This section describes a security policy, attack methods, configuration and maintenance methods, as well as configuration and maintenance suggestions for an E-Trunk.
To improve system security, authentication can be configured for an E-Trunk. The E-Trunk transmit end uses the configured password to calculate a packet digest for a heartbeat message and the receive end also calculates the packet digest after receiving the heartbeat message. If the two digests are the same, the heartbeat message is valid. Otherwise, the heartbeat message is invalid and discarded.
If packets are received, the E-Trunk checks the length, digest, and key parameters of the packets. Invalid packets, such as error packets, are discarded.
Protocol authentication can be configured to defend against attacks. To prevent attacks, you can set the authentication algorithm to HMAC-SHA1-96, HMAC-SHA2-256, or enhanced-HMAC-SHA256.
Run the security-key { simple simple-key | cipher { cipher-key1 | cipher-key2 | cipher-key3 } } command in the E-Trunk view to set an authentication key.
If simple is specified, a password is displayed in clear text in the configuration file.
If cipher is specified, a ciphertext password is displayed as unidentifiable characters.
If simple is configured, the password is saved in the configuration file in clear text. The users with the least privilege may obtain the password by viewing the configuration file. This causes a network security risk. Therefore, cipher is recommended.
Two devices whose interfaces join the same E-Trunk interface must have the same password for encrypting packets. After an E-Trunk interface is created, you must manually set an encryption password. Otherwise, E-Trunk negotiation fails to be performed.
To enhance security, you are advised to set a ciphertext password.
Enhanced-HMAC-SHA256 is recommended for authentication and encryption.