Go to main content

Securing the Network in Oracle® Solaris 11.4

Exit Print View

Updated: January 2019

Configuring IKEv1

You can use preshared keys, self-signed certificates, and certificates from a certificate authority (CA) to authenticate IKE. A rule in the ike/config file links the particular IKEv1 authentication method with the IKEv1 peer. Therefore, you can use one or all IKE authentication methods on a system.

After configuring IKEv1, complete the IPsec task in Configuring IPsec that uses the IKEv1 configuration.