Steps for preparing to run IP security
To run IP security, you need to configure the IKE daemon. Each step is described in detail in the corresponding subtopic.
Procedure
Perform the following steps to prepare to run the IKE daemon:
- Set the appropriate UNIX System Services parameters.
- Ensure the IKE daemon's user ID has enough system resources.
- Authorize the IKE daemon to the external security manager.
- Authorize the ipsec command to the external security manager.
- Authorize IP security to ICSF (optional).
- Set up the IKE daemon for RSA signature mode authentication (optional).