| ]

Overview

Fibre Channel over Internet Protocol (FCIP) is a gigabit or multi-gigabit networking technology used to implement Storage Area Networks (SANs). This technology was developed by the Internet Engineering Task Force (IETF).

FCIP maintains all fibre channel services and provides options to manage highly complex SAN networks and share data between them. The various FCIP link devices help connect the Gigabit Ethernet and IP infrastructure to establish and administer an IP-based SAN network.

FCIP encapsulates fibre channel packets and transports them through TCP/IP. This encapsulation enables various applications to be supported by FCIP. It also enables various enterprise networks to use their current network infrastructure to connect and expand fibre channel SANs.

This ReferencePoint describes the concept, components, and structure of FCIP and explores the advantages, disadvantages, and future of FCIP. In addition, it explains FCIP security as well as TCP connection parameters used with FCIP.

Overview of FCIP

Add a Note HereFCIP provides interconnectivity of fibre channel SANs over TCP/IP networks. This connectivity helps create a unified SAN in a fibre channel fabric. FCIP depends on IP-based network resources to interconnect SANs over Local Area Networks (LANs), Metropolitan Area Networks (MANs), or Wide Area Networks (WANs).

Add a Note HereFCIP encapsulates fibre channel frames into TCP segments to link fibre channel SANs over WANs. As a result, FCIP requires a very low amount of IP content to function. FCIP provides IP connectivity between fibre channel SANs and not between individual storage devices.

Add a Note HereFCIP also enables the transfer of fibre channel data by tunneling it among one or more SANs across a TCP/IP network. Tunneling is the process of transmitting the confidential data of an enterprise network over a public network. Data is tunneled without the notice of the public network. Tunneling helps data to be shared over a widely distributed enterprise network.

Add a Note HereThe FCIP tunneling protocol uses TCP/IP as the transport media without changing the structure of fibre channel services. FCIP relies on IP-based network services and TCP/IP for congestion control and management. It also depends upon TCP/IP and fibre channel to perform error recovery. In FCIP, end points or gateways connect fibre channel SANs to the IP network and establish connectivity either between SANs or between fibre channel end devices and SANs.

Add a Note HereIP addresses and TCP connections are utilized only at the FCIP tunneling devices placed at each end of the IP network, as shown in Figure 5-1-1:

Click to collapse
Add a Note HereFigure 5-1-1: FCIP Tunneling Between Two Separate SANs

Add a Note HereAn IP address and TCP/IP connectivity between two FCIP devices detect the network connectivity of an IP network. When a fibre channel node in a SAN needs to communicate with a fibre channel node in a remote SAN, the FCIP device encapsulates the entire fibre channel frame in TCP segments and delivers it across the IP network. At the destination node, the IP and TCP headers are separated and a native fibre channel frame is delivered to the destination fibre channel node through the fibre channel switches available.

Add a Note HereTCP is used to transfer data across the IP tunnel and to check the occurrence of network congestion. The FCIP devices between remote SANs use the TCP connection to build a virtual interswitch link between them to transfer fibre channel data.

Add a Note Here FCIP Interface

Add a Note HereAn FCIP tunneling device that interconnects various fibre channel SANs acts as an interface. FCIP uses the Fabric Shortest Path First (FSPF) routing protocol, the Open Shortest Path First (OSPF) routing protocol, and the standard fabric E_PORT switch to interface among SANs. These interfaces conform to fibre channel switch standard requirements for building a switched fibre channel fabric. Multiple FCIP interfaces help combine multiple SAN networks to form a single, logical SAN. Figure 5-1-2 shows how two fibre channel switches form an integrated fabric in which the storage name and server information are exchanged, and data transfer routes are preserved so that a single data storage center is formed:

Click to collapse
Add a Note HereFigure 5-1-2: FCIP E_PORT and FSPF Connectivity to Each SAN Network

Note

Add a Note HereOSPF is a routing protocol that uses the service of a router. This routing protocol is used on an IP-based network to send routing information to all the nodes on a network by calculating the shortest distance between the nodes. FSPF is a switch-to-switch routing protocol that enables you to route data among fibre channel switches. E_PORT is an expansion port in a fibre channel switch that is used to link multiple fibre channel switches into a fabric.

