HP-UX IPSec version A.02.00 Administrator's Guide

313
ISAKMP
, 281
product requirements, 51
disk, 51
protocol
configuring in host IPSec policies
, 73
proxy identifiers
configuring in tunnel IPSec policies, 83
proxy server
configuration
, 121
public key, 41, 115
Q
Quick Mode (QM)
definition
, 308
R
random number generator
for generating encryption keys
, 209
reporting problems, 168
RFCs, 279
Route Optimization (Mobile IPv6)
defined
, 203
RSA cryptosystem, 308
RSA signatures
configuring as an authentication method in
IKE policies
, 92
S
SA
See Security Association
Security Association
, 38, 107, 150, 156, 308
negotiation, 147
security certificates
configuring as an authentication method in
IKE policies
, 92
Security Parameters Index, 151
See SPI
service name
configuring in host IPSec policies
, 71
session-based keying
configuring in host IPSec policies
, 78
SHA1
RFC
, 279
shared key, 29, 33
shared keys, 41
single-user mode, 54
SKEME, 38
software
loading
, 53
SPI (Security Parameters Index), 107
configuring for manual keys, 212
processing, 151
startup options
configuring
, 109
status
report
, 105
verifying, 160
subnets
configuring policies for
ICMP messages
, 282
swinstall(1M), 53
swlist(1M), 52
symmetric key, 33
T
tools survey
, 155
topologies, 43
gateway-to-gateway, 45
host-to-gateway, 43
host-to-host, 43
host-to-host tunnel, 44
tracing
disabling, 155
enabling, 155
layer 4, 162, 168
transform
action, 149
configuring in host IPSec policies, 75
configuring in tunnel IPSec policies, 86
definition, 308
discard, 106
ipsec operation, 148
list, 178
pass, 106
verify, 106
transport mode, 34
AH (Authentication Header), 30
troubleshooting
advanced
, 149
hints, 160
ipsec, 147
scenarios, 160
tunnel
addresses
configuring in tunnel IPSec policies
, 82
configuring in host IPSec policies, 74
host-to-host topology, 44
IPSec policies
configuring
, 81
examples, 87