Configuring HP-UX IPSec

Step 4: Configuring Preshared Keys Using Authentication RecordsStep 4: Configuring Preshared Keys Using Authentication Records

Complete this step only if you configured PSK (preshared keys) as an IKE authentication method in “Step 3: Configuring IKE Policies” on page 89. If you configured RSASIG (RSA signatures) as the IKE authentication method in all IKE policies, skip this step, and go to Chapter 4, “Using Certificates with HP-UX IPSec,” on page 113.

HP-UX IPSec stores preshared keys in authentication records. You configure authentication records using the ipsec_config add auth command.

Remote Multi-homed Systems

If a remote system is multi-homed (the remote systems has multiple IP addresses), you must configure an authentication record for each IP address on the remote system. Specify the same preshared key in each authentication record for the remote system.

Configuring IKE ID Information with Preshared Keys

Authentication records can also include IKE ID information. You do not have to configure IKE ID information if your topology meets the following requirements:

you are using preshared keys

the remote system is an HP-UX IPSec system, or a system that uses IP addresses as IKE IDs

If your topology does not meet the above requirements, you must configure IKE ID information. Refer to the ipsec_config (1M) manpage for more information on configuring IKE ID information. Chapter 4, “Configuring Authentication Records with IKE IDs” on page 134 also contains information on configuring IKE ID information.

As part of the ISAKMP/MM SA negotiation, the IKE peers exchange and verify ID types and ID values. During an ISAKMP/MM negotiation, HP-UX IPSec uses the remote system address to search for an

Chapter 3

95