Add a Note HereIf the FCIP tunnel interface goes down, the fibre channel switches on each side of the network disable E_PORTs connected to FCIP devices. Each fabric switch establishes its own SAN in isolation, and transmits a state change notification to the associated end nodes. In this way, each SAN obtains its own switch. As a result, the fabric addressing technique can be reassigned. Connection between remote fibre channel switches is not automatic. To re-establish the connection, you reboot either of the fabric switches after the FCIP tunneling device starts functioning again.

Add a Note Here Current Status of FCIP

Add a Note HereFCIP products are currently available for deployment and private storage. By making complete utilization of the existing fibre channel-based SAN setup, FCIP provides good performance and security and easy network management. FCIP is considered a complementary technology to the existing fibre channel and can be deployed with ease.

Add a Note HereFCIP plays an important role in IP-based SAN strategies because it provides the feature of extending the fibre channel technology to enable data transfer over WAN. It also provides value-added support for easy integration and creation of a truly global storage network for an enterprise. FCIP extends the range of fibre channel, which has a physical limit of roughly 67 miles, by utilizing the technology of IP routing. With a clear and established network for fibre channel, the FCIP technology supports easy deployment of SAN to implement virtual storage.

Add a Note Here Future Growth Potential of FCIP

Add a Note HereImplementing FCIP helps connect remotely placed SANs using minimum expenditure. The more the implementation of fibre channel SANs that are remotely situated and that need to be a part of the central framework, the greater would be the implementation of FCIP. This implementation of FCIP would also result in increased utilization of fibre channel-based SAN because of the feature of centralized storage and management for an enterprise network.

Add a Note HereIn the future, SAN interconnectivity through FCIP may help provide a high-performance, high-reliability infrastructure that assists in the operations of a wide range of companies.

Add a Note HereThe following activities may prove to be beneficial for the growth of FCIP:

  • Add a Note HereExtending investments made on the existing technology.

  • Add a Note HereExtending network services being offered to existing end users.

  • Add a Note HereMaking network services more user-friendly and improving the quality of service and delivery of data.

Add a Note Here FCIP Quality of Service

Add a Note HereQuality of service refers to the handling of data as it passes through a shared network. It is a measure of good quality service for data transfer on a network and reducing latency and packet dropping. Using quality of service, you can establish data priority and provide a guaranteed bandwidth for fast delivery.

Add a Note HereTechniques used to ensure quality of service include:

  • Add a Note HereMulti-Protocol Label Switching (MPLS): Establishes a path for the fast transfer of data on a network and enforces quality of service using packet labeling.

  • Add a Note HereDifferentiated Services Architecture (Diffserv): Redefines the Type of Service (TOS) field in the IP header to support Differentiated Services Code Point (DSCP). This support helps provide data delivery with good quality of service. Diffserv enables you to set the priority of network traffic depending on the policy used to establish the quality of service.

  • IEEE 802.1p: Assigns a priority to an FCIP frame and is enforced through buffer queuing in IP switches. The use of a weighted round-robin queuing algorithm ensures transfer of data including low-priority data in high-priority traffic.

Advantages and Disadvantages of FCIP

Among various technologies that interconnect SANs, FCIP is the most cost-effective technology. The IP technology in FCIP provides the flexibility of network storage and can be used for operations such as remote backup and storage. As a result, FCIP helps increase SAN interconnectivity for supporting a large number of network-based applications.

FCIP also provides support for the existing fibre channel infrastructure. This support helps in the seamless integration of existing SANs over long distances through IP networks and as a result, provides a cost-effective way to secure an enterprise network.

Some advantages of FCIP are that it:

  • Provides a standardized and cost-effective way to develop and deploy SAN interconnection for a wide range of applications.

