Configuring IKEv2 Policies, Dynamic Maps, and Reauthentication Frequency
To configure the EAP Extensible Authentication Protocol. An authentication protocol for wireless networks that extends the methods used by the PPP, a protocol often used when connecting a computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards, smart cards, certificates, one-time passwords, and public key encryption authentication. passthrough, IKEv2 Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate Security Associations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature for authentication. See RFC 4306. policies, and dynamic IPsec Internet Protocol security. IPsec is a protocol suite for secure IP communications that authenticates and encrypts each IP packet in a communication session. maps on the Branch Gateway, complete the following steps:
- In the Aruba Central app, complete either of the following steps:
-
To select a gateway group:
-
In the Aruba Central app, set the filter to a group that contains at least one Branch Gateway.
The dashboard context for a group is displayed.
-
Under
, click > .A list of gateways is displayed in the List view.
-
Click
.The configuration page is displayed for the selected group.
-
-
To select a gateway:
-
In the Aruba Central app, set the filter to Global or a group that contains at least one Branch Gateway.
-
Under
, click > .A list of gateways is displayed in the List view.
-
Click a gateway under
.The dashboard context for the gateway is displayed.
-
Under
, click .The gateway device configuration page is displayed.
-
- If you are in the , click to access the advanced configuration options.
- Click > .
- In the Table 1. table, click an existing policy to edit it, or click to open the section. Configure the required parameters as described in
- In Table 2.
Parameter
Description
Set the priority level for the IPsec map. Negotiation requests for security associations try to match the highest-priority map first. If that map does not match, the negotiation request continues down the list to the next highest-priority map until a match is found.
Enter a name for the dynamic map.
Select the check box to enable the dynamic map. This is enabled by default.
(Optional) Configure PFS Perfect Forward Secrecy. PFS refers to the condition in which a current session key or long-term private key does not compromise the past or subsequent keys. settings for the dynamic peer by assigning a Diffie-Hellman prime modulus group. PFS group provides an additional level of security by ensuring that the IPsec SA Security Association. SA is the establishment of shared security attributes between two network entities to support secure communication. key was not derived from any other key, and therefore, cannot be compromised if another key is broken. Select one of the following groups:
- Group 1: 768-bit Diffie–Hellman prime modulus group
- Group 2: 1024-bit Diffie–Hellman prime modulus group
- Group 14: 2048-bit Diffie–Hellman prime modulus group
- Group 19: 256-bit random Diffie–Hellman ECP modulus group
- Group 20: 384-bit random Diffie–Hellman ECP modulus group
Click
to open the section.1. To add an existing transform, select
2. Select a transform from the list and save the changes.
3. To add a new transform, select .
4. From the drop-down list, select one of the following encryption types:
- DES
- 3DES
- AES128
- AES192
- AES256
5. From the algorithm drop-down list, select one of the following hash types:
- MD5
- SHA
- SHA1-96
- SHA2-256-128
- SHA2-384-192
6. Click .
Set the lifetime of the security association for the dynamic peer in seconds. The supported range is 300-86400 seconds. The default value is 7200 seconds.
Set the lifetime of the security association for the dynamic peer in kilobytes.
, click an existing dynamic map to edit it or click to open the section. Configure the required parameters as described in - In
- EAP-TLS EAP–Transport Layer Security. EAP-TLS is a certificate-based authentication method supporting mutual authentication, integrity-protected ciphersuite negotiation and key exchange between two endpoints. See RFC 5216.
- EAP-PEAP EAP–Protected EAP. A widely used protocol for securely transporting authentication data across a network (tunneled).
- EAP-MSCHAPv2 EAP Microsoft Challenge Handshake Authentication Protocol Version 2.
, select the EAP passthrough for IKEv2 clients. The currently supported methods include: -
In the Reauthentication frequency field, enter the frequency value that indicates the number of IKE rekey operations at which the initiator of the session repeats authentication. You can enable reauthentication by configuring a frequency value between 1 and 100.
For example, if the configured reauthentication frequency is 1, the rekey operation is skipped and reauthentication occurs for each IKE rekey operation. If the reauthentication frequency is set to 3, the initiator triggers IKE rekey on the first and second rekey intervals, and reauthentication on the third rekey interval, and so on.
In AOS 10.5, the reauthentication feature is supported only with site-to-site deployments.
- Click Save Settings.
This animation will help you to add ports to configure the EAP passthrough, IKEv2 policies, and dynamic IPsec maps on the Branch Gateway.