The IPsec port is referred by the "IPsec" abbreviation and it has all the parameters described in this chapter.
Here is an example of the IPsec port parameters.
[18:18:41] ABILIS_CPX: D P PO:IPsec PO:920 - Not Saved (SAVE CONF), Not Refreshed (INIT) -------------------------- IPSEC ------------------------------------------------------------------------ LOG:DS ACT:YES MODE:IKE mxps:2048 IN-CHK:YES TTL:0 ECN:FORBIDDEN DF:CLEAR
To activate changes made on the parameters displayed by low case characters, it is needed to restart the system; on the contrary
for activating changes made on upper case parameters it is enough to execute the initialization command INIT PO:.
The changes made on the LOG: parameter are immediately active.
The "Not Saved (SAVE CONF)" message is displayed every time the port configuration is modified but not saved with the SAVE CONF command.
The "Not Refreshed (INIT)" message is displayed every time the port configuration is modified but not refreshed with the INIT PO: command.
LOG: | Events logging activation and generation of alarm signals |
DS | NO, D, S, A, L, T, ALL, +E |
Usually this parameter makes possible to activate/deactivate logging functionalities of meaningful events of the port as well as the detection and signalling of alarms in case of critical events.
The following table shows the available options and the related functionalities usable by the parameter:
Option | Meaning |
---|---|
D | Recording of the driver state changes and/or the meaningful events in Debug Log |
S | Recording of the driver state changes and/or the meaningful events in the System Log |
A | Periodic detection of possible alarms. The detected alarms can be displayed the command ALARM VIEW or by the analogous command available on the UTILITY of the LCD display on the front panel |
L | On alarm detection, acoustic signal generation plus a message on the LCD display. This function depends on activation of alarms detection by the "A" option |
T | Generation by the Agent SNMP of Abilis CPX of SNMP traps corresponding to any change of the driver state and/or occurring of meaningful events |
Beside the already described options the following values are also allowed:
Option | Meaning |
---|---|
NO | It means that all the logging functionalities, alarms detection and generation, above mentioned, are disabled. |
ALL | It means that all the logging functionalities, alarms detection and generation, above mentioned, are enabled. |
+E | This option added to one or more of the previous ones, extends its (their) set of meaningful events. The value "ALL+E" activates all the options and extends the set of meaningful events. The value "NO+E" is meaningless so it is ignored. |
Options can be combined together.
Some examples:
By using the characters "+" and "-" as prefix of one or more options is possible to add or delete one or more functionalities without setting from the scratch the value of the parameters.
Some examples:
The changes made on this parameter are immediately activated, without the need of initialization commands.
ACT: | Runtime activation/deactivation of IPsec |
NO | NO, YES |
This parameter allows to run-time activate/deactive IPsec functionalities.
When it is set to "YES", the port is configured, active, and the IPsec driver performs its activities.
When it is set to "NO", the port is configured, active, but the IPsec driver does not execute any action.
MODE: | Working mode of IPsec |
MANUAL | MANUAL, IKE |
It specifies working mode of IPsec port.
When it is set to "MANUAL", the IPsec port is in manual mode and manipulates manually-keyed IPsec connections.
When it is set to "IKE", the IPsec port is in automatic IKE mode and manipulates automatically-keyed IPsec connections.
For IKE mode IKE driver must be configured and activated.
mxps: | Maximum length of IP datagram which can be processed by IPsec |
2048 | 2048-4096 |
It specifies maximum length of IP datagram which can be processed by IPsec driver port.
This value cannot be changed without CPX restart.
IN-CHK: | Runtime activation/deactivation of IPsec inbound policy check |
YES | NO, YES |
Specifies inbound policy check flag of IPsec port.
When it is set to "YES", inbound policy check is ON.
When it is set to "NO", inbound policy check is OFF.
TTL: | IPsec IP Time-To-Live option |
0 | 0, 1-255 |
Specifies the Time-To-Live field for the outer IP header in IPsec TUNNEL mode.
If value is not specified (equal to 0), TTL field will be copied from the inner IP header to the outer (tunnel) one.
If value is specified, TTL field of the outer IP header will be set to the specified value from the config.
ECN: | IPsec ECN consideration mode |
FORBIDDEN | ALLOWED, FORBIDDEN, NOCARE |
Specifies ECN consideration mode on IPsec tunnels in TUNNEL mode.
ALLOWED: draft-ietf-ipsec-ecn-02.txt - ECN-friendly IPSEC tunnel.