  • Handles all the routing functions between logical links and systematic delivery of data packets to the specified device.

  • Supports all fibre channel-related services, such as FSPF routing algorithms.

  • Hides information regarding the data packet being routed from the IP network.

  • Interconnects remote SANs, which makes them appear as a large SAN, and helps manage them using traditional SAN management applications.

  • Enables SAN applications, such as disk mirroring or remote replication of data between two enterprise networks, to support other existing protocols without requiring alteration.

  • Supports routing algorithms, such as OSPF, which helps set an alternate path during IP link failure.

  • Provides Cyclic Redundancy Check (CRC) mechanisms for effective resynchronization of data if there is any data loss due to network failures.

Some disadvantages of FCIP are that it:

  • Lacks security and manageability of FCIP-based SAN networks due to the visibility of all network components required for configuration, resulting in misuse and intrusion by unauthorized agents.

  • Does not provide full interoperability with existing vendors of fibre channel end devices.

  • Lacks scalability due to the support for only a few SAN networks at a time.

  • Does not provide a path for data migration from fibre channel to IP-based SANs.


Components of FCIP

Add a Note HereSome of the important components of FCIP are:

  • Add a Note HereFCIP Entity

  • Add a Note HereFibre Channel Entity

  • Add a Note HereFCIP Data Engine

  • Add a Note HereFCIP Link Endpoint

  • Add a Note HereFCIP Frame

Add a Note HereThese components work in coordination with each other to transfer a fibre channel frame over an IP network. FCIP Entity should be used in conjunction with Fibre Channel Entity to tunnel the fibre channel fabric over an IP network.

Add a Note Here FCIP Entity and Fibre Channel Entity

Add a Note HereFCIP Entity is a network component that exchanges the fibre channel fabric on an IP network using the FCIP protocol. It consists of FCIP link end points, an FCIP control, and service modules. FCIP link end points provide support for fibre channel frames encapsulation and transmission features. The control and services module manages the link initialization and link dissolution of FCIP. It also supports Fibre Channel Entity by linking with important IP network services, such as establishing TCP connectivity, network security, and dynamic discovery of FCIP entities.

Add a Note HereIntegration of Fibre Channel Entity with FCIP Entity leads to the formation of a network framework that acts as an interface for the fibre channel fabric and IP network. This interface tunnels the fibre channel fabric through an IP network. The integration of an FCIP link endpoint with two Fibre Channel and FCIP Entity pairs helps transport non-fibre channel structure among various fibre channel devices. To support this transport, FCIP Entity uses a combination of a TCP port and an IP address to establish TCP connections, as shown in Figure 5-1-3:

This figure shows a model of Fibre Channel and an FCIP Entity pair in which the FCIP Entity of both fibre channels connects to an IP network.
Add a Note HereFigure 5-1-3: Fibre Channel Entity and FCIP Entity Pair Model

Add a Note Here Figure 5-1-4 shows how FCIP Entity receives a TCP connect request through FCIP link end points. FCIP Entity consists of a combination of a TCP port and an IP address to establish TCP connections. A fibre channel fabric that acts as an interface to the IP network provides each Fibre Channel and FCIP Entity pair with a unique combination of a fibre channel fabric entity world wide identifier. The integration of the Fibre Channel Entity world wide name with the pair of Fibre Channel and FCIP Entity identifier fields helps identify all Fibre Channel and FCIP Entity pairs existing on an IP-based network.

Click to collapse
Add a Note HereFigure 5-1-4: Relationship Between FCIP Entity and the IP Network

Add a Note Here Data Engine in FCIP

Add a Note HereThe FCIP data engine helps manage the tasks related to fibre channel frame encapsulation and de-encapsulation. It also manages the transmission of FCIP frames over a single TCP connection. Figure 5-1-5 shows a model of the FCIP data engine in an FCIP link endpoint:

Click to collapse
Add a Note HereFigure 5-1-5: FCIP Data Engine Model

Add a Note HereIn Figure 5-1-5, the portals used in the FCIP data engine are:

  • Add a Note HereFibre Channel Frame Receiver Portal (P1): Point from which a fibre channel frame and time stamp values pass to an FCIP data engine from Fibre Channel Entity.

