This chapter describes how to configure the Internet Key Exchange version 2 (IKEv2) for your systems. After IKEv2 is configured and enabled, it automatically generates keying material for the IPsec endpoints that it specifies. This chapter contains the following information:
For overview information about IKE, see Chapter 8, About Internet Key Exchange. For reference information about IKE, see Chapter 12, IPsec and Key Management Reference. For more procedures, see the examples in the ikeadm (1M) , pktool (1) , ikev2cert (1M) , ikev2.config(4), in.ikev2d(1M), and kmfcfg (1) man pages.