HP-UX IPSec Version A.03.00 Administrator's Guide

List of Figures
1-1 Shared Key Encryption..................................................................................................................32
1-2 Shared Key Hash Function............................................................................................................33
1-3 ESP Processing...............................................................................................................................34
1-4 ESP Transport Mode......................................................................................................................34
1-5 ESP Tunnel Mode..........................................................................................................................35
1-6 IPv6 ESP in Transport Mode.........................................................................................................35
1-7 IPv6 ESP in Tunnel Mode..............................................................................................................35
1-8 AH in Transport Mode..................................................................................................................37
1-9 AH in Tunnel Mode.......................................................................................................................37
1-10 IPv6 AH Transport Mode..............................................................................................................37
1-11 IPv6 AH Tunnel Mode..................................................................................................................37
1-12 Diffie-Hellman Key Generation....................................................................................................40
1-13 HP-UX IPSec Host-to-Host IPsec in an Internal Network............................................................43
1-14 HP-UX IPSec Host-to-Host VPN Across the Internet...................................................................44
1-15 HP-UX IPSec Host-to-Gateway VPN Across the Internet.............................................................44
1-16 HP-UX IPSec Securing a Backend Server......................................................................................45
4-1 Bypass List Example....................................................................................................................104
A-1 IKEv1 Main Mode........................................................................................................................170
A-2 IKEv1 Aggressive Mode..............................................................................................................171
A-3 IKEv1 Quick Mode......................................................................................................................171
A-4 IKEv2 SA Negotiations................................................................................................................172
B-1 End to Gateway Tunnel with Cisco Router.................................................................................198
D-1 Example 1: telnet AB...................................................................................................................206
D-2 Example 1: telnet BA...................................................................................................................206
D-3 Example 2: Network IPsec Policy with Exceptions.....................................................................208
D-4 Host to Gateway Configuration Example...................................................................................210
G-1 Serviceguard Cluster...................................................................................................................222
16 List of Figures