  • Add a Note HereFibre Channel Frame Transmitter Portal (P4): Point from which a reconstituted fibre channel frame and time stamp values emerges from an FCIP data engine to Fibre Channel Entity.

  • Add a Note HereEncapsulated Frame Transmitter Portal (P2): Point from which an FCIP frame is transported to the IP network by an FCIP data engine.

  • Add a Note HereEncapsulated Frame Receiver Portal (P3): Point from which an FCIP data engine receives an FCIP frame from the IP network.

Add a Note HereThese portals do not process or validate the data that pass through them. The portals are the named access points which the FCIP data engine links to the external network.

Add a Note HereThe flow of data through a pair of IP networks connected to FCIP data engines is discharged as:

  1. Add a Note HereThe fibre channel frame-receiving portal receives the fibre channel frame with the time stamp. The frame and time stamp are then transferred to the encapsulation engine. Fibre Channel Entity processes the received frame according to fibre channel rules. The FCIP data engine does not verify the fibre channel frame.

  2. Add a Note HereThe received frame and time stamp are arranged as per the encapsulation format for data transmission over the IP network.

  3. Add a Note HereThe encapsulated frame transmitter portal receives the complete encapsulated frame and inserts the frame within the TCP byte stream.


    Note

    Add a Note HereThe transmission of the FCIP frame over the IP network conforms to all the TCP rules of operation.

  4. Add a Note HereThe data engine of FCIP Entity receives the frame through the encapsulated frame receiver portal. This frame is then transferred to the de-encapsulation engine for additional processing.

  5. Add a Note HereThe de-encapsulation engine verifies the received TCP byte streams. The received frame and time stamp are then de-encapsulated.

  6. Add a Note HereThe de-encapsulated frame and time stamp are transferred to the fibre channel frame transmitter portal. From this portal, Fibre Channel Entity receives the frame with the time stamp.

Add a Note Here Link Endpoint in FCIP

Add a Note HereThe FCIP link endpoint is an integral part of FCIP Entity and consists of one or more FCIP data engines. Each FCIP link is individually managed by an FCIP link endpoint. The FCIP link endpoint is a type of data translation endpoint between Fibre Channel Entity and an IP network. An FCIP link is formed when two FCIP link end points communicate with one or more TCP connections. This link helps connect two isolated SANs related to a fibre channel fabric and form a single fibre channel fabric. The FCIP link endpoint has a single FCIP data engine related to each TCP connection available in the FCIP link, as shown in Figure 5-1-6:

This figure shows the FCIP link endpoint model in which three FCIP data engines are used to establish three connections between the fibre channel fabric and the IP network.
Add a Note HereFigure 5-1-6: The FCIP Link Endpoint Model

Add a Note HereWhen a TCP connection is established with a new Fibre Channel and FCIP Entity pair, FCIP Entity of the pair forms a new FCIP link endpoint with only one FCIP data engine. The two FCIP link end points communicate with each other over an IP network, regardless of the fibre channel payloads that they carry. Similarly, fibre channel end nodes are connected to the fibre channel fabric regardless of the TCP/IP-based communication used by the fibre channel fabric. The FCIP link endpoint uses TCP-based flow control techniques to manage its internal resources. To control the flow of data, the FCIP link endpoint communicates with its local Fibre Channel Entity.

Frame in FCIP

An FCIP frame is the direct encapsulation of a fibre channel frame, as shown in Figure 5-1-7. The fibre channel header, the start of frame (SOF) and end of frame (EOF) delimiters, fibre channel CRC, and fibre channel data are not modified or manipulated by FCIP. The frame is carried in its original format. FCIP uses a fibre channel encapsulation frame header that consists of identifier fields for the FCIP protocol and the version level. The frame length field of FCIP frame contains the value for the length of the fibre channel frame and the encapsulation header. This frame length value helps check the receipt of an intact fibre channel frame.

