Securing the Network in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014
 
 
Chapter 8

About Internet Key Exchange

For instructions on implementing the latest version of the IKE protocol, see Chapter 9, Configuring IKEv2. To continue to use IKEv1, see Chapter 10, Configuring IKEv1. For reference information, see Chapter 12, IPsec and Key Management Reference. For information about IPsec, see Chapter 6, About IP Security Architecture.