Fabric OS Administrator’s Guide 173
53-1001763-02
Management interface security 7
-t SELECTOR-IN -d in -l 10.33.69.132 -r 10.33.74.13 \
-transform TRANSFORM01
10. Verify the IPsec SAs created with IKE using the ipsecConfig --show manual-sa –a command.
11. Perform the equivalent steps on the remote peer to complete the IPsec configuration. Refer to
your server administration guide for instructions.
12. Generate IP traffic and verify that it is protected using defined policies.
a. Initiate Telnet or SSH or ping session from BRCD300 to Remote Host.
b. Verify that the IP traffic is encapsulated.
c. Monitor IPsec SAs created using IKE for the above traffic flow.
Use the ipSecConfig -–show manual-sa –a command with the operands specified to
display the outbound and inbound SAs in the kernel SADB.
Use the ipSecConfig –-show policy ips sa -a command with the specified operands to
display all IPsec SA policies.
Use the ipSecConfig –-show policy ips sa-proposal –a command with the specified
operands to display IPsec proposals.
Use the ipSecConfig –-show policy ips transform –a command with the specified
operands to display IPsec transforms.
Use the ipSecConfig –-show policy ips selector –a command with the specified
operands to display IPsec traffic selectors.
Use the ipSecConfig –-show policy ike –a command with the specified operands to
display IKE policies.
Use the ipSecConfig –-flush manual-sa command with the specified operands to flush
the created SAs in the kernel SADB.
CAUTION
Flushing SAs requires IPsec to be disabled and re-enabled. This operation is disruptive to traffic
on the tunnel.