Allied Telesis X900-48FE, RAPIER I, AT-8900 manual Enhancements to IPsec/VPN, Software Version 169

Models: AT-9900 AT-8700XL AT-9800 AT-8600 RAPIER I AT-8800 AT-8900 X900-48FE

1 232
Download 232 pages 5.78 Kb
Page 169
Image 169

Software Version 2.8.1

169

Enhancements to IPsec/VPN

This Software Version includes enhancements in the following IPsec functions:

Responding to IPsec Packets from an Unknown Tunnel

Modifying the Message Retransmission Delay

Retrying ISAKMP Phase 1 and 2 Negotiations

VPN Tunnel Licencing

This section describes the enhancements. The modified commands to implement them are described in Command Reference Updates.

Responding to IPsec Packets from an

Unknown Tunnel

This Software Version allows the router or switch to send a notification message to a peer when IPsec traffic from the peer is not recognised. When the peer receives the message, it deletes the SAs it has for the router or switch. This provides a way to ensure that only valid IPsec tunnels exist between the router or switch and its peer.

To enable the router or switch to send this type of notification message to its peer, use the new respondbadspi parameter in the command:

create ipsec policy=name interface=interface action=ipsec keymanagement=isakmp peeraddress=ipv4add respondbadspi=true [other parameters]

This feature is only valid for connections where:

The peer IP address is a static IPv4 address.

IPsec tunnel mode is used. This is specified by setting the mode parameter to tunnel in the create ipsec saspecification command.

The ISAKMP policy for the peer has the mode parameter set to main, and the sendnotify parameter set to true.

The IPsec policy for the peer has the action parameter set to ipsec, the keymanagement parameter set to isakmp, and the peeraddress parameter set to a valid IPv4 address.

The router or switch recognises traffic for current IPsec tunnels by checking the Security Parameter Index (SPI) value of the IPsec packets. If the router or switch receives an IPsec packet with an unknown SPI value from a known peer, this indicates there is a discrepancy with the IPsec tunnel between the router or switch and its peer. When the respondbadspi parameter is configured to true, the router or switch can then send a message to the peer, notifying it to delete the SAs for the router or switch, which closes the tunnel.

Unknown SPI values can occur if the router or switch restarts while there is a current IPsec tunnel. Because the IPsec SAs are lost, the router or switch no longer recognises traffic sent through the IPsec tunnel. However, the peer will keep sending traffic via the tunnel unless it is notified that the SAs are invalid.

Software Version 2.8.1 C613-10477-00 REV B

Page 169
Image 169
Allied Telesis X900-48FE, RAPIER I, AT-8900 Enhancements to IPsec/VPN, Responding to IPsec Packets from an Unknown Tunnel