HP-UX IPSec Version A.03.02.02 Administrator's Guide HP-UX 11i version 2 and HP-UX 11i version 3 (762800-001, April 2014)

Tips................................................................................................................................177
HP Printers...........................................................................................................................178
C Migrating from Previous Versions of HP-UX IPSec........................................179
DES Compatibility................................................................................................................179
Pre-Installation Migration Instructions.......................................................................................179
Post-Installation Migration Instructions......................................................................................179
Profile File.......................................................................................................................179
Configuration Database....................................................................................................179
Additional Configuration Tasks..........................................................................................180
Certificate Files................................................................................................................181
D HP-UX IPSec Configuration Examples........................................................182
Host to Host telnet.................................................................................................................182
Apple Configuration.........................................................................................................182
Host IPsec Policies.......................................................................................................182
Authentication Record with Preshared Key......................................................................183
IKEv1 Policy...............................................................................................................183
Banana Configuration......................................................................................................183
Subnet ESP with Exceptions....................................................................................................184
Carrot Configuration........................................................................................................184
Host IPsec Policies.......................................................................................................184
Policy Priority.........................................................................................................185
Authentication Records.................................................................................................185
IKEv1 Policy...............................................................................................................185
Certificates.................................................................................................................185
Host to Gateway..................................................................................................................185
Blue Configuration...........................................................................................................186
Host IPsec Policy..........................................................................................................186
Tunnel IPsec Policy.......................................................................................................186
Authentication Record..................................................................................................186
IKEv1 Policy...............................................................................................................186
Autoconfiguration Clients.......................................................................................................186
Server1 Configuration......................................................................................................186
Host Policy.................................................................................................................187
Authentication Records.................................................................................................187
IKE Policy...................................................................................................................187
Client Configuration.........................................................................................................187
Host Policy.................................................................................................................187
Authentication Record..................................................................................................188
IKE Policy...................................................................................................................188
E HP-UX IPSec and HP-UX IPFilter.................................................................189
Using HP-UX IPSec with HP-UX IPFilter......................................................................................189
IPsec Packets...................................................................................................................189
Upper Layer Information...................................................................................................189
IPsec Tunnels and End to Gateway Topologies.....................................................................189
Example.........................................................................................................................189
F Using Manual Keys.................................................................................190
Configuring Manual Key SAs.................................................................................................190
Manual Key Policy Restrictions...........................................................................................190
Selecting Encryption Keys..................................................................................................191
Using the HP-UX Strong Random Number Generator............................................................191
Manual Key Configuration Example...................................................................................191
Dog Configuration......................................................................................................191
Cat Configuration.......................................................................................................191
Contents 13