ISAKMP, 281 product requirements, 51

disk, 51 protocol

configuring in host IPSec policies, 73 proxy identifiers

configuring in tunnel IPSec policies, 83 proxy server

configuration, 121 public key, 41, 115

Q

Quick Mode (QM) definition, 308

R

random number generator

for generating encryption keys, 209 reporting problems, 168

RFCs, 279

Route Optimization (Mobile IPv6) defined, 203

RSA cryptosystem, 308 RSA signatures

configuring as an authentication method in IKE policies, 92

S

SA

See Security Association

Security Association, 38, 107, 150, 156, 308 negotiation, 147

security certificates

configuring as an authentication method in IKE policies, 92

Security Parameters Index, 151 See SPI

service name

configuring in host IPSec policies, 71 session-based keying

configuring in host IPSec policies, 78 SHA1

RFC, 279 shared key, 29, 33 shared keys, 41 single-user mode, 54 SKEME, 38 software

loading, 53

SPI (Security Parameters Index), 107

configuring for manual keys, 212 processing, 151

startup options configuring, 109

status report, 105 verifying, 160

subnets

configuring policies for ICMP messages, 282

swinstall(1M), 53 swlist(1M), 52 symmetric key, 33

T

tools survey, 155 topologies, 43

gateway-to-gateway,45 host-to-gateway,43 host-to-host,43 host-to-host tunnel, 44

tracing disabling, 155 enabling, 155 layer 4, 162, 168

transform action, 149

configuring in host IPSec policies, 75 configuring in tunnel IPSec policies, 86 definition, 308

discard, 106

ipsec operation, 148 list, 178

pass, 106 verify, 106

transport mode, 34

AH (Authentication Header), 30 troubleshooting

advanced, 149 hints, 160 ipsec, 147 scenarios, 160

tunnel addresses

configuring in tunnel IPSec policies, 82 configuring in host IPSec policies, 74 host-to-host topology, 44

IPSec policies configuring, 81 examples, 87

313