JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: IP Services
search filter icon
search icon

Document Information

Preface

Part I Introducing System Administration: IP Services

1.  Oracle Solaris TCP/IP Protocol Suite (Overview)

Part II TCP/IP Administration

2.  Planning Your TCP/IP Network (Tasks)

3.  Introducing IPv6 (Overview)

4.  Planning an IPv6 Network (Tasks)

5.  Configuring TCP/IP Network Services and IPv4 Addressing (Tasks)

6.  Administering Network Interfaces (Tasks)

7.  Configuring an IPv6 Network (Tasks)

8.  Administering a TCP/IP Network (Tasks)

9.  Troubleshooting Network Problems (Tasks)

10.  TCP/IP and IPv4 in Depth (Reference)

11.  IPv6 in Depth (Reference)

Part III DHCP

12.  About DHCP (Overview)

13.  Planning for DHCP Service (Tasks)

14.  Configuring the DHCP Service (Tasks)

15.  Administering DHCP (Tasks)

16.  Configuring and Administering the DHCP Client

17.  Troubleshooting DHCP (Reference)

18.  DHCP Commands and Files (Reference)

Part IV IP Security

19.  IP Security Architecture (Overview)

20.  Configuring IPsec (Tasks)

21.  IP Security Architecture (Reference)

22.  Internet Key Exchange (Overview)

23.  Configuring IKE (Tasks)

24.  Internet Key Exchange (Reference)

25.  IP Filter in Oracle Solaris (Overview)

26.   IP Filter (Tasks)

Part V Mobile IP

27.  Mobile IP (Overview)

28.  Administering Mobile IP (Tasks)

29.  Mobile IP Files and Commands (Reference)

Part VI IPMP

30.  Introducing IPMP (Overview)

31.  Administering IPMP (Tasks)

Part VII IP Quality of Service (IPQoS)

