IPsec and IKE Administration Guide

Preface

The IPsec and IKE Administration Guide updates Chapters 19, 20, and 21 of the System Administration Guide: IP Services. This book assumes the following:

The SunOS 5.9 operating environment is part of the SolarisTM product family, which also includes the Solaris Common Desktop Environment (CDE). The SunOS 5.9 operating environment is compliant with AT&T's System V, Release 4 operating system.


Note –

The Solaris operating environment runs on two types of hardware, or platforms—SPARC® and x86. The Solaris operating environment runs on both 64-bit address spaces and 32-bit address spaces. The information in this document pertains to both platforms and both address spaces. Exceptions are called out in a special chapter, section, note, bullet, figure, table, example, or code example.


Who Should Use This Book

This book is intended for anyone responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one year or two years of UNIX® system administration experience. A UNIX system administration training course might be helpful.

How This Book Is Organized

Chapter 1, IP Security Architecture (Overview) provides an overview of IP Security Architecture (IPsec). IPsec provides protection for IP datagrams.

Chapter 2, Administering IPsec (Tasks) provides procedures for implementing IPsec on your network.

Chapter 3, Internet Key Exchange (Overview) provides an overview of Internet Key Exchange (IKE) for use with IPsec.

Chapter 4, Administering IKE (Tasks) provides procedures for implementing IKE.

Appendix A, IPsec and IKE Administration Guide Updates provides a list of changes between the Solaris 9 release and the Solaris 9 12/03 release.

The Glossary provides definitions of key IP security terms.

Accessing Sun Documentation Online

The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.

Typographic Conventions

The following table describes the typographic changes used in this book.

Table P–1 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

 The names of commands, files, and directories; onscreen computer output

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

 What you type, contrasted with onscreen computer output

machine_name% su

Password:

AaBbCc123

 Command-line placeholder: replace with a real name or value

To delete a file, type rm filename.

AaBbCc123

Book titles, new words, or terms, or words to be emphasized. 

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

Shell Prompts in Command Examples

The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P–2 Shell Prompts

Shell 

Prompt 

 C shell promptmachine_name%
 C shell superuser promptmachine_name#
 Bourne shell and Korn shell prompt$
 Bourne shell and Korn shell superuser prompt#