Securing the Network in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014
 
 

ikeadm Command for IKEv2

    When the in.ikev2d daemon is running, you can use the ikeadm [-v2] command to do the following:

  • View aspects of the IKEv2 state.

  • Display IKEv2 daemon objects, such as policy rules, preshared keys, available Diffie-Hellman groups, encryption and authentication algorithms, and existing active IKEv2 SAs.

For examples and a full description of this command's options, see the ikeadm(1M) man page.

The security considerations for the ikeadm command are similar to the considerations for the ipseckey command. For details, see Security Considerations for ipseckey.