IP security policy configuration

This topic describes the general steps for creating IP security policy configuration files for the most common configurations. Configuring a complete and specific IP security policy that meets the needs of any installation is beyond the scope of this text, but guidance for more advanced configurations is provided.

Overview of configuring IP security policy describes the common IP security configuration file, the stack-specific IP security configuration file, and the general content, structure, and use of these files.

Component policies of IP security policy configuration files describes the types of policies contained in IP security policy configuration files.

Steps for configuring IP security policy describes the steps for manually creating IP security policy configuration files.

Quick start using IP filtering and IPSec host-to-host describes a complete IP security policy allowing connections from a secure server to an administrative machine on an internal network, and represents the minimum configuration needed to provide IPSec protection with dynamic key management between two hosts. This topic also describes the use of the ipsec command to display filters and Security Associations.

Configuring specific security models provides more examples and describes the configuration needed for common security models.