Add the resource to the Abilis system with the following command:
[15:50:39] ABILIS_CPX:a res:ipsec
RES:IPSEC ALREADY EXISTSThe IPSEC resource may already exist in the system, but may not yet be active: set it active with the command:
[15:50:43] ABILIS_CPX:s act res:ipsec
COMMAND EXECUTED![]() | Caution |
|---|---|
After adding or setting the IPSEC active, you must restart the Abilis to make the resource running (use the command warm start to reboot the Abilis). |
[17:14:59] ABILIS_CPX:s p ipsec act:yesCOMMAND EXECUTED [17:15:17] ABILIS_CPX:d p ipsecRES:Ipsec - Not Saved (SAVE CONF), Not Refreshed (INIT) ---------------------- Run DESCR:IP_Security_Protocol LOG:DS ACT:YES MODE:IKE mxps:2048 IN-CHK:YES TTL:COPY ECN:NOCARE DF:CLEAR TCP-MSS-CLAMP:YES TCP-MSS-VALUE:1334
![]() | Warning |
|---|---|
To activate IPSEC resource 16 MB of free RAM are requested. Verify it with the command d i; for example: [17:39:21] ABILIS_CPX: |
Use the following command to display the parameters of the resource; the below command shows the meaning parameters.
[09:58:41] ABILIS_CPX:d p ipsecRES:IpSec --------------------------------------------------------------------- Run DESCR:IP_Security_Protocol LOG:DS ACT:YES MODE:IKE mxps:2048 IN-CHK:YES TTL:COPY ECN:FORBIDDEN DF:CLEAR TCP-MSS-CLAMP:YES TCP-MSS-VALUE:1334
Meaning of the most important parameters:
LOGLogging functionalities activation/deactivation.
ACTRuntime IPSEC activation/deactivation.
MODEWorking mode of IPSEC port [MANUAL;
IKE].
mxpsMaximum length of IP datagram which can be processed.
IN-CHKInbound policy check flag.
TTLSpecifies the Time-To-Live field for the outer IP header in
tunnel mode [COPY: TTL field will be copied
from the inner IP header to the tunnel one;
1..255].
ECNSpecifies ECN (Explicit Congestion Notification)
consideration mode on IPSEC tunnels in tunnel mode. ECN is an
experimental addition to the IP architecture that provides
notification of onset of congestion to delay- or loss-sensitive
applications [ALLOWED;
FORBIDDEN; NOCARE].
DFDF (Don't Fragment) bit manipulation in tunnel mode during
encapsulation [CLEAR: clear DF bit on outer IP
header; SET: set DF bit on outer IP header;
COPY: copy DF bit from inner to outer IP
header].
TCP-MSS-CLAMPActivates/deactivates the TCP MSS (Maximum Segment Size) Clamping procedure used to control the size of TCP segments.
TCP-MSS-VALUETCP MSS clamping value.
The command that allows the configuration of the resource to be modified has the following syntax:
s p ipsec par:val...
![]() | Caution |
|---|---|
To activate the changes made on the upper case parameters, execute the initialization command init res:ipsec; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required (i.e. With warm start command). |
A particular SA may protect IP datagrams using only one of security protocol between: AH or ESP.
The enhanced security policy may be implemented using multiple SAs.
The term “security association bundle” or “SA bundle” is applied to a sequence of SAs through which traffic must be processed to satisfy a security policy. The order of the sequence is defined by the policy.
This table is used only when mode parameter
is set to MANUAL.
The Security Associations table can store up to 256 entries, indexed starting from 0 up to 255.
Changes made in the table are activated by executing the command init res:ipsec.
Commands for the handling Security Associations table are:
d/a/c/s ipsec sa:"id-num" [par:val...]
The d ipsec sa ? command displays the meaning of parameters.
[11:46:52] ABILIS_CPX:d ipsec sa
-------------------------------------------------------------------------------
SA: NAME: SPI: SRC-IP: PROT: AUTH: CIPHER:
BUNDLE: TUNNEL: IPRES: SIDE: DST-IP: AUTHKEY: ENCKEY:
-------------------------------------------------------------------------------
*** NO IPSEC SECURITY ASSOCIATIONS DEFINED ***Meaning of the most important parameters:
SPISpecifies Security Parameter Index (SPI).
BUNDLENumber of SA bundle group.
SRC-IPSource IP address for the Security Association.
DST-IPDestination IP address for the Security Association.
PROTProtocol for this security association record
[AH, ESP].
AUTHauthentication method for the AH or ESP protocols
[NONE, MD5,
SHA].
AUTHKEYAuthentication key for the AH or ESP protocols (only for
AUTH not equal to NONE).
ASCII printable string. For MD5 authentication key: exactly 16
characters are required. For SHA authentication key: exactly 20
characters are required.
CIPHEREncryption algorithm for the ESP protocol
[NONE, DES,
3DES, IDEA,
CAST, BLOWFISH,
AES128, AES192,
AES256].
ENCKEYEncryption key for the ESP protocol (only for
PROT:ESP and
CIPHER not equal to NONE).
For DES encryption key: exactly 8 characters are required. For
IDEA, CAST,
BLOWFISH, AES128
encryption key: exactly 16 characters. For
3DES, AES192 encryption
key: exactly 24 characters are required. For
AES256 encryption key: exactly 32 characters
are required.
TUNNELTunnel mode flag.
IPRESTunnel IP resource.
SIDETunnel side [NONE, AUTO, INSIDE, OUTSIDE, VPN, DMZ].
This table is used only when mode parameter
is set to MANUAL.
The Policy table can store up to 256 entries, indexed starting from 0 up to 255.
Changes made in the table are activated by executing the command init res:ipsec.
Commands for the handling Policy table are:
d/a/c/s ipsec policy:"id-num" [par:val...]
By typing d ipsec policy ?, it's possible to display the meaning of the parameters.
[11:46:54] ABILIS_CPX:d ipsec policy
-------------------------------------------------------------------------------
POLICY: NAME: NET-SRC: PORT-SRC:
DIR: BUNDLE: RULE: NET-DST: PORT-DST:
-------------------------------------------------------------------------------
*** NO IPSEC SECURITY POLICIES DEFINED ***Meaning of the most important parameters:
DIRDirection for the policy record [OUT:
outbound direction (used as packet filter);
IN: inbound direction (used for inbound
policy check)].
BUNDLENumber of SA bundle group associated with this policy record.
RULERule for the policy record [BYPASS:
packet will be bypassed by IPSEC (outbound direction only);
DROP: packet will be dropped by IPSEC
(outbound direction only); IPSEC: packet will
be processed by IPSEC].
NET-SRCSource subnet address and mask in Slash Notation.
NET-DSTDestination subnet address and mask in Slash Notation.
PROT-SRCSource port of the upper protocol (TCP, UDP).
PROT-DSTDestination port of the upper protocol (TCP, UDP).