HP-UX IPSec Version A.03.02.02 Administrator's Guide HP-UX 11i version 2 and HP-UX 11i version 3 (762800-001, April 2014)
B Interoperability
This appendix contains following information about using HP-UX IPSec with other IPsec
implementations and contains the following sections:
• “Microsoft” (page 165)
• “Linux” (page 167)
• “FreeBSD” (page 170)
• “Cisco” (page 176)
Microsoft
HP-UX IPSec can interoperate with Microsoft IPsec implementations.
Versions and Functionalities
HP-UX IPSec A.03.02.02 has been successfully tested with the following Microsoft products and
functionalities:
Windows 2008 server R2 and
Windows 7
IKEv1 using preshared key authentication for end-to-end
transport IPsec SAs for all ports and protocols with
compatible crypto transforms only.
HP-UX IPSec A.03.00 has been successfully tested with the following Microsoft products and
functionalities:
Windows XP SP2 IKEv1 using preshared key authentication for end-to-end transport
IPsec SAs for all ports and protocols
IKEv1 using RSA signatures (certificates) authentication for end-to-end
transport IPsec SAs for all ports and protocols
IKEv1 using RSA signatures with multiple-level CAs for end-to-end
transport IPsec SAs for all ports and protocols
Windows Vista IKEv1 using preshared key authentication for end-to-end transport
IPsec SAs for all ports and protocols
Windows 2008 Server IKEv1 using preshared key authentication for host-to-host transport
IPsec SAs for all ports and protocol
IKEv1 using preshared key authentication for host-to-host transport
IPsec SAs for only inbound telnet service on the Windows server
Tips
The following tips might help you configure HP-UX IPSec and Microsoft IPsec implementations:
• The default IKEv1 authentication method on Microsoft systems is Kerberos. You must change
the IKE authentication method to Computer Certificate (RSA signatures) or preshared key.
• The default IKEv1 hash algorithm on Microsoft systems is SHA-1. On HP-UX systems, the default
IKEv1 hash algorithm is MD5. You must change the hash algorithm to match the peer.
• When using RSA signatures for IKE authentication, Microsoft systems use X.500 Distinguished
Name as the ID type by default.
• If you are using the IPsec Policy Management Microsoft Management Control (MMC) snap-in
(used with Windows XP and Windows 2003, and provided for compatibility on Windows
2008 and Vista) and configuring host-to-host IPsec security, configure one rule and set the
Mirror field to yes. Specify the HP-UX system address as the destination address.
Microsoft 165