HP-UX IPSec Version A.03.00 Administrator's Guide
4 Configuring HP-UX IPSec
This chapter describes how to configure HP-UX IPSec, including preshared key configuration.
If you are using RSA signature authentication for IKE, you must also see Chapter 5: “Using
Certificates with HP-UX IPSec ” (page 113) for instructions on configuring certificates. This chapter
also describes how to maximize HP-UX IPSec security and how to use the HP-UX IPSec
configuration utility, ipsec_config.
This chapter contains the following sections:
• “Maximizing Security” (page 66)
• “Using ipsec_config ” (page 67)
• “Configuration Overview” (page 70)
• “Step 1: Configuring Host IPsec Policies” (page 72)
• “Step 2: Configuring Tunnel IPsec Policies” (page 80)
• “Step 3: Configuring Authentication Records and Preshared Keys” (page 85)
• “Step 4: Configuring IKEv1 and IKEv2 Policies” (page 95)
• “Step 5: Configuring Certificates” (page 103)
• “Step 6: Configuring the Bypass List (Local IP Addresses)” (page 104)
• “Step 7: Verifying the Batch File Syntax” (page 106)
• “Step 8: Committing the Batch File Configuration and Verifying Operation” (page 107)
• “Step 9: Configuring HP-UX IPSec to Start Automatically” (page 110)
• “Step 10: Creating Backup Copies of the Configuration Files” (page 111)
65