FORBIDDEN: draft-ietf-ipsec-ecn-02.txt - ECN-friendly IPSEC tunnel.
NOCARE: RFC2401 - normal IPsec tunnel. No consideration for ECN.
General strategy for configuration is as follows:
DF: | IPsec DF (Don't Fragment) bit manipulation mode |
CLEAR | CLEAR, SET, COPY |
Specifies DF (Don't Fragment) bit manipulation in IPsec TUNNEL mode during encapsulation.
CLEAR: Clear DF bit on outer IP header.
SET: Set DF bit on outer IP header.
COPY: Copy DF bit from inner to outer IP header.
Example on how to show state and diagnostics of the IPsec through the command D S:
[15:00:45] ABILIS_CPX:D S PO:IPsec PO:920 ------------------------------------------------------------------------ IPSEC STATE:ACTIVE MODE:IKE IN-CHK:YES POLICY-IN :1 SA-IN :1 SA-BND-IN :1 POLICY-OUT:1 SA-OUT:1 SA-BND-OUT:1 - Security Associations diagnostics: ----------------------------------- SA Bundle State SPI SrcIp Auth SoftTime Prot Tunnel DstIp Cipher HardTime ------------------------------------------------------------------------ 0 0 MATURE C4DCB36E 192.168.006.002 MD5 INFINITE ESP YES 192.168.006.001 3DES INFINITE ------------------------------------------------------------------------ 1 1 MATURE 1969FC22 192.168.006.001 MD5 INFINITE ESP YES 192.168.006.002 3DES INFINITE ------------------------------------------------------------------------
STATE: | Current state of the IPsec port. |
INACTIVE, ACTIVE |
It shows the current state of the IPsec port driver.
Driver | States | Description | Values shown in: | ||
---|---|---|---|---|---|
System Log | Events Log | Display LCD | |||
IPsec | INACTIVE | IPsec port is running, but the ACT: parameter is set to "NO". | dn | ||
ACTIVE | IPsec port is fully ready to work. | RD |
MODE: | Working mode of the IPsec port. |
MANUAL, IKE |
It shows the current working mode of the IPsec port driver.
MANUAL: The IPsec port is in manual mode.
IKE: The IPsec port is in IKE mode. It is controlled by IKE driver.
IN-CHK: | IPsec port inbound policy check flag. |
NO, YES |
It shows state of the IPsec port inbound policy check flag.
POLICY-IN: | Number of inbound security policies. |
0-63 |
It shows number of installed inbound (IN) security policies in the policy table.
POLICY-OUT: | Number of outbound security policies. |
0-63 |
It shows number of installed outbound (OUT) security policies in the policy table.
SA-IN: | Number of inbound Security Associations. |
0-127 |
It shows number of installed inbound (IN) Security Associations in the SA table.
SA-OUT: | Number of outbound Security Associations. |
0-127 |
It shows number of installed outbound (OUT) Security Associations in the SA table.
SA-BND-IN: | Number of inbound Security Association bundles. |
0-127 |
It shows number of installed inbound (IN) Security Association bundles in the SA table.
SA-BND-OUT: | Number of outbound Security Association bundles. |
0-127 |
It shows number of installed outbound (OUT) Security Association bundles in the SA table.
SA: | Identifier of Security Association record. |
0-127 |
It shows identifier of Security Association record Security Association bundles in the SA table.
Bundle: | Number of bundle of Security Association record. |
0-127 |
It shows number of bundle of Security Association record.
State: | State of Security Association record. |
LARVAL, MATURE, DYING, DEAD |
It shows state of Security Association record.
LARVAL: Security Association is one that was created by IKE, but is not working yet.
Displayed in IKE mode only.
MATURE: Security Association is in working mode. In MANUAL mode
Security Association always is in this state.
DYING: Security Association is one whose soft lifetime has expired. Displayed in
IKE mode only.
DEAD: Security Association is one whose hard lifetime has expired, but hasn't been reaped
by system garbage collection. Incoming and outgoing IP packets will be dropped.
Displayed in IKE mode only.
SPI: | Security Parameter Index (SPI) of Security Association. |
0x100-0xFFFFFFFF |
It shows Security Parameter Index (SPI) of Security Association.
In IKE mode this value is assigned by IKE driver.
Prot: | IPsec protocol of Security Association. |
AH, ESP |
It shows IPsec protocol of Security Association.
