HP-UX IPSec Configuration Examples

This appendix provides configuration examples for four topologies:

“Example 1: telnet Between Two Systems” on page 295 shows example ipsec_config batch files for encrypting and authenticating all telnet traffic between two systems using dynamic keys and preshared keys for IKE authentication.

“Example 2: Authenticated ESP with Exceptions” on page 299 shows an example ipsec_config batch file for an HP-UX IPSec closed secure network that communicates with one system outside the network (Potato). All packets to and from system Potato are secured, and all packets within the local network are secured, except for ICMP packets, which pass in clear text.

“Example 3: Host to Gateway” on page 302

shows an example ipsec_config batch file for an end system using an IPSec tunnel to a gateway.

“Example 4: Manual Keys” on page 304

shows example ipsec_config batch files for encrypting and authenticating rlogin from one system to a second system between using manual keys.

A configuration example for a Mobile IPv6 topology is provided in

Chapter 7, “Mobile IPv6 Configuration Example” on page 227.

NOTE

The addresses and keys in these examples are for illustrative purposes

 

only.

 

 

294

Appendix C