System Administration Guide: IP Services
Previous Next

Protecting a VPN With IPsec (Task Map)

The following table points to procedures that configure IPsec to protect traffic across the Internet. These procedures set up a secure virtual private network (VPN) between two systems that are separated by the Internet. One common use of this technology is to protect traffic between home workers and their corporate office.

Task

Description

For Instructions

Protect tunnel traffic in tunnel mode over IPv4

Protects traffic in tunnel mode between two Solaris Express systems.

Also, protects traffic in tunnel mode between another platform and a Solaris Express system.

How to Protect a VPN With an IPsec Tunnel in Tunnel Mode Over IPv4

Protect tunnel traffic in tunnel mode over IPv6

Protects traffic in tunnel mode between two Solaris systems that are using the IPv6 protocol.

How to Protect a VPN With an IPsec Tunnel in Tunnel Mode Over IPv6

Protect tunnel traffic in transport mode over IPv4

Protects traffic in transport mode between two Solaris Express systems.

Also, protects traffic in transport mode between a system that is running an earlier version of the Solaris OS and a Solaris Express system.

How to Protect a VPN With an IPsec Tunnel in Transport Mode Over IPv4

Protects traffic by using the older syntax. This is useful when you are communicating with a system that is running an earlier version of the Solaris OS. This method simplifies comparing the configuration files on the two systems.

Example 20-11

Protect tunnel traffic in transport mode over IPv6

Protects traffic in transport mode between two Solaris systems that are using the IPv6 protocol.

How to Protect a VPN With an IPsec Tunnel in Transport Mode Over IPv6

Previous Next