Cisco PIX 525 Spezifikationen Seite 402

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 604
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 401
23-14
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 23 Configuring IPSec and ISAKMP
Configuring IPSec
Determine whether or not to accept requests for IPSec security associations on behalf of the
requested data flows when processing IKE negotiation from the peer. (Negotiation is done only for
ipsec-isakmp crypto map entries.) For the peer’s request to be accepted during negotiation, the peer
should specify a data flow that is “permitted” by a crypto access list associated with an
ipsec-isakmp crypto map command entry.
If you want certain traffic to receive one combination of IPSec protection (for example, authentication
only) and other traffic to receive a different combination of IPSec protection (for example, both
authentication and encryption), you must create two different crypto access lists to define the two
different types of traffic. These different access lists are then used in different crypto map entries which
specify different IPSec policies.
Using the permit keyword causes all IP traffic that matches the specified conditions to be protected by
crypto, using the policy described by the corresponding crypto map entry. Using the deny keyword
prevents traffic from being protected by crypto IPSec in the context of that particular crypto map entry.
(In other words, it does not allow the policy as specified in this crypto map entry to apply to this traffic.)
If all the crypto map entries for that interface deny this traffic, it is not protected by crypto IPSec.
A crypto access list you define applies to an interface after you define the corresponding crypto map
entry and apply the crypto map set to the interface. You should use different access lists in different
entries of the same crypto map set. However, the security appliance evaluates both inbound and outbound
traffic against the same “outbound” IPSec access list.
Therefore, the access list criteria apply in the forward direction to traffic exiting your security appliance,
and the reverse direction to traffic entering your security appliance. In Figure 23-1, IPSec protection
applies to traffic between Host 10.0.0.1 and Host 10.2.2.2 as the data exits the outside interface on
security appliance A toward Host 10.2.2.2. For traffic from Host 10.0.0.1 to Host 10.2.2.2, the security
appliance evaluates A as follows:
source = host 10.0.0.1
dest = host 10.2.2.2
For traffic from Host 10.2.2.2 to Host 10.0.0.1, that same access list entry on security appliance A is
evaluated as follows:
source = host 10.2.2.2
dest = host 10.0.0.1
Figure 23-1 How Crypto Access Lists Apply to IPSec
IPSec peers
92616
Internet
outside outside
Security
Appliance
Firewall A
Security
Appliance
Firewall B
Host
10.0.0.1
Host
10.2.2.2
IPSec Access List at "outside" interface:
access-list 101 permit ip host 10.0.0.1 host 10.2.2.2
IPSec Access List at "outside" interface:
access-list 111 permit ip host 10.2.2.2 host 10.0.0.1
Traffic exchanged between hosts 10.0.0.1 and 10.2.2.2 is protected between
Security Appliance Firewall A "outside" and Security Appliance Firewall B "outside"
Seitenansicht 401
1 2 ... 397 398 399 400 401 402 403 404 405 406 407 ... 603 604

Kommentare zu diesen Handbüchern

Keine Kommentare