IPsec and IKE Administration Guide updates Chapters 19, 20, and 21 of the System Administration Guide: IP Services. This book assumes the following:
You have already installed the SunOSTM 5.9 operating system.
You have updated the SunOS 5.9 operating system with the Solaris 9 4/03 Release.
You have set up any networking software that you plan to use.
The SunOS 5.9 operating system is part of the Solaris product family, which also includes the Solaris Common Desktop Environment (CDE). The SunOS 5.9 operating system is compliant with AT&T's System V, Release 4 operating system.
The Solaris operating system runs on two types of hardware, or platforms—SPARC® and x86. The Solaris operating system runs on both 64-bit address spaces and 32-bit address spaces. The information in this document pertains to both platforms and both address spaces. Exceptions are called out in a special chapter, section, note, bullet, figure, table, example, or code example.
This book is intended for anyone responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one year or two years of UNIX® system administration experience. A UNIX system administration training course might be helpful.
Chapter 1, IPsec (Overview) provides an overview of IP Security Architecture. IPsec provides protection for IP datagrams.
Chapter 2, Administering IPsec (Task) provides procedures for implementing IPsec on your network.
Chapter 3, Internet Key Exchange (Overview) provides an overview of Internet Key Exchange for use with IPsec.
Chapter 4, Internet Key Exchange (Task) provides procedures for implementing IKE.
The Glossary provides definitions of key IP security terms.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the typographic changes used in this book.
Table P–1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 | The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 | What you type, contrasted with on-screen computer output |
machine_name% su Password: |
AaBbCc123 | Command-line placeholder: replace with a real name or value |
To delete a file, type rm filename. |
AaBbCc123 |
Book titles, new words, or terms, or words to be emphasized. |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt | machine_name% |
C shell superuser prompt | machine_name# |
Bourne shell and Korn shell prompt | $ |
Bourne shell and Korn shell superuser prompt | # |