In IKE mode this value is assigned by IKE driver.
Tunnel: | Tunnel mode flag of Security Association. |
NO, YES |
It shows tunnel mode flag of Security Association.
NO: Security Association in transport mode.
YES: Security Association in tunnel mode.
In IKE mode this value is assigned by IKE driver.
SrcIp: | Source IP address of the Security Association. |
0.0.0.0, 1-126.x.x.x, 128-223.x.x.x |
It shows source IP address of the Security Association.
In IKE mode this value is assigned by IKE driver.
DstIp: | Destination IP address of the Security Association. |
0.0.0.0, 1-126.x.x.x, 128-223.x.x.x |
It shows destination IP address of the Security Association.
In IKE mode this value is assigned by IKE driver.
Auth: | Authentication method for the AH or ESP protocols. |
MD5, SHA |
It shows authentication method for the AH or ESP protocols for the Security Association.
In IKE mode this value is assigned by IKE driver.
Cipher: | Encryption algorithm for the ESP protocol. |
DES, 3DES, IDEA, CAST, BLOWFISH |
It shows encryption algorithm for ESP protocol for the Security Association.
In IKE mode this value is assigned by IKE driver.
Example on how to show state and diagnostics of the IPsec port through the command D SE:
[15:00:45] ABILIS_CPX:D SE PO:IPsec PO:920 ------------------------------------------------------------------------ IPSEC --- Cleared 000:00:09:29 ago, on 22/03/2005 at 22:53:43 ---------------- -----------|---INPUT---|--OUTPUT---|-----------|---INPUT---|--OUTPUT---| FRM | 100| 694|CHR | 23508| 41366| FRM-OK | 65| 75|CHR-OK | 7304| 4285| FRM-DROP | 4| 0|CHR-DROP | 116| 0| FRM-BYPASS | 31| 619|CHR-BYPASS | 16088| 37081| FRM-FRAG | 0| |CHR-FRAG | 0| | FRM-REASS | 0| |CHR-REASS | 0| | ------------------------------------------------------------------------ FRM-IKE | 31| 31|NATT-KA | 4| 6| NO-POLICY | 0| 598|LONG | 0| 0| BAD-SA | 0| 0|NO-SA | 0| 0| BAD-FMT | 0| 0|AUTH-FAIL | 0| | BAD-CBLK | 0| |BAD-CHK | 0| | REP-CHK | 0| 0|BAD-ECN | 0| | ------------------------------------------------------------------------ - Security Associations statistics: ------------------------------------ SA:0 CHR:6264 AUTH-FAIL:0 BAD-CBLK:0 FRM:65 REPLAY-CHK:0 BAD-ECN:0 ------------------------------------------------------------------------ SA:1 CHR:8424 AUTH-FAIL:0 BAD-CBLK:0 FRM:75 REPLAY-CHK:0 BAD-ECN:0 ------------------------------------------------------------------------
The information "Cleared DDD:HH:MM:SS ago, at DD/MM/YYYY HH:MM:SS", referred by the extended statistics, shows the elapsed time from the last reset of the statistics (by the format "days:hours:minutes:seconds") and date/time of its execution (by the format "day/month/year" and "hours:minutes:seconds").
FRM: | Total number of IP frames received/sent by IPsec port from/to IP |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port receives a IP frame from IP.
The OUTPUT counter is incremented every time IPsec port sends a IP frame to IP
CHR: | Total number of characters received/sent by IPsec port from/to IP |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port receives a IP frame from IP.
The OUTPUT counter is incremented every time IPsec port sends a IP frame to IP.
FRM-OK: | Total number of successful processed incoming/outgoing IP frames |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port successful processes an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port successful processes an outgoing IP frame.
CHR-OK: | Total number of successful processed incoming/outgoing characters |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port successful processes an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port successful processes an outgoing IP frame.
FRM-OK: | Total number of successful processed incoming/outgoing IP frames |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port successful processes an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port successful processes an outgoing IP frame.
CHR-OK: | Total number of successful processed incoming/outgoing characters |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port successful processes an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port successful processes an outgoing IP frame.
FRM-DROP: | Total number of dropped incoming/outgoing IP frames |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame.
CHR-DROP: | Total number of dropped incoming/outgoing characters |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame.
FRM-BYPASS: | Total number of bypassed incoming/outgoing IP frames |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port bypasses an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port bypasses an outgoing IP frame.
