HP-UX IPSec version A.02.01 Administrator's Guide
Configuring HP-UX IPSec
Chapter 490
This chapter describes how to configure HP-UX IPSec, including
preshared key configuration. If you are using RSA signature
authentication for IKE, you must also see Chapter 5, “Using Certificates
with HP-UX IPSec,” on page 151 for instructions on configuring
certificates. This chapter also describes how to maximize HP-UX IPSec
security and how to use the HP-UX IPSec configuration utility,
ipsec_config.
This chapter contains the following sections:
• “Maximizing Security” on page 91
• “Using ipsec_config” on page 93
• “Configuration Overview” on page 99
• “Step 1: Configuring Host IPsec Policies” on page 102
• “Step 2: Configuring Tunnel IPsec Policies” on page 115
• “Step 3: Configuring IKE Policies” on page 123
• “Step 4: Configuring Preshared Keys Using Authentication Records”
on page 129
• “Step 5: Configuring Certificates” on page 139
• “Step 6: Configuring the Bypass List (Local IP Addresses)” on
page 140
• “Step 7: Verifying the Batch File Syntax” on page 143
• “Step 8: Committing the Batch File Configuration and Verifying
Operation” on page 144
• “Step 9: Configuring HP-UX IPSec to Start Automatically” on
page 148
• “Step 10: Creating Backup Copies of the Configuration Files” on
page 150