HP-UX IPSec Version A.03.00 Administrator's Guide
Router (config)# crypto ipsec transform-set aes-sha1 esp-aes 128 esp-sha-hmac
Router (cfg-crypto-trans)# mode tunnel
Router (cfg-crypto-trans)# exit
Define an IPsec policy map:
Router(config)# access-list 100 permit ip host 192.1.1.2 host 192.0.0.2
Router(config)# crypto map hpux-1 1 ipsec-isakmp
Router (config-crypto-map)# set peer 192.0.0.2
Router (config-crypto-map)# set transform-set aes-sha1
Router (config-crypto-map)# match address 100
Router (config-crypto-map)# exit
Apply IPSec to the specific interface gi0/1:
Router (config-if)# interface gi0/1
Router (config-if)# crypto map hpux-1
Router (config-if)# exit
Router (config)# exit
Tips
The following tips might help you configure HP-UX IPSec and Cisco IPsec implementations:
• The Cisco configuration documentation and utilities use the term ISAKMP (or isakmp) to
refer to IKE components.
• The Cisco configuration includes default ISAKMP policies, which are enabled using the
crypto isakmp default policy command. In this example, the crypto isakmp
policy command is used to add a specific ISAKMP policy with the priority 40 (a lower
priority value has a higher priority).
The default IKEv1 parameters for the IOS crypto isakmp policy command are as
follows:
— Hash: SHA-1. On HP-UX systems, the default IKEv1 hash algorithm is MD5.
— Group: 1. On HP-UX systems, the default Diffie-Hellman group is 2. HP-UX IPSec does
not support group 1.
— Encryption: DES. On HP-UX systems, the default IKEv1 encryption algorithm is 3DES.
HP-UX IPSec does not support DES.
— Authentication: RSA. On HP-UX systems, the authentication method is specified using
the -local_method and -remote_method arguments. The default method is RSA
signatures if no preshared key (-psk) argument is specified.
• Under certain conditions, Cisco IOS IPsec negotiates two unidirectional IKE SAs with a peer
instead of one bidirectional IKE SA. If this occurs with an HP-UX peer and you stop HP-UX
IPSec, HP-UX IPSec sends an IKE DELETE message to the Cisco device for the IKE SA that
HP-UX IPSec initiated. The Cisco device deletes this IKE SA, but retains the second IKE SA.
If you restart HP-UX IPSec, the Cisco device may attempt to use its existing IKE SA to
negotiate IPsec SAs with HP-UX IPSec. This causes a negotiation failure. As a workaround,
login to the Cisco device and manually delete any IKE SAs to an HP-UX system that remain
after you stop HP-UX IPSec.
Cisco 199