To run IP security, you need to configure the IKE daemon.
Each step is described in detail in the corresponding subtopic.
Procedure
Perform the following steps to prepare to run the IKE
daemon:
- Set the appropriate UNIX System
Services parameters.
- Authorize the IKE daemon to the external security manager.
- Authorize the ipsec command to the external
security manager.
- Authorize IP security to ICSF/MVS (optional).
- Set up the IKE daemon for RSA signature mode authentication
(optional).