The IPsec component provides the capability of establishing an end-to-end channel between two hosts. IPv6 supports only transport mode IPsec connections. Secure connections have the following properties:
Authentication: The IPv6 extension header type 51 (AH - Authentication Header) provides authenticity and integrity to IP datagrams exchanged among communication end points.
Encryption: The IPv6 extension header type 52 (ESP - Encapsulating Security Payload) provides confidentiality and integrity to IP datagrams exchanged among communication end points.
In short, AH adds authentication, and ESP adds encryption to ensure that the communication is with the right peer and that it is secure. In a NovellĀ® IPv6 stack, you can configure AH alone or AH and ESP together. ESP provides both Authentication and Encryption features.
The following configurations are possible while providing secure end-to-end connections:
Authentication
Encryption and authentication through ESP
Authentication through ESP
Table 4-1 Configurable Parameters for AH and ESP
Table 4-2 Parameter Settings for IPsec
Configuration Setting |
Property |
Description and Usage |
---|---|---|
Set enable IPsec6 for IPv6 |
=on |
Switch to enable IPsec6. |
Set enable IPsec6 logging |
=on |
Switch to enable logging. |
Configure the secure connection by modifying the ipseckey.cfg file. For the configuration to take effect this file should be manually copied to the sys:\system folder.
The configuration settings of the file must be in following manner:
AH in SPI Source address Destination address Authentication type key
A typical end-to-end inbound AH configuration might look as follows:
AH in 0x10001 3ffe::1 3ffe::2 hmac96-sha 414141414141414141414141414141414141414141414141AH out 0x20002 3ffa::2 3ffa::1 hmac96sha 414141414141414141414141414141414141414141414141
This specifies that all incoming traffic coming on 3ffe::1 from destination 3ffe::2 needs to be authenticated using hmac96-sha with secret 4141---41(64byte). The SPI id is 0x10001.The outgoing traffic on 3ffa::1 to destination 3ffa::2 needs to contain AH using hmac96-sha using secret 4141---41(64byte). The SPI id is 0x20001.
The SPI value of the outgoing connection must be the SPI value of the incoming connection and vice versa.
Configure ipseckey.cfg at the other end as follows:
AH in 0x20002 3ffa::2 3ffa::1 hmac96-sha 414141414141414141414141414141414141414141414141AH out 0x10001 3ffa::1 3ffa::2 hmac96sha 414141414141414141414141414141414141414141414141
NOTE:The SPI value of the outgoing connection must be the SPI value of the incoming connection and vice versa.
Load IPv6 at both ends.
To enable IPsec, set
to On.To track statistics and get help with troubleshooting, set Enable IPsec6 logging to On.
Any packets going from 3ffa::1 to 3ffa::2 are authenticated by using hmac96-sha with secret configured in the file.
Configure the secure connection by modifying the ipseckey.cfg file. For the configuration to take effect this file should be manually copied to the sys:\system folder.
The configuration settings of the file must be in following manner:
AH in SPI Source address Destination address Authentication type key
A typical end-to-end inbound AH configuration might look as follows:
ESP in 0x10001 3ffe::1 3ffe::2 v2-3des-cbc 41414141414141414111111hmac96-md5 414141414141ESP out 0x20001 3ffa::2 3ffa::1 v2-3des-cbc 41414141414141414141441hmac96-md5 414141414141
This indicates incoming traffic on 3ffe::1 from destination 3ffe::2 needs to be authenticated using hmac96-md5 using secret 4141---41(64byte) and decrypted using 3DES using 4141414(48byte). The SPI id is 0x10001.
The outgoing traffic on 3ffa::1 to destination 3ffa::2 must contain AH using hmac96-md5 using secret 4141---41(64byte) and encrypted using 3DES. The SPI id is 0x20001.
NOTE:The SPI value of the outgoing connection must be the SPI value of the incoming connection and vice versa.
Configure ipseckey.cfg at the other end as follows:
ESP in 0x20001 3ffa::2 3ffa::1 v2-3des-cbc 41414141414141414111111hmac96-md5 414141414141ESP out 0x10001 3ffa::1 3ffa::2 v2-3des-cbc 41414141414141414141441hmac96-md5 414141414141
NOTE:The SPI value of the outgoing connection must be the SPI value of the incoming connection and vice versa.
Load IPv6 at both the ends.
To enable IPsec, set Enable IPsec6 for IPv6 to On.
To track statistics and get help with troubleshooting, set Enable IPsec6 logging to On
IPsec logging can be enabled for the following purposes:
Connections made and broken.
Reasons for authentication and encryption failures and the possible reasons are replay attacks and invalid SA because of invalid SP1 configurations.:
Any packets going from 3ffa:2 are authenticated and encrypted by using hmac96-md5 and 3DES-CBC with secret or key configured in the file.