opens in a separate window against the cluster's active OAM node. Refer to the EMA User Guide for information on using the GUI to configure the SBC.
This section outlines how to create an Internet Key Exchange (IKE) protection profile and then configure the algorithms of that protection profile.
Use the following procedure to create an IKE protection profile.
Click IKE Protection Profile.
Click New IKE Protection Profile. The SBC Configuration Manager displays the Create New IKE Protection Profile panel.
Use the following table to configure the Create New IKE Protection Profile panel. For descriptions of the parameters in this table, refer to Security Profiles - Ike Protection Profile.
See the following screen capture for an example configuration.
Use the following procedure to configure the algorithms for the IKE protection profile.
Select Security Profiles from the Category drop-down menu.
Click IKE Protection Profile.
Click Algorithms.
Select the name of your IKE protection profile from the IKE Protection Profile drop-down menu.
Use the following table to configure the Edit Algorithms panel. For descriptions of the parameters in this table, refer to Ike Protection Profile - Algorithm.
See the following screen capture for an example configuration.
The IPsec peer creates an entry in the IKE Peer Database (IPD). The IPD is a list of remote devices that may become IPsec peers. The IPD establishes the authentication and other phase one criteria for the peer-to-peer negotiation to eventually reach an IKE Security Association (SA) between this specific peer and the SBC.
Use the following procedure to create an IPsec peer.
In the SBC Configuration Manager window, select All > Address Context > IPsec.
From the Address Context drop-down menu, select the address context where you want to add the peer.
Click New Peer. The SBC Configuration Manager displays the Create New Peer panel.
Use the following table to configure the Create New Peer panel. For descriptions of the parameters in this table, refer to Ipsec - Peer.
See the following screen capture for an example configuration.
This section outlines how to configure the IKE peer remote identity that the SBC negotiates with during phase one negotiation.
Use the following procedure to configure the peer remote identity.
In the SBC Configuration Manager window, select All > Address Context > IPsec > Peer.
Select the peer you want to configure from the Peer drop-down menu. The SBC Configuration Manager displays the Edit Remote Identity panel.
For descriptions of the parameters in the Edit Remote Identity panel, refer to Peer - Remote Identity.
Select IP v4Addr from the Type drop-down menu. See the following screen capture for an example configuration.
Click Save.
The IPsec Security Policy Database (SPD) is an ordered list of entries (rules) that specify sets of packets and determine whether or not to permit, deny, or protect packets between the SBC and the peer that is referenced from the entry. If the packets require protection, this entry references information that specifies how to protect the packets. The SPD establishes the phase two criteria for the negotiation between the SBC and the IKE peer. The successful completion of this negotiation results in a Security Association (SA).
Use the following procedure to create an IPsec SPD.
In the SBC Configuration Manager window, select All > Address Context > IPsec.
Click SPD.
From the Address Context drop-down menu, select the address context where you want to add the SPD.
Click New SPD. The SBC Configuration Manager displays the Create New SPD panel.
Use the following table to configure the SPD. For descriptions of the parameters in this table, refer to Ipsec - Spd.
See the following screen capture for an example configuration.