HP-UX IPSec version A.02.00 Administrator's Guide
HP-UX IPSec Configuration Examples
Appendix C294
This appendix provides configuration examples for four topologies:
• “Example 1: telnet Between Two Systems” on page 295
shows example ipsec_config batch files for encrypting and
authenticating all telnet traffic between two systems using dynamic
keys and preshared keys for IKE authentication.
• “Example 2: Authenticated ESP with Exceptions” on page 299
shows an example ipsec_config batch file for an HP-UX IPSec
closed secure network that communicates with one system outside
the network (Potato). All packets to and from system Potato are
secured, and all packets within the local network are secured, except
for ICMP packets, which pass in clear text.
• “Example 3: Host to Gateway” on page 302
shows an example ipsec_config batch file for an end system using
an IPSec tunnel to a gateway.
• “Example 4: Manual Keys” on page 304
shows example ipsec_config batch files for encrypting and
authenticating rlogin from one system to a second system between
using manual keys.
A configuration example for a Mobile IPv6 topology is provided in
Chapter 7, “Mobile IPv6 Configuration Example” on page 227.
NOTE The addresses and keys in these examples are for illustrative purposes
only.