32.  Introducing IPQoS (Overview)

33.  Planning for an IPQoS-Enabled Network (Tasks)

34.  Creating the IPQoS Configuration File (Tasks)

35.  Starting and Maintaining IPQoS (Tasks)

36.  Using Flow Accounting and Statistics Gathering (Tasks)

37.  IPQoS in Detail (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

Z

P

packet filter hooks, Packet Filter Hooks
packet filtering
activating a different rule set, How to Activate a Different or Updated Packet Filtering Rule Set
appending
rules to active set, How to Append Rules to the Active Packet Filtering Rule Set
rules to inactive set, How to Append Rules to the Inactive Packet Filtering Rule Set
configuring, Using IP Filter's Packet Filtering Feature
deactivating, How to Deactivate Packet Filtering
managing rule sets, Managing Packet Filtering Rule Sets for IP Filter
reloading after updating current rule set, How to Activate a Different or Updated Packet Filtering Rule Set
removing
active rule set, How to Remove a Packet Filtering Rule Set
inactive rule set, How to Remove an Inactive Packet Filtering Rule Set From the Kernel
specifying a NIC, How to Activate a NIC for Packet Filtering
switching between rule sets, How to Switch Between Active and Inactive Packet Filtering Rule Sets
packet flow
relay router, Considerations for Tunnels to a 6to4 Relay Router
through tunnel, Packet Flow Through the 6to4 Tunnel
packet flow, IPv6
6to4 and native IPv6, Considerations for Tunnels to a 6to4 Relay Router
through 6to4 tunnel, Packet Flow Through the 6to4 Tunnel
packet forwarding router, IPv4 Autonomous System Topology
packets
checking flow, Monitoring Packet Transfers With the snoop Command
data encapsulation
Transport Layer: Where Data Encapsulation Begins
Transport Layer: Where Data Encapsulation Begins
description, Data Encapsulation and the TCP/IP Protocol Stack
displaying contents, Monitoring Packet Transfers With the snoop Command
dropped or lost
Internet Layer
How to Determine if a Host Is Dropping Packets
forwarding, Packet Forwarding and Routing on IPv4 Networks
fragmentation, Internet Layer
header
IP header, Internet Layer: Where Packets Are Prepared for Delivery
TCP protocol functions, Transport Layer
IP protocol functions, Internet Layer
IPv6 header format, IPv6 Packet Header Format
life cycle
Data Encapsulation and the TCP/IP Protocol Stack
How the Receiving Host Handles the Packet
application layer, Application Layer: Where a Communication Originates
data-link layer
Data-Link Layer: Where Framing Takes Place
How the Receiving Host Handles the Packet
Internet layer, Internet Layer: Where Packets Are Prepared for Delivery
physical network layer
Physical Network Layer: Where Frames Are Sent and Received
How the Receiving Host Handles the Packet
receiving host process
How the Receiving Host Handles the Packet
How the Receiving Host Handles the Packet
transport layer
Transport Layer: Where Data Encapsulation Begins
Transport Layer: Where Data Encapsulation Begins
protecting
inbound packets, IPsec Packet Flow
outbound packets, IPsec Packet Flow
with IKE, IKE Phase 1 Exchange
with IPsec
IPsec Packet Flow
IPsec Protection Mechanisms
transfer
router
How Routers Transfer Packets
How Routers Transfer Packets
TCP/IP stack
Data Encapsulation and the TCP/IP Protocol Stack
How the Receiving Host Handles the Packet
UDP, Transport Layer: Where Data Encapsulation Begins
verifying protection, How to Verify That Packets Are Protected With IPsec
params clause
defining global statistics
How to Create the IPQoS Configuration File and Define Traffic Classes
params Clause
for a flowacct action, How to Enable Accounting for a Class in the IPQoS Configuration File
for a marker action, How to Define Traffic Forwarding in the IPQoS Configuration File
for a metering action, How to Configure Flow Control in the IPQoS Configuration File
syntax, params Clause
per-hop behavior (PHB), Per-Hop Behaviors
AF forwarding, Assured Forwarding
defining, in the IPQoS configuration file, How to Configure Flow Control in the IPQoS Configuration File
EF forwarding, Expedited Forwarding
using, with dscpmk marker, Using the dscpmk Marker for Forwarding Packets
perfect forward secrecy (PFS)
description, IKE Key Terminology
IKE, IKE Key Negotiation
PF_KEY socket interface
IPsec
IPsec Security Associations
IPsec Utilities and Files
pfil module, IP Filter and the pfil STREAMS Module
viewing statistics, How to View pfil Statistics for IP Filter
PFS, See perfect forward secrecy (PFS)
physical interface, Link Aggregation Basics
See also interfaces
adding, after installation, How to Configure a Physical Interface After System Installation
definition
Basics for Administering Physical Interfaces
Physical Interface
failure detection, IPMP Failure Detection and Recovery Features
naming conventions, Network Interface Names
network interface card (NIC), Basics for Administering Physical Interfaces
removing, How to Remove a Physical Interface
repair detection with IPMP, Detecting Physical Interface Repairs
physical layer (OSI), OSI Reference Model
physical network layer (TCP/IP)
Physical Network Layer
Physical Network Layer: Where Frames Are Sent and Received
How the Receiving Host Handles the Packet
physical point of attachment (PPA), VLAN Tags and Physical Points of Attachment
ping command, How to Determine if a Host Is Dropping Packets