This figure shows the FCIP frame, which consists of the Fiber Channel Frame, FCIP Header, and TCP Header.
Figure 5-1-7: FCIP Frame and Fibre Channel Encapsulation Header

The TCP header and the FCIP device check for the systematic transfer of data by regulating fibre channel EOF and SOF, as shown in Figure 5-1-8. The validation of the EOF, SOF, and FCIP frame length field ensures that the FCIP devices existing on both sides of an IP network to send and receive data are in synchronized state.

This figure shows a series of FCIP frames and the EOF, and SOF components perform the task of validation.
Figure 5-1-8: Regulation of EOF, SOF, and FCIP Frame Length

Structure of FCIP

Add a Note HereFCIP provides fibre channel tunneling over a TCP/IP network. It encapsulates the fibre channel frame into IP packets and maps fibre channel fabrics to IP addresses. The structure of FCIP is similar to a protocol stack in hierarchical format, as shown in Figure 5-1-9. In this protocol stack, the FCIP layer lies between the TCP and fibre channel layers. FCIP enables the use of the existing fibre channel hardware and software infrastructure and helps access SAN-connected data over the IP network.

This figure shows the FCIP protocol stack. In this figure, FCIP and fibre channel together act as a bridge between TCP/IP and the standard small computer system interface (SCSI) command set.
Add a Note HereFigure 5-1-9: FCIP Protocol Stack

Add a Note Here Network Model of FCIP

Add a Note HereThe primary purpose of the FCIP protocol is to create and administer multiple FCIP links to transfer data from SAN to SAN. The basic functions of FCIP Entity are to forward fibre channel frames and perform the task of fibre channel frame encapsulation. Figure 5-1-10 shows the FCIP network model:

 This figure shows the network model of FCIP in which two fibre channel SANs are connected to an IP network through an FCIP link.
Add a Note HereFigure 5-1-10: The Network Model of FCIP

Add a Note HereThe FCIP link is a service supported by FCIP for use in interconnectivity with fibre channel fabrics. This link service helps connect two different sections of the fibre channel fabric by utilizing the services of an IP network as a transport medium and creates a fibre channel fabric, as shown in Figure 5-1-11. FCIP Entity combines with Fibre Channel Entity where the FCIP link meets the fibre channel fabric. This location acts as the point of connectivity between the fibre channel fabric and an IP network.

Click to collapse
Add a Note HereFigure 5-1-11: FCIP Link Model

Add a Note Here TCP/IP Connectivity in FCIP

Add a Note HereWhen FCIP Entity creates and establishes a TCP connection, it searches for the IP address with which the TCP connection is to be made. It then establishes all the enabled IP security features for that IP address. Service Location Protocol (SLPv2) can be used for the dynamic discovery of FCIP entities. The tasks that FCIP Entity performs after enabling the IP security features for the SLPv2 discovery process are:

  • Add a Note HereFinding one or more FCIP discovery domains for utilization in the dynamic discovery process

  • Add a Note HereEstablishing an SLPv2 service agent for FCIP Entity to all peer FCIP entities in the FCIP discovery domains being found

  • Add a Note HereEstablishing an SLPv2 user agent to locate service advertisements for peer FCIP entities in the identified FCIP discovery domains


    Note

    Add a Note HereSLPv2 is a protocol that helps organize and find resources, such as printers, tape drives, disk drives, and databases, in a network environment.

Add a Note HereFor each peer FCIP Entity that is found dynamically by utilizing the services of an SLPv2 user agent, IP security features are established for the new TCP/IP address being found.

