Current File : //etc/inet/ike/ikev2.config
#
# Copyright (c) 2012, 2013, Oracle and/or its affiliates. All rights reserved.
#

#
# ikev2.config - Configuration file for the IKEv2 daemon
#
# This file should be edited using pfedit(1M) as a user assigned
# "Network IPsec Management" profile. It is not recommended to edit this
# file directly as root. pfedit(1M) will preserve the correct ownership
# of this file as userid "ikeuser".
#
# See rbac(5) for information on assigning a rights profile to delegate
# administrative control.
#
# This file contains a very simple example of a configuration file for
# the IKEv2 daemon. This example will allow the IKEv2 daemon to provide keying
# material between the two hosts shown in the rule below.
#
# Consult the man page for ikev2.config(4) for details or more complicated
# examples.
#
# To enable IKEv2, modify this file to reflect your configuration and
# enable the IKEv2 service:
#
#  svcadm enable svc:/network/ipsec/ike:ikev2
#
# Note: IKE provides keying material for IPsec. The IPsec policy is not
# configured here, see /etc/inet/ipsecinit.sample or ipsecconf(1M). The
# cryptographic algorithms listed in this file are to protect the IKE
# exchanges. They are not necessarily the same as those used by IPsec.
#
#
# Preshared key example
#{
#        label "Example using preshared keys"
#	 auth_method preshared
#        local_addr 10.0.0.1
#        remote_addr 10.0.0.2
#        ikesa_xform { dh_group 14 auth_alg sha256 encr_alg aes }
#}
#
#
# The above rule requires preshared key for authentication.
# Add the following to /etc/inet/ike/ikev2.preshared
#
# For more details, see the ikev2.preshared(4) man page.
#
#{
#	label "Example using preshared keys"
#	key "This is my secret key string"
#}
#
# Certificate example
#{
#	label "Example using certificates"
#
#	auth_method cert
#	# Notice the "DN ="; all certspecs are prepended with "TYPE="
#	local_id EMAIL = "joe@nowhere.net"
#	remote_id DN = "C=US, ST=MA, O=Sun, OU=QA, CN=master"
#	remote_addr 10.0.1.95
#	local_addr 10.0.1.93
#	ikesa_xform { dh_group 21 auth_alg sha512 encr_alg aes }
#}
#
# The above rule requires certificates for authentication.
# Certificates are administered using the ikev2cert(1M) command,
# which operates on the IKEv2 PKCS#11 keystore.  See pkcs11_softtoken(5)
# for details.
#