Hallo, dies ist ein Test.
PWD: /www/data-lst1/unixsoft/unixsoft/kaempfer/.public_html
Running in File Mode
Relative path: ./../../../../../../etc/inet/ipsecinit.sample
Real path: /etc/inet/ipsecinit.sample
Zurück
# # Copyright (c) 2001, 2016, Oracle and/or its affiliates. All rights reserved. # # This is a sample IPsec configuration file. To configure IPsec policy # modify this file and copy it to /etc/inet/ipsecinit.conf. The policy won't # be activated until the IPsec policy service is restarted: # # svcadm restart svc:/network/ipsec/policy:default # # The file contains only IPsec policy directives. Any policy rule that # uses encryption (encr_algs ..) and/or authentication (encr_auth_algs ... or # auth_algs ...) will require keying material to operate. The recommended way # of providing keying material for IPsec is to configure IKE. See ike.config(5) # for more details or /etc/inet/ike/config.sample for a simple example. # # In the following simple example, outbound network traffic between the local # host and a remote host will be encrypted. Inbound network traffic between # these addresses is required to be encrypted as well. # # This example assumes that 10.0.0.1 is the IPv4 address of this host (laddr) # and 10.0.0.2 is the IPv4 address of the remote host (raddr). # {laddr 10.0.0.1 raddr 10.0.0.2} ipsec {encr_algs aes encr_auth_algs sha256 sa shared} # The policy syntax supports IPv4 and IPv6 addresses as well as symbolic names. # Refer to the ipsecconf(8) man page for warnings on using symbolic names and # many more examples, configuration options and supported algorithms. # # This example assumes that 10.0.0.1 is the IPv4 address of this host (laddr) # and 10.0.0.2 is the IPv4 address of the remote host (raddr). # # The remote host will also need an IPsec (and IKE) configuration that mirrors # this one. # # The following line will allow ssh(1) traffic to pass without IPsec protection: {lport 22 dir both} bypass {} # # {laddr 10.0.0.1 dir in} drop {} # # Uncommenting the above line will drop all network traffic to this host unless # it matches the rules above. Leaving this rule commented out will allow # network packets that does not match the above rules to pass up the IP # network stack. # # The ipsecconf(8) man page describes rule precedence.