Add a Note HereThe information regarding the new TCP connection includes:

  • Add a Note HereTarget fibre channel fabric entity World Wide Name of the Fibre Channel and FCIP Entity pair with which the TCP connection is to be established

  • Add a Note HereParameters of TCP connection

  • Add a Note HereInformation regarding the quality of service

Add a Note HereDepending on the information being collected, FCIP Entity creates a TCP connection request to the FCIP port of 3225 at the IP address that the SLPv2 service specifies.

Add a Note HereIf the requested TCP connection is not accepted, steps should be taken to reduce the number of unnecessary repeated attempts to create similar type of connections. If the requested TCP connection is accepted, FCIP Entity completes the establishment of a new FCIP data engine.

Add a Note HereA new TCP connection should not be initiated by FCIP Entity if the incoming TCP connect request is already accepted from the same FCIP Entity. FCIP Entity should support a technique to acknowledge the receipt of a TCP connection request so that Fibre Channel Entity is in a position to stop an existing TCP connection whenever required. This enables Fibre Channel Entity to end all requests for TCP connections that are causing errors.

Add a Note Here Flow Control in FCIP

Add a Note HereFCIP lies between the fibre channel fabric and IP network. As a result, there is a possibility of network congestion on both sides. To rectify network congestion on the IP side, FCIP uses the established flow control methods of TCP. Although a specific mechanism is not available for FCIP flow control, the standard TCP sliding window mechanism for flow control can be used at the destination fibre channel SAN.

Add a Note HereFor example, if a receiving fibre channel switch does not have enough buffer space to receive inbound frames from the FCIP destination device, the device can suspend additional transmission of frames. Similarly, if a fibre channel switch is to deliver fibre channel frames beyond its limitations, you can manage the buffer size to slow down the rate of frame transmission by the originating fibre channel device.

Add a Note HereIf compatible line speeds with IP and fibre channel exist, the operation of FCIP involves both fibre channel flow control and TCP flow control mechanisms initiated by fibre channel SAN applications. At times, there may be inadequate bandwidth across the IP network or congested network on the destination SAN. These mechanisms are mutually dependent as the application of TCP flow control at one end initiates the fibre channel flow control at the other end.

Add a Note Here Time-Out Values in FCIP

Add a Note HereFCIP provides ordinary tunneling of fibre channel frames, and it is governed by fibre channel communication rules. FCIP uses the error detect time-out value (E_D_TOV) to monitor the regular and correct flow of frame sets within a fibre channel network. If the next fibre channel frame within a network could not be issued within E_D_TOV, an error is generated that results in the retransmission of the entire set of frame. The default value of E_D_TOV is set to 10 seconds, which can be changed during port logon operation and depends on the fibre channel implementation.

Add a Note HereIn addition to E_D_TOV, fibre channel standards help set a longer time-out value, which is known as resource allocation time-out value (R_A_TOV). The R_A_TOV value is initially set to 10 seconds. Its focus is on resources that were not delivered properly due to communication failure. Each time a failure in communications occurs, the operation does not resume until all the pending transmissions are completed.

Add a Note Here Error Handling in FCIP

Add a Note HereFCIP is an opaque transport mechanism that makes the content of fibre channel frames invisible. It transfers the generated content from one SAN to the destination SAN without performing the task of checking errors in the fibre channel layer. Even low-level error conditions, such as CRC errors, are transferred from source to destination locations. Other types of errors that occur at one end of the fibre channel network are distributed to the other end of the network through FCIP. These errors make the connected network congested with excessive errors.

Add a Note HereBut, FCIP manages the errors that are generated over the IP network. As per the FCIP specification, the occurrence of a frame error in the FCIP encapsulation layer causes that frame to be dropped by the receiving FCIP end device of the IP network. This prevents an IP-generated error from being transferred to the destination fibre channel SAN.

Add a Note HereIn all potential connection error conditions, the FCIP specification does not allow the retransmission of FCIP frames from a previous connection after a new connection is established. This prevents frame duplication at the receiving fibre channel end device and eliminates the time-consuming recovery processes.

