Enabling Acl Checking Of De-Encapsulated Ipsec Packets; Configuring The Ipsec Anti-Replay Function - HP 12500 Series Configuration Manual

Routing
Table of Contents

Advertisement

To set the IPsec session idle timeout:
Step
1.
Enter system view.
2.
Set the IPsec session idle
timeout.

Enabling ACL checking of de-encapsulated IPsec packets

In tunnel mode, the IP packet that was encapsulated in an inbound IPsec packet may not be an object
that is specified by an ACL to be protected. For example, a forged packet is not an object to be protected.
If you enable ACL checking of de-encapsulated IPsec packets, all packets failing the checking will be
discarded, improving the network security.
To enable ACL checking of de-encapsulated IPsec packets:
Step
1.
Enter system view.
2.
Enable ACL checking of
de-encapsulated IPsec
packets.

Configuring the IPsec anti-replay function

This function is available only for FIPS mode.
The IPsec anti-replay function protects networks against anti-replay attacks by using a sliding window
mechanism called anti-replay window. This function checks the sequence number of each received IPsec
packet against the current IPsec packet sequence number range of the sliding window. If the sequence
number is not in the current sequence number range, the packet is considered a replayed packet and is
discarded.
IPsec packet de-encapsulation involves complicated calculation. De-encapsulation of replayed packets
not only makes no sense, but also consumes large amounts of resources and degrades performance,
resulting in DoS. IPsec anti-replay checking, when enabled, is performed before the de-encapsulation
process, reducing resource waste.
In some cases, however, the sequence numbers of some normal service data packets may be out of the
current sequence number range, and the IPsec anti-replay function may drop them as well, affecting the
normal communications. If this happens, disable IPsec anti-replay checking or adjust the size of the
anti-replay window as required.
IPsec anti-replay checking does not affect manually created IPsec SAs. According to the IPsec protocol,
only IPsec SAs negotiated by IKE support anti-replay checking.
Command
system-view
ipsec session idle-time seconds
Command
system-view
ipsec decrypt check
179
Remark
N/A
Optional.
300 seconds by default.
This command is available only for
FIPS mode.
Remarks
N/A
Optional.
Enabled by default.
This command is available only for
FIPS mode.

Advertisement

Table of Contents
loading

Table of Contents