The IPsec and IKE Administration Guide updates Chapters 19, 20, and 21 of the System Administration Guide: IP Services. This book assumes the following:
You have already installed the SunOSTM 5.9 operating environment.
You have updated the SunOS 5.9 operating environment with the Solaris 9 12/03 release.
You have set up any networking software that you plan to use.
The SunOS 5.9 operating environment is part of the SolarisTM product family, which also includes the Solaris Common Desktop Environment (CDE). The SunOS 5.9 operating environment is compliant with AT&T's System V, Release 4 operating system.
The Solaris operating environment runs on two types of hardware, or platforms—SPARC® and x86. The Solaris operating environment runs on both 64-bit address spaces and 32-bit address spaces. The information in this document pertains to both platforms and both address spaces. Exceptions are called out in a special chapter, section, note, bullet, figure, table, example, or code example.
This book is intended for anyone responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one year or two years of UNIX® system administration experience. A UNIX system administration training course might be helpful.
Chapter 1, IP Security Architecture (Overview) provides an overview of IP Security Architecture (IPsec). IPsec provides protection for IP datagrams.
Chapter 2, Administering IPsec (Tasks) provides procedures for implementing IPsec on your network.
Chapter 3, Internet Key Exchange (Overview) provides an overview of Internet Key Exchange (IKE) for use with IPsec.
Chapter 4, Administering IKE (Tasks) provides procedures for implementing IKE.
Appendix A, IPsec and IKE Administration Guide Updates provides a list of changes between the Solaris 9 release and the Solaris 9 12/03 release.
The Glossary provides definitions of key IP security terms.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the typographic changes used in this book.
Table P–1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 | The names of commands, files, and directories; onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 | What you type, contrasted with onscreen computer output |
machine_name% su Password: |
AaBbCc123 | Command-line placeholder: replace with a real name or value |
To delete a file, type rm filename. |
AaBbCc123 |
Book titles, new words, or terms, or words to be emphasized. |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt | machine_name% |
C shell superuser prompt | machine_name# |
Bourne shell and Korn shell prompt | $ |
Bourne shell and Korn shell superuser prompt | # |