HP-UX IPSec Version A.03.00 Administrator's Guide

4 Configuring HP-UX IPSec
This chapter describes how to configure HP-UX IPSec, including preshared key configuration.
If you are using RSA signature authentication for IKE, you must also see Chapter 5: “Using
Certificates with HP-UX IPSec (page 113) for instructions on configuring certificates. This chapter
also describes how to maximize HP-UX IPSec security and how to use the HP-UX IPSec
configuration utility, ipsec_config.
This chapter contains the following sections:
“Maximizing Security” (page 66)
“Using ipsec_config ” (page 67)
“Configuration Overview” (page 70)
“Step 1: Configuring Host IPsec Policies” (page 72)
“Step 2: Configuring Tunnel IPsec Policies” (page 80)
“Step 3: Configuring Authentication Records and Preshared Keys” (page 85)
“Step 4: Configuring IKEv1 and IKEv2 Policies” (page 95)
“Step 5: Configuring Certificates” (page 103)
“Step 6: Configuring the Bypass List (Local IP Addresses)” (page 104)
“Step 7: Verifying the Batch File Syntax” (page 106)
“Step 8: Committing the Batch File Configuration and Verifying Operation” (page 107)
“Step 9: Configuring HP-UX IPSec to Start Automatically” (page 110)
“Step 10: Creating Backup Copies of the Configuration Files” (page 111)
65