
304111-A Rev 00
3-1
Chapter 3
Configuring IPsec
Before you configure IPsec, you need to:
• Install IP Security (IPsec) software (see “Installing IP Security (IPsec)
Software” on page 2-11).
• Secure your site.
• Secure your configuration.
• Select an encryption strength.
• Use the Technician Interface secure shell to enter a node protection key
(NPK), and then enter the same NPK in Site Manager.
Site Security
To enforce IPsec, carefully restrict unauthorized access to the routers that encrypt
data and the workstations that you use to configure IPsec. Keep in mind that the
DES and MD5 encryption standards that IPsec uses are public. Your data is secure
only if you properly protect the encryption keys. The configuration files that
contain these keys include safeguards to prevent unauthorized access.
Configuration Security
Store any files containing encryption keys on diskettes (or other removable
media), and keep the media in a secure place. Physically protecting your
equipment is always a good strategy and the easiest way to prevent unauthorized
access to these files.
Comentários a estes Manuais