O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring IPsec on Solaris 8

The IP Security Architecture configuration process includes the following steps:

  • Configuring IPsec Security Associations (ipseckey(1M), /etc/inet/ipseckeys)

  • Configuring IPsec policy (ipsecconf(1M), /etc/inet/ipsecinit.conf)

  • Checking and monitoring IPsec operation

Important Security Notice

IPsec configuration files, /etc/inet/ipseckeys, /etc/inet/ipsecinit.conf, and /etc/inet/ipsecpolicy.conf contain important security information. Unauthorized access to these files might compromise the system’s security. To minimize risks associated with unauthorized access to and/or modification of these files, be sure they are owned by root, are readable only by root, and are never transmitted over the network (over the Network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required