| Document Information Preface Part I TCP/IP Administration 1.  Solaris TCPIP Protocol Suite (Overview) 2.  Planning an IPv4 Addressing Scheme (Tasks 3.  Planning an IPv6 Addressing Scheme (Overview) 4.  Planning an IPv6 Network (Tasks) 5.  Configuring TCP/IP Network Services and IPv4 Addressing (Tasks) 6.  Administering Network Interfaces (Tasks) 7.  Enabling IPv6 on a Network (Tasks) 8.  Administering a TCP/IP Network (Tasks) 9.  Troubleshooting Network Problems (Tasks) 10.  TCP/IP and IPv4 in Depth (Reference) 11.  IPv6 in Depth (Reference) Part II DHCP 12.  About Solaris DHCP (Overview) 13.  Planning for DHCP Service (Tasks) 14.  Configuring the DHCP Service (Tasks) 15.  Administering DHCP (Tasks) 16.  Configuring and Administering  DHCP Clients 17.  Troubleshooting DHCP (Reference) 18.  DHCP Commands and Files (Reference) Part III IP Security 19.  IP Security Architecture (Overview) What's New in IPsec? Introduction to IPsec IPsec Packet Flow IPsec Security Associations IPsec Protection Mechanisms IPsec Protection Policies Transport and Tunnel Modes in IPsec Virtual Private Networks and IPsec IPsec and NAT Traversal IPsec and SCTP IPsec and Solaris Zones IPsec Utilities and Files 20.  Configuring IPsec (Tasks) 21.  IP Security Architecture (Reference) 22.  Internet Key Exchange (Overview) 23.  Configuring IKE (Tasks) 24.  Internet Key Exchange (Reference) 25.  Solaris IP Filter (Overview) 26.  Solaris IP Filter (Tasks) Part IV Mobile IP 27.  Mobile IP (Overview) 28.  Administering Mobile IP (Tasks) 29.  Mobile IP Files and Commands (Reference) Part V IPMP 30.  Introducing IPMP (Overview) 31.  Administering IPMP (Tasks) Part VI IP Quality of Service (IPQoS) 32.  Introducing IPQoS (Overview) 33.  Planning for an IPQoS-Enabled Network (Tasks) 34.  Creating the IPQoS Configuration File (Tasks) 35.  Starting and Maintaining IPQoS (Tasks) 36.  Using Flow Accounting and Statistics Gathering (Tasks) 37.  IPQoS in Detail (Reference) Glossary Index |       	 
             
Changes to IPsec for the Solaris 10 ReleaseFor a complete listing of new Solaris features and a description of Solaris
releases, see Solaris Express, Developer Edition What’s New. Since the Solaris 9 release, IPsec includes the following functionality: When a Sun Crypto Accelerator 4000 board is attached, the board automatically caches IPsec SAs for packets that use the board's Ethernet interface. The board also accelerates the processing of the IPsec SAs.IPsec can take advantage of automatic key management with IKE over IPv6 networks. For more information, see Chapter 22, Internet Key Exchange (Overview). For new IKE features, see Changes to IKE for the Solaris 10 Release.The parser for theipseckey command provides clearer help. The ipseckey monitor command timestamps each event. For details, see the ipseckey(1M) man page.IPsec algorithms now come from a central storage location, the Solaris cryptographic framework. The ipsecalgs(1M) man page describes the characteristics of the algorithms that are available. The algorithms are optimized for the architecture that they run on. For a description of the framework, see Chapter 12, Solaris Cryptographic Framework (Overview), in System Administration Guide: Security Services.IPsec works in the global zone. IPsec policy is managed in the global zone for a non-global zone. Keying material is created and is managed manually in the global zone for a non-global zone. IKE cannot be used to generate keys for a non-global zone. For more information on zones, see Chapter 16, Introduction to Solaris Zones, in System Administration Guide: Solaris Containers-Resource Management and Solaris Zones.IPsec policy can work with the Streams Control Transmission Protocol (SCTP) and SCTP port number. However, the implementation is not complete. The IPsec extensions for SCTP that are specified in RFC 3554 are not yet implemented. These limitations can cause complications when creating IPsec policy for SCTP. For details, consult the RFCs. Also, read IPsec and SCTP and SCTP Protocol.IPsec and IKE can protect traffic that originates behind a NAT box. For details and limitations, see IPsec and NAT Traversal. For procedures, see Configuring IKE for Mobile Systems (Task Map).
 |