Document Information
Preface
Part I TCP/IP Administration
1. Solaris TCPIP Protocol Suite (Overview)
2. Planning an IPv4 Addressing Scheme (Tasks
3. Planning an IPv6 Addressing Scheme (Overview)
4. Planning an IPv6 Network (Tasks)
5. Configuring TCP/IP Network Services and IPv4 Addressing (Tasks)
6. Administering Network Interfaces (Tasks)
7. Enabling IPv6 on a Network (Tasks)
8. Administering a TCP/IP Network (Tasks)
9. Troubleshooting Network Problems (Tasks)
10. TCP/IP and IPv4 in Depth (Reference)
11. IPv6 in Depth (Reference)
Part II DHCP
12. About Solaris DHCP (Overview)
13. Planning for DHCP Service (Tasks)
14. Configuring the DHCP Service (Tasks)
15. Administering DHCP (Tasks)
16. Configuring and Administering DHCP Clients
17. Troubleshooting DHCP (Reference)
18. DHCP Commands and Files (Reference)
Part III IP Security
19. IP Security Architecture (Overview)
What's New in IPsec?
Introduction to IPsec
IPsec Packet Flow
IPsec Security Associations
IPsec Protection Mechanisms
IPsec Protection Policies
Transport and Tunnel Modes in IPsec
Virtual Private Networks and IPsec
IPsec and NAT Traversal
IPsec and SCTP
IPsec and Solaris Zones
Changes to IPsec for the Solaris 10 Release
20. Configuring IPsec (Tasks)
21. IP Security Architecture (Reference)
22. Internet Key Exchange (Overview)
23. Configuring IKE (Tasks)
24. Internet Key Exchange (Reference)
25. Solaris IP Filter (Overview)
26. Solaris IP Filter (Tasks)
Part IV Mobile IP
27. Mobile IP (Overview)
28. Administering Mobile IP (Tasks)
29. Mobile IP Files and Commands (Reference)
Part V IPMP
30. Introducing IPMP (Overview)
31. Administering IPMP (Tasks)
Part VI IP Quality of Service (IPQoS)
32. Introducing IPQoS (Overview)
33. Planning for an IPQoS-Enabled Network (Tasks)
34. Creating the IPQoS Configuration File (Tasks)
35. Starting and Maintaining IPQoS (Tasks)
36. Using Flow Accounting and Statistics Gathering (Tasks)
37. IPQoS in Detail (Reference)
Glossary
Index
|
IPsec Utilities and Files
Table 19-3 describes the files and commands that are used to configure and manage
IPsec. For completeness, the table includes key management files and commands.
Table 19-3 List of Selected IPsec Files and CommandsIPsec Utility or File |
Description |
Man Page |
/etc/inet/ipsecinit.conf file |
IPsec policy file. If this file exists,
IPsec is activated at boot time. |
ipsecconf(1M) |
ipsecconf command |
IPsec policy command. The boot scripts use
ipsecconf to read the /etc/inet/ipsecinit.conf file and activate IPsec. Useful for viewing and modifying
the current IPsec policy, and for testing. |
ipsecconf(1M) |
PF_KEY socket interface |
Interface for security associations
database (SADB). Handles manual key management and automatic key management. |
pf_key(7P) |
ipseckey command |
IPsec security associations
(SAs) keying command. ipseckey is a command-line front end to the PF_KEY interface.
ipseckey can create, destroy, or modify SAs. |
ipseckey(1M) |
/etc/inet/secret/ipseckeys file |
Keys for IPsec SAs. If
the ipsecinit.conf file exists, the ipseckeys file is automatically read at boot time. |
|
ipsecalgs command |
IPsec
algorithms command. Useful for viewing and modifying the list of IPsec algorithms and
their properties. |
ipsecalgs(1M) |
/etc/inet/ipsecalgs file |
Contains the configured IPsec protocols and algorithm definitions. This file is
managed by the ipsecalgs utility and must never be edited manually. |
|
/etc/inet/ike/config file |
IKE configuration
and policy file. If this file exists, the IKE daemon, in.iked, provides automatic
key management. The management is based on rules and global parameters in the
/etc/inet/ike/config file. See IKE Utilities and Files. |
ike.config(4) |
|