Configuring HP-UX IPSec

Step 8: Committing the Batch File Configuration and Verifying Operation

After doing so, enter the following commands:

ipsec_report -host ipsec_report -sad

Or, run:

ipsec_report -all

From the output of ipsec_report, you can verify the status of the outbound IPSec SA for the packets using the IPSec policy you are verifying.

Check the active host IPSec policies (ipsec_report -hostoutput) for entries that correspond to the IPSec policy you are verifying.

There will be multiple entries for each host IPSec policy. Find an outbound entry with SA information, including inbound and outbound SPIs:

----------------- Active IPSec Policy -----------

Rule Name: telnet_in ID: 3 Cookie: 4 Priority: 10

Src IP Addr: 15.1.1.1 Prefix: 32 Port number:23

Dst IP Addr: 15.2.2.2 Prefix: 32 Port number: *

Network Protocol: *

Direction: outbound

Action: Dynamic

key SA

State: Ready

Number of SA(s)

Needed:

1 Pair(s)

Number

of SA(s)

Created: 1 Pairs(s)

Kernel

Requests

Queued:

0

Proposal 1: Transform: ESP-AES128-HMAC-SHA1

Lifetime Seconds: 28800

Lifetime Kbytes: 0

-- SA Pair Number 1 --

SA Type: ESP

Encryption Algorithm: AES128-CBC

Authentication Algorithm: HMAC-SHA1

Outbound SPI (hex): BE882

Inbound SPI (hex:) 13BDB7

You can also check the SA database output (ipsec_report -sadoutput) for the SAs with the corresponding SPIs:

------------- IPSec

SA ----------------

Sequence number:

1

 

SPI (hex): BE882

 

State: MATURE

SA Type: ESP with AES128-CBC encryption and HMAC-SHA1 authentication

Src IP Addr: 15.1.1.1

Dst IP Addr: 15.2.2.2

Chapter 3

107