Solaris IPSec with preshared keys


 
Thread Tools Search this Thread
Operating Systems Solaris Solaris BigAdmin RSS Solaris IPSec with preshared keys
# 1  
Old 10-26-2009
Solaris IPSec with preshared keys

This document describes the process to implement transport mode ipsec configuration using the following steps: * assign ipsec policy (ipsecinit.conf) * configure Internet Key Exchange (IKE) daemon (in.iked) (config) * setup preshared key secret (ike.preshared)

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Cybersecurity

IPSEC

hello, after configuration ipsec in ip4 I can not ping between client and server whereas I had success ping before configuration! I also generate different key for AH and ESP as i have shown below. what is my problem and what should i do to have ping and test the configuration? code: ... (0 Replies)
Discussion started by: elinaz
0 Replies

2. UNIX for Advanced & Expert Users

Ipsec implementation

How can i implement Ipsec between two machines in linux_ ubuntu? any link?? suggestion?? (0 Replies)
Discussion started by: elinaz
0 Replies

3. Red Hat

SSH Keys between RHEL 5 and Solaris 10

Hi all Has anyone ever successfully set up ssh key pairs for "passwordless" logins between rhel and Solaris? I've set it up many times before between Solaris systems but i'm having difficulty doing between the two OS's in question. What I have done so far is append the contents of the rhel... (30 Replies)
Discussion started by: notreallyhere
30 Replies

4. Solaris

Connecting Solaris 10 to Cisco PIX with IPsec tunnel

I having problem connecting to a Cisco PIX Log from IKE # /usr/lib/inet/in.iked -f /etc/inet/ike/config -d Jan 16 00:40:57: 2012 (+0800) *** in.iked started *** Jan 16 00:40:57: Loading configuration... Jan 16 00:40:57: Checking lifetimes in "nullrule" Jan 16 00:40:57: Using default value... (0 Replies)
Discussion started by: conandor
0 Replies

5. BSD

Problem on IPSec

Hi, this is my first post...:p Hello Admin :) Can I have an ask for something with my configuration ? I have finished some kind of the tutorial to build ipsec site to site, and the "step" has finished completely. I have a simulation with a local design topology with two PC's (FreeBSD ... (0 Replies)
Discussion started by: aulia
0 Replies

6. Solaris

Clients for Solaris IPSEC tunnel

Hi all, I'm running solaris x86_64 as a home server and am quite happy with it. Currently I'm working with Solaris 10 and 11 express. Typically I tunnel traffic to it via ssh with port forwards, but I'm interested in using the built in IPSEC features that Solaris has. I've setup a solaris... (1 Reply)
Discussion started by: vectox
1 Replies

7. Solaris

Solaris 10 IPSec peformance

Hi, does anyone have an experience how many IPSec tunnels Solaris 10 is able manage. A rough estimation would be great. I know it's hardly dependent on the hardware used, so if anyone says on a 490 with 2 CPUs and 4GB RAM a maximum of 1000 IPSec tunnels is possible, that would be great. I... (1 Reply)
Discussion started by: blombo
1 Replies

8. UNIX for Dummies Questions & Answers

arrow keys / special keys

how to use the arrow keys in shell scripting. is there any special synatax / command for this. i just want to use the arrow keys for navigation. replies appreciated raguram R (3 Replies)
Discussion started by: raguramtgr
3 Replies
Login or Register to Ask a Question
IPSEC_ADDCONN(8)						  [FIXME: manual]						  IPSEC_ADDCONN(8)

NAME
ipsec_addconn - load a given policy into the pluto IKE daemon SYNOPSIS
ipsec addconn --configsetup [--rootdir dir] [--config filename] [--ctlbase socketfile] ipsec addconn --addall [--rootdir dir] [--config filename] [--ctlbase socketfile] [--defaultroute addr] [--defaultroutenexthop addr] ipsec addconn [--rootdir dir] [--config filename] [--ctlbase socketfile] [--defaultroute addr] [--defaultroutenexthop addr] name1 [name2 ..] ipsec addconn [--listroute] [--liststart] [--rootdir dir] [--config filename] [--ctlbase socketfile] ipsec addconn --help DESCRIPTION
ipsec addconn takes a config file (or stdin) containing the format of ipsec.conf, or the format of individual "conn" sections, and uses that information to load named or all connections defined in that configuration file into the running openswan pluto IKE daemon. If no configuration file is specified, the default configuration file is used. If no pluto socket is specified, the default socket location will be used. When --addall is used, all connections defined in the config file will be operated on. Otherwise, only the specified connection names will be affected. When addcon is run, connections that have the auto= option set to add, start or route will be loaded, routed or initiated. If a connection was loaded or initiated already, it will be replaced. When --configsetup is specified, the configuration file is parsed for the config setup section and printed to the terminal usable as a shell script. When --listroute or --liststart is specified, no connections are added or replaced, only shown. This command can be used to verify which connections the addcon command would act upon, without actually performing any action. HISTORY
Man page written for the Xelerance Openswan project <http://www.openswan.org/> by Paul Wouters [FIXME: source] 10/06/2010 IPSEC_ADDCONN(8)