HP-UX IPSec Version A.03.00 Administrator's Guide

Index
Symbols
3DES (Triple Data Encryption Standard), 36, 249
configuring in host IPsec policies, 77
configuring in IKEv1 policies, 98
configuring in IKEv2 policies, 100
configuring in tunnel IPsec policies, 82
key length, 167
A
AES (Advanced Encryption Standard), 36, 249
configuring in host IPsec policies, 77
configuring in IKEv2 policies, 100, 101
configuring in tunnel IPsec policies, 82
key length, 167
recommendation, 36
Aggressive Mode (AM), 39
configuring in authentication records, 87
SA, 250
(see also IKE SA)
AH (Authentication Header), 29
algorithms, 36, 167
configuring in host IPsec policies, 76
configuring in tunnel IPsec policies, 83
definition, 249
description, 36
negotiation, 169
processing, 175
RFC, 165
asymmetric key, 114
audit file, 157
determining the name of current, 143
audit level
changing, 142
default, 147
auditing, 142, 147
authentication, 249
algorithm
configuring in IKEv1 policies, 97
configuring in IKEv2 policies, 100
algorithms, 36, 167
IKE primary, 40
methods, 40
Authentication Header (see AH)
(see AH)
authentication record
order and selection, 85
authentication records
configuring, 85
AUTOCONF
specifying in authentication record, 91
autoconfiguration clients
configuration example, 211
B
bootup options
configuring, 62, 110, 135
bypass interfaces
configuring, 105
C
CA (Certificate Authority)
creating a Certificate Signing Request for, 118
defined, 249
requirements, 115
can't find matching selector error message, 157
certificate
key length for, 119
Certificate Revocation List (see CRL)
Certificate Revocation List (CRL)
requirements, 115
Certificate Signing Request (CSR)
creating, 118
file name, 121
PKI requirements, 115
certificates, 114
definition, 114, 249
how they work, 114
ID types not accepted, 166
requirements for, 115
troubleshooting, 158
clear text
configuring in host IPsec policies, 76
processing, 175
configuration
examples
autoconfiguration clients, 211
host-to-gateway, 210
manual keys, 218
preshared keys, 206
telnet, 206
configuring
auditing, 147
bypass list, 104
certificates, 122, 124
host IPsec policies, 72
IKE policies, 95
IKE version, 85
prerequisites, 49
preshared keys, 85
startup options, 62, 110, 135
tunnel IPsec policies, 80
connection timed out error message, 153
CRL (Certificate Revocation List), 114, 249
retrieving, 126, 128
CSR (see Certificate Signing Request)
D
daemons
HP-UX IPSec, 145
demilitarized zone (see DMZ)
Diffie-Hellman, 38, 41, 249
253