Figure 12 Configuring A Preshared Key

To use IKE authentication with certificates, select Use a certificate from this certification authority (CA). Click Browse. The IP Security configuration utility opens a Select Certificate box with a list of CA certificates stored on your system. Select the CA for the appropriate CA and click OK. (For additional information about configuring Microsoft Windows certificates, see Using Microsoft Windows Certificates with HP-UX IPSec, available at http://docs.hp.com.

4.After you have specified the IKE authentication method, click OK to return to the Authentication Methods tab in the Rule Properties dialog box.

5.In the Rule Properties dialog box, remove the Kerberos authentication method from the authentication methods list by highlighting it and clicking Remove.

The configuration utility will display a confirmation message (Are you sure?). Click Yes

Step 7: Configuring the Connection Type for the Rule

The connection type specifies the types of network connection to which the rule will apply. By default, the IP Security configuration utility creates rules that apply to all network connection types. To change the connection type, use the following procedure:

1.Select the Connection Type tab from the Rule Properties dialog box.

2.The IP Security configuration utility opens the Connection Type dialog box with the following selections:

All network connections: the rule applies to all network connections

Local area network (LAN): the rule applies only to LAN connections

Remote access: the rule applies only to VPN and dial-up connections

Select the appropriate connection type and click OK. If you have configured all the required parameters for a rule, the IP Security configuration utility will return to the Policy Properties dialog box.

Step 8: Modifying IKE Parameters for the Policy

By default, HP-UX IPSec negotiates IKE SAs using a single proposal with the following parameters:

26