Go to main content

Securing the Network in Oracle® Solaris 11.4

Exit Print View

Updated: January 2019
 
 
Chapter 8

About Internet Key Exchange

For instructions on implementing the latest version of the IKE protocol, see Configuring IKEv2. To continue to use IKEv1, see Configuring IKEv1. For reference information, see IPsec and Key Management Reference. For information about IPsec, see About IP Security Architecture.