Securing the Network in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014
 
 
Chapter 10

Configuring IKEv1


Note - If you plan to implement IKEv2 only, proceed to Chapter 9, Configuring IKEv2.

For overview information about IKE, see Chapter 8, About Internet Key Exchange. For reference information about IKE, see Chapter 12, IPsec and Key Management Reference. For more procedures, see the Examples sections of the ikeadm(1M), ikecert(1M), and ike.config(4) man pages.


Note -  These tasks assume that the systems are assigned static IP addresses and you are running the network configuration profile DefaultFixed. If the netadm list command returns Automatic, see the netcfg(1M) man page for more information.