Security in FCIP

Add a Note HereSecurity in FCIP is provided using security keys and authentication. FCIP utilizes the services of the IPSec protocol to support features such as data secrecy and authentication services and the Internet Key Exchange (IKE) protocol for key management.


Note

Add a Note HereIPSec is a set of protocols defined by IETF that provides support for transferring packets securely through an IP network. It supports the transport and tunnel encryption methods. The transport method encrypts only the payload of each packet and not the header. The tunnel method encrypts both the header and the payload.

Add a Note HereIKE is a protocol that implements Oakley and Skeme key exchanges within the Internet Security Association and Key Management Protocol (ISAKMP) framework. It supports the authentication of IPSec peers, negotiates IPSec keys, and IPSec Security Associations (SAs).

Add a Note HereISAKMP is a protocol framework that specifies the payload formats with the mechanism of implementing the key exchange protocol and negotiation of SA.

Add a Note HereOakley is a key exchange protocol that defines the derivation of authenticated keying material.

Add a Note HereSkeme is a key exchange protocol that defines the derivation of authenticated keying material with rapid key refreshment.

Add a Note HereSA specifies the utilization of security services for secured communications between two or more network components.

Add a Note Here Security Keys in FCIP

Add a Note HereFCIP entities support IKE to perform tasks, such as peer authentication, negotiation of SA, and key management, using IPSec Domain of Interpretation (DOI). The task of manual keying should not be used to create SA because it does not provide the required elements for rekeying.

Add a Note HereFCIP entities support:

  • Add a Note HerePreshared IKE keys

  • Add a Note HereCertificate-based peer authentication using digital signatures

  • Add a Note HereNo peer authentication using public key encryption methods

Add a Note HereIf the services of preshared keys are used, IKE Main Mode should be utilized only when both peers of an FCIP link use the statically assigned IP addresses. The use of dynamically assigned IP addresses with Main Mode can result in the FCIP deployment being hacked. If the peer of an FCIP link uses the dynamically assigned IP address, Aggressive Mode, and not Main Mode, should be used. If digital signatures are used, either IKE Main Mode or IKE Aggressive Mode can be used.

Add a Note HereTo establish a fully secured FCIP link, the participating FCIP entities use Security Policy Database (SPD). FCIP entities contain multiple interfaces and IP addresses and can establish multiple TCP connections with different FCIP end points and IP addresses. The presence of a multiple interface results in the establishment of IKE Phase 1 SA for each pair of FCIP endpoint and IP address.


Note

Add a Note HereIKE Phase 1 exchange is the point where two peers establish a secure, authenticated channel to communicate. It includes Main Mode and Aggressive Mode to accomplish Phase 1 exchange.

Add a Note HereOn successful IKE negotiations, both FCIP entities store SA parameters in the SA Database (SAD) that contains a set of active SA entries. Each entry contains information, such as Sequence Counter Overflow, Sequence Number Counter, Anti-replay Window, and Lifetime of SA. A default of one-hour SA Lifetime is used by FCIP entities with a default Anti-replay window of 32 sequence numbers.

Add a Note Here Authenticating with IPSec ESP and Replay Protection

Add a Note HereFCIP entities need information from the IPSec Encapsulating Security Payload (ESP) header in tunnel mode or transport mode to support data integrity and secrecy. IPSec ESP for message authentication calculates a value for cryptographic hash on a protected payload.

Add a Note HereTo support IPSec ESP message authentication, FCIP entities need to implement:

  • Add a Note HereHash Message Authentication Code (HMAC) with Secure Hash Algorithm-1 (SHA-1)

  • Add a Note HereAdvanced Encryption Standard (AES) in Cipher Block Chaining (CBC) and Message Authentication Code (MAC) modes with eXtended Cipher Block Code (XCBC) extensions

Add a Note HereTo support IPSec ESP secrecy, FCIP entities need to implement:

  • Add a Note HereTriple Data Encryption Standard (3DES) in CBC mode

  • Add a Note HereAES in Counter (CTR) mode

  • Add a Note HereNULL encryption

Add a Note HereFCIP entities need to support replay protection against any possible ESP sequence number wrap. In addition, depending upon the cipher algorithm and the number of bits in the cipher block size, the validity of the key may be compromised. In both the situations, SA needs to be re-established.

