JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Securing the Network in Oracle Solaris 11.1     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Using Link Protection in Virtualized Environments

2.  Tuning Your Network (Tasks)

3.  Web Servers and the Secure Sockets Layer Protocol

4.  IP Filter in Oracle Solaris (Overview)

5.  IP Filter (Tasks)

6.  IP Security Architecture (Overview)

7.  Configuring IPsec (Tasks)

8.  IP Security Architecture (Reference)

9.  Internet Key Exchange (Overview)

10.  Configuring IKE (Tasks)

Displaying IKE Information

How to Display Available Groups and Algorithms for Phase 1 IKE Exchanges

Configuring IKE (Task Map)

Configuring IKE With Preshared Keys (Task Map)

Configuring IKE With Preshared Keys

How to Configure IKE With Preshared Keys

How to Update IKE for a New Peer System

Configuring IKE With Public Key Certificates (Task Map)

Configuring IKE With Public Key Certificates

How to Configure IKE With Self-Signed Public Key Certificates

How to Configure IKE With Certificates Signed by a CA

How to Generate and Store Public Key Certificates in Hardware

How to Handle a Certificate Revocation List

Configuring IKE for Mobile Systems (Task Map)

Configuring IKE for Mobile Systems

How to Configure IKE for Off-Site Systems

Configuring IKE to Find Attached Hardware

How to Configure IKE to Find the Sun Crypto Accelerator 6000 Board

11.  Internet Key Exchange (Reference)

Glossary

Index

Displaying IKE Information

You can view the algorithms and groups that can be used in Phase 1 IKE negotiations.

How to Display Available Groups and Algorithms for Phase 1 IKE Exchanges

In this procedure, you determine which Diffie-Hellman groups are available for use in Phase 1 IKE exchanges. You also view the encryption and authentication algorithms that are available for IKE Phase 1 exchanges. The numeric values match the values that are specified for these algorithms by the Internet Assigned Numbers Authority (IANA).

Before You Begin

You must become an administrator who is assigned the Network IPsec Management rights profile. For more information, see How to Use Your Assigned Administrative Rights in Oracle Solaris 11.1 Administration: Security Services.

  1. Display the list of Diffie-Hellman groups that IKE can use in Phase 1.

    Diffie-Hellman groups set up IKE SAs.

    # ikeadm dump groups
    Value Strength Description
    1     66       ietf-ike-grp-modp-768
    2     77       ietf-ike-grp-modp-1024
    5     91       ietf-ike-grp-modp-1536
    14    110      ietf-ike-grp-modp-2048
    15    130      ietf-ike-grp-modp-3072
    16    150      ietf-ike-grp-modp-4096
    17    170      ietf-ike-grp-modp-6144
    18    190      ietf-ike-grp-modp-8192
    
    Completed dump of groups

    You would use one of these values as the argument to the oakley_group parameter in an IKE Phase 1 transform, as in:

    p1_xform
      { auth_method preshared oakley_group 15 auth_alg sha encr_alg aes }
  2. Display the list of authentication algorithms that IKE can use in Phase 1.
    # ikeadm dump authalgs
    Value Name
    1     md5
    2     sha1
    4     sha256
    5     sha384
    6     sha512
    
    Completed dump of authalgs

    You would use one of these names as the argument to the auth_alg parameter in an IKE Phase 1 transform, as in:

    p1_xform
      { auth_method preshared oakley_group 15 auth_alg sha256 encr_alg 3des }
  3. Display the list of encryption algorithms that IKE can use in Phase 1.
    # ikeadm dump encralgs
    Value Name
    3     blowfish-cbc
    5     3des-cbc
    1     des-cbc
    7     aes-cbc
    
    Completed dump of encralgs

    You would use one of these names as the argument to the encr_alg parameter in an IKE Phase 1 transform, as in:

    p1_xform
      { auth_method preshared oakley_group 15 auth_alg sha256 encr_alg aes }

See Also

For tasks to configure IKE rules that require these values, see Configuring IKE (Task Map).