CHR-BYPASS: | Total number of bypassed incoming/outgoing characters by IPsec port |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port bypasses an incoming IP frame.
The OUTPUT counter is incremented every time IPsec port bypasses an outgoing IP frame.
FRM-FRAG: | Total number of fragmented incoming IP frames |
0-4.294.967.295 |
The counter is incremented every time IPsec port receives a fragmented incoming IP frame.
CHR-FRAG: | Total number of characters from a fragmented incoming IP frames |
0-4.294.967.295 |
The counter is incremented every time IPsec port receives a fragmented incoming IP frame.
FRM-REASS: | Total number of reassembling incoming IP frames |
0-4.294.967.295 |
The counter is incremented every time IPsec port receives an incoming IP frame, which is reassembling.
CHR-REASS: | Total number of characters from a reassembling incoming IP frames |
0-4.294.967.295 |
The counter is incremented every time IPsec port receives an incoming IP frame, which is reassembling.
FRM-IKE: | Total number of bypassed incoming/outgoing IKE packets |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port bypasses an incoming IKE packet.
The OUTPUT counter is incremented every time IPsec port bypasses an outgoing IKE packet.
NATT-KA: | Total number of dropped incoming/outgoing NAT-traversal keep-alive packets |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming NAT-traversal keep-alive packet.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing NAT-traversal keep-alive packets.
NO-POLICY: | Total number of dropped incoming/outgoing IP frames, for which IPsec policy is not found |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame, for which inbound IPsec policy is not found.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame, for which outbound IPsec policy is not found.
Note: Now such frames are bypassed.
LONG: | Total number of dropped too long incoming/outgoing IP frames |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes a too long incoming IP frame.
The OUTPUT counter is incremented every time IPsec port droppes a too long outgoing IP frame.
BAD-SA: | Total number of dropped incoming/outgoing IP frames, for which corresponding SA is not in working state |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame, for which corresponding inbound SA is not in working (MATURE) state.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame, for which corresponding outbound SA is not in working (MATURE) state.
NO-SA: | Total number of dropped incoming/outgoing IP frames, for which corresponding SA is not found |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame, for which corresponding inbound SA is not found.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame, for which corresponding outbound SA is not found.
BAD-FMT: | Total number of dropped incoming/outgoing IP frames with bad format |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame with bad format.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame with bad format.
AUTH-FAIL: | Total number of dropped incoming IP frames with authentication errors |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes an incoming IP frame with authentication errors.
BAD-CBLK: | Total number of dropped encrypted incoming IP frames with bad cipher block |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes encrypted incoming IP frame with bad cipher block.
BAD-CHK: | Total number of dropped an incoming IP frames with inbound policy check error |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes an incoming IP frame with inbound policy check error.
REP-CHK: | Total number of dropped an incoming/outgoing IP frames with sequence number errors |
0-4.294.967.295 |
The INPUT counter is incremented every time IPsec port droppes an incoming IP frame with sequence number errors.
The OUTPUT counter is incremented every time IPsec port droppes an outgoing IP frame with sequence number errors.
BAD-ECN: | Total number of dropped an incoming IP frames with ECN handling errors |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes an incoming IP frame with ECN handling error.
SA: | Identifier of Security Association record. |
0-127 |
It shows identifier of Security Association record Security Association bundles in the SA table.
CHR: | Total number of incoming/outgoung characters processed by Security Association |
0-4.294.967.295 |
The counter is incremented every time Security Association (IN/OUT) processes incoming/outgoung IP frame with corresponding IPsec protocol (AN or ESP).
FRM: | Total number of incoming/outgoung IP frames processed by Security Association |
0-4.294.967.295 |
The counter is incremented every time Security Association (IN/OUT) processes incoming/outgoung IP frame with corresponding IPsec protocol (AN or ESP).
AUTH-FAIL: | Total number of dropped incoming IP frames with authentication errors |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes an incoming IP frame with authentication errors.
BAD-CBLK: | Total number of dropped encrypted incoming IP frames with bad cipher block |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes encrypted incoming IP frame with bad cipher block.
REPLAY-CHK: | Total number of dropped an incoming/outgoing IP frames with sequence number errors |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes an incoming/outgoing IP frame with sequence number errors.
BAD-ECN: | Total number of dropped an incoming IP frames with ECN handling errors |
0-4.294.967.295 |
The counter is incremented every time IPsec port droppes an incoming IP frame with ECN handling error.