description, Probing Remote Hosts With the ping Command
extensions for IPv6, ping Command Modifications for IPv6 Support
running, How to Determine if a Host Is Dropping Packets
-s option, How to Determine if a Host Is Dropping Packets
syntax
Probing Remote Hosts With the ping Command
Probing Remote Hosts With the ping Command
PKCS #11 library
in ike/config file, IKE Public Key Databases and Commands
specifying path to, ikecert certlocal Command
pkcs11_path keyword
description, IKE Public Key Databases and Commands
ikecert command and, ikecert certlocal Command
using, How to Generate and Store Public Key Certificates on Hardware
plumbing an interface
How to Configure an IPv4 Router
Plumbing an Interface
How to Configure a Physical Interface After System Installation
pntadm command
description
DHCP Command-Line Utilities
DHCP Commands
examples, Working With IP Addresses in the DHCP Service (Task Map)
using in scripts, Running DHCP Commands in Scripts
policies, IPsec, IPsec Protection Policies
policies, for aggregations, Policies and Load Balancing
policy files
ike/config file
IPsec Utilities and Files
IKE Utilities and Files
IKE Policy File
ipsecinit.conf file, ipsecinit.conf File
security considerations, Security Considerations for ipsecinit.conf and ipsecconf
policy service
description, IPsec Service Management Facility
use, How to Secure Traffic Between Two Systems With IPsec
Pool label
How to Configure the Address Section
How to Modify the Address Section
Address Section
Address Section
Pool section
labels and values, Pool Section
Mobile IP configuration file, Pool Section
ports, TCP, UDP, and SCTP port numbers, services Database
PPP links
troubleshooting
packet flow, Monitoring Packet Transfers With the snoop Command
prefix
network, IPv4, Designing Your CIDR IPv4 Addressing Scheme
site prefix, IPv6, Prefixes in IPv6
subnet prefix, IPv6, Prefixes in IPv6
prefix discovery, in IPv6, IPv6 Neighbor Discovery Protocol Overview
prefixes
router advertisement
Prefix Configuration Variables
Comparison of Neighbor Discovery to ARP and Related IPv4 Protocols
Router Advertisement Prefixes
PrefixFlags label
How to Configure the Advertisements Section
Advertisements Section
presentation layer (OSI), OSI Reference Model
preshared keys (IKE)
description, IKE With Preshared Keys
replacing, How to Refresh IKE Preshared Keys
shared with other platforms, How to Configure IKE With Preshared Keys
storing, IKE Preshared Keys Files
task map, Configuring IKE With Preshared Keys (Task Map)
viewing, How to View IKE Preshared Keys
preshared keys (IPsec), creating, How to Manually Create IPsec Security Associations
preventing IP spoofing, SMF manifest, How to Prevent IP Spoofing
primary network interface, Basics for Administering Physical Interfaces
private addresses, Mobile IP, Limited Private Addresses Support
private keys, storing (IKE), ikecert certlocal Command
privilege level
changing in IKE, How to View IKE Preshared Keys
checking in IKE
How to Refresh IKE Preshared Keys
How to View IKE Preshared Keys
setting in IKE, How to Verify That IKE Preshared Keys Are Identical
probe-based failure detection
configuring target systems, Configuring Target Systems
definition, Probe-Based Failure Detection
failure detection time, Probe-Based Failure Detection
probe traffic, IPMP, Test Addresses
probing targets, Probe-Based Failure Detection
probing targets, in.mpathd daemon, Test Addresses
protecting
IPsec traffic, Introduction to IPsec
keys in hardware, IKE and Hardware Storage
mobile systems with IPsec, Configuring IKE for Mobile Systems
packets between two systems, How to Secure Traffic Between Two Systems With IPsec
VPN with IPsec tunnel in transport mode, How to Protect a VPN With an IPsec Tunnel in Transport Mode Over IPv4
VPN with IPsec tunnel in tunnel mode, How to Protect a VPN With an IPsec Tunnel in Tunnel Mode Over IPv4
web server with IPsec, How to Use IPsec to Protect a Web Server From Nonweb Traffic
Protecting a VPN With IPsec (Task Map), Protecting a VPN With IPsec (Task Map)
Protecting Traffic With IPsec (Task Map), Protecting Traffic With IPsec (Task Map)
protection mechanisms, IPsec, IPsec Protection Mechanisms
protocol layers
OSI Reference Model
Protocol Layers and the Open Systems Interconnection Model
OSI Reference Model
packet life cycle
Data Encapsulation and the TCP/IP Protocol Stack
How the Receiving Host Handles the Packet
TCP/IP protocol architecture model
TCP/IP Protocol Architecture Model
Application Layer
application layer
TCP/IP Protocol Architecture Model
Application Layer
Application Layer
data-link layer
TCP/IP Protocol Architecture Model
Data-Link Layer
Internet layer
TCP/IP Protocol Architecture Model
Internet Layer
physical network layer
TCP/IP Protocol Architecture Model
Physical Network Layer
transport layer
TCP/IP Protocol Architecture Model
Transport Layer
protocol statistics display, How to Display Statistics by Protocol
protocols database
corresponding name service files, How Name Services Affect Network Databases
overview, protocols Database
proxy keyword, IKE configuration file, How to Handle a Certificate Revocation List
public key certificates, See certificates
public keys, storing (IKE), ikecert certdb Command
public topology, IPv6, Global Unicast Address
publickeys database, /etc/inet/ike/publickeys Directory