HP-UX IPSec version A.02.01 Administrator's Guide

Configuring HP-UX IPSec
Chapter 490
This chapter describes how to configure HP-UX IPSec, including
preshared key configuration. If you are using RSA signature
authentication for IKE, you must also see Chapter 5, “Using Certificates
with HP-UX IPSec,” on page 151 for instructions on configuring
certificates. This chapter also describes how to maximize HP-UX IPSec
security and how to use the HP-UX IPSec configuration utility,
ipsec_config.
This chapter contains the following sections:
“Maximizing Security” on page 91
“Using ipsec_config” on page 93
“Configuration Overview” on page 99
“Step 1: Configuring Host IPsec Policies” on page 102
“Step 2: Configuring Tunnel IPsec Policies” on page 115
“Step 3: Configuring IKE Policies” on page 123
“Step 4: Configuring Preshared Keys Using Authentication Records
on page 129
“Step 5: Configuring Certificates” on page 139
“Step 6: Configuring the Bypass List (Local IP Addresses)” on
page 140
“Step 7: Verifying the Batch File Syntax” on page 143
“Step 8: Committing the Batch File Configuration and Verifying
Operation” on page 144
“Step 9: Configuring HP-UX IPSec to Start Automatically” on
page 148
“Step 10: Creating Backup Copies of the Configuration Files” on
page 150