Add a Note HereFCIP entities need to use the result of an IKE Phase 1 negotiation to start an IKE Phase 2 quick mode exchange and establish new SAs. After creating Security Parameter Index (SPI) for the IP network, the originating device starts using this SPI for all the new FCIP encapsulated frames. Frames that are either in transit or resent due to TCP retransmissions can use either the new SPI or the one being replaced.


Note

Add a Note HereThe IKE Phase 2 exchange is the point where SA is negotiated on the part of services such as IPSec that requires key material and parameter negotiations. It includes Quick Mode that accomplishes Phase 2 exchange.

Add a Note Here Security Association and Data Security Issues

Add a Note HereAll TCP connections need to be secured by IKE Phase 2 SA. Network traffic from multiple TCP connections flow within each IPSec Phase 2 SA. Although it is possible for IKE Phase 2 SA to protect more than one TCP connection, all the packets of a TCP connection are protected using just one IKE Phase 2 SA. If different qualities of service settings are used for establishing TCP connections, different IPSec SA connections should be used.

Add a Note HereBefore you implement FCIP:

  • Add a Note HereThe IP addresses and port numbers in the data packet should be checked to be similar to any of the locally stored per-connection values.

  • Add a Note HereThe IPSec layer should perform the validation operation. An FCIP implementation can perform several IKE Phase 2 negotiations and cache them in its local SPIs and release as per the current SA lifetime settings.

Add a Note HereThe use of an IP network in a SAN as a replacement for physical cabling has some inherent security problems. The cabling system used in a fibre channel network is physically protected from outside access whereas IP networks are not. With IP networks, there are numerous ways in which the security setup of communication networks can be broken.

Add a Note HereIP networks carry FCIP links for fibre channel networks. As a result, it is better to provide security in relation to the entire IP network instead of securing only the fibre channel network.

Add a Note HereThe possible security threats by unauthorized agents that need to be considered before deploying FCIP-based fibre channel network are:

  • Add a Note HereAccess to network resources through the normal fibre channel fabric and processes

  • Add a Note HereMonitoring and administering the fibre channel traffic that passes through a physical media used by the IP network

  • Add a Note HereHijacking of TCP connections and starting invalid FCIP links between two peer FCIP entities

  • Add a Note HereInjection of valid and invalid FCIP frames on TCP connections

  • Add a Note HereAlteration of the payload of an FCIP frame

  • Add a Note HereDisruption of the functioning of a fibre channel fabric by unauthorized agents simulating as valid FCIP entities

  • Add a Note HereDenial of service due to excessive TCP connection requests and other resource exhaustion operations


Parameter Issues of TCP Connection

Add a Note HereThe following considerations regarding the TCP connection parameters must be taken into account to provide better management of an FCIP link end point and FCIP link resources:

  • Add a Note HereThe selective acknowledgement parameter enables the receiving end in a network setup to acknowledge multiple lost packets in a single acknowledgement. This helps in faster data recovery.

  • Add a Note HereThe TCP window scale option enables TCP window sizes larger than 16-bits to be advertised by the receiving end. An FCIP link end point uses the available techniques to set a window size based on the available local buffer resources and the required throughput.

  • Add a Note HereFCIP entities should implement protection against wrapped sequence numbers because within a single connection, TCP sequence numbers can wrap within a time-out window.

  • Add a Note HereFCIP entities should disable Nagle Algorithm by setting the TCP_NODELAY option to 1 at the local TCP interface.

  • Add a Note HereWhen idle, the keep-alive option of the TCP connection helps maintain the connection.

  • Add a Note HereWhen FCIP Entity finds that a TCP connection is lost, it needs to inform the Fibre Channel Entity of the failure and the reason for it.