The IP Security Architecture configuration process includes the following steps:
Configuring IPsec Security Associations (ipseckey(1M), /etc/inet/ipseckeys)
Configuring IPsec policy (ipsecconf(1M), /etc/inet/ipsecinit.conf)
Checking and monitoring IPsec operation
Important Security Notice
IPsec configuration files, /etc/inet/ipseckeys, /etc/inet/ipsecinit.conf, and /etc/inet/ipsecpolicy.conf contain important security information. Unauthorized access to these files might compromise the system’s security. To minimize risks associated with unauthorized access to and/or modification of these files, be sure they are owned by root, are readable only by root, and are never transmitted over the network (over the Network ...