Steps for preparing to run IP security

To run IP security, you need to configure the IKE daemon. Each step is described in detail in the corresponding subtopic.

Procedure

Perform the following steps to prepare to run the IKE daemon:

  1. Set the appropriate UNIX System Services parameters.
  2. Authorize the IKE daemon to the external security manager.
  3. Authorize the ipsec command to the external security manager.
  4. Authorize IP security to ICSF/MVS (optional).
  5. Set up the IKE daemon for RSA signature mode authentication (optional).