vi
Configuring FIPS······················································································································································ 191
Overview ······································································································································································· 191
Configuration restrictions and guidelines ·················································································································· 191
Configuring FIPS mode ················································································································································ 192
Entering FIPS mode ············································································································································· 192
Configuration changes in FIPS mode ················································································································ 193
FIPS self-tests ································································································································································· 194
Power-up self-tests ················································································································································ 194
Conditional self-tests ············································································································································ 194
Triggering self-tests ·············································································································································· 194
Displaying and maintaining FIPS ······························································································································· 195
FIPS configuration examples ······································································································································· 195
Entering FIPS mode through automatic reboot ································································································· 195
Entering FIPS mode through manual reboot ····································································································· 196
Configuring IPsec ···················································································································································· 198
Overview ······································································································································································· 198
Security protocols and encapsulation modes ··································································································· 198
Security association ············································································································································· 200
Authentication and encryption ··························································································································· 200
IPsec implementation ··········································································································································· 201
Protocols and standards ····································································································································· 202
FIPS compliance ··························································································································································· 202
IPsec tunnel establishment ··········································································································································· 202
Implementing ACL-based IPsec ··································································································································· 202
Feature restrictions and guidelines ···················································································································· 202
ACL-based IPsec configuration task list ············································································································· 202
Configuring an ACL ············································································································································ 203
Configuring an IPsec transform set ···················································································································· 204
Configuring a manual IPsec policy···················································································································· 206
Configuring an IKE-based IPsec policy ············································································································· 207
Applying an IPsec policy to an interface ·········································································································· 211
Enabling ACL checking for de-encapsulated packets ······················································································ 212
Configuring the IPsec anti-replay function ········································································································ 212
Binding a source interface to an IPsec policy ·································································································· 213
Enabling QoS pre-classify ·································································································································· 213
Enabling logging of IPsec packets ····················································································································· 214
Configuring the DF bit of IPsec packets ············································································································ 214
Displaying and maintaining IPsec ······························································································································ 215
IPsec configuration examples······································································································································ 216
Configuring a manual mode IPsec tunnel for IPv4 packets ············································································ 216
Configuring an IKE-based IPsec tunnel for IPv4 packets ················································································· 218
Configuring IKE ······················································································································································· 222
Overview ······································································································································································· 222
IKE negotiation process ······································································································································ 222
IKE security mechanism ······································································································································· 223
Protocols and standards ····································································································································· 224
FIPS compliance ··························································································································································· 224
IKE configuration prerequisites ··································································································································· 224
IKE configuration task list ············································································································································ 224
Configuring an IKE profile ·········································································································································· 225
Configuring an IKE proposal ······································································································································ 227
Configuring an IKE keychain ······································································································································ 228
Configuring the global identity information ·············································································································· 229