HP 630n HP Jetdirect Print Servers - Administrator's Guide - Page 116

Identity Authentication

Page 116 highlights

Table 5-7 Create IPsec Template page Item Description IPsec Template Name Custom IPsec template name. This name is added to the Specify IPsec Template page. NOTE: The IPsec template name must be unique. Authentication Type Select the authentication type. Hosts specified in the Address template must negotiate IPsec security settings during a session. During negotiation, authentication must occur to validate sender/receiver identities. ● Internet Key Exchange Version 1 (IKEv1) (default) Use Internet key exchange (IKE) protocols for authentication and encryption and to create security associations. ◦ Set IKE Defaults Select a default security profile for IKE operation. Several predefined profiles are provided. To configure a custom security profile, select the Specify Custom Profile option. ◦ Preview IKE Defaults View the settings for a selected IKE default security profile. If you select IKE v1 for authentication and a default security profile, click Next to display the Identity Authentication page. ● Manual Keys Configure IPsec authentication/encryption protocols and keys manually. Click Next to display the IPsec Protocols page. Identity Authentication Use this page to choose an identity authentication method: ● Pre-Shared Key ● Certificates ● Kerberos Identity Authentication page items are described in the following table. Table 5-8 Identity Authentication page Item Description Pre-Shared Key Use a pre-shared key for authentication. Enter a pre-shared key (ASCII string) that is shared by all hosts specified by this rule. If used, it should be protected. Any host that knows this key can be authenticated. Certificates Use certificates for authentication. A self-signed HP Jetdirect certificate is pre-installed by factory default, which you can replace. In addition, you must install a CA certificate for server authentication. ● Status Indicates whether a certificate is installed. ● View Display the certificate data of an installed certificate.. ● Configure Manage or install a certificate. For information on requesting, configuring and installing certificates, see Configure certificates on page 88. Kerberos Use Kerberos authentication. The status is displayed (Configured or Not Configured). 106 Chapter 5 IPsec/Firewall configuration (V.38.xx) ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

Table 5-7
Create IPsec Template page
Item
Description
IPsec Template Name
Custom IPsec template name. This name is added to the
Specify IPsec Template
page.
NOTE:
The IPsec template name must be unique.
Authentication Type
Select the authentication type. Hosts specified in the Address template must negotiate
IPsec security settings during a session. During negotiation, authentication must occur
to validate sender/receiver identities.
Internet Key Exchange Version 1 (IKEv1)
(default) Use Internet key exchange
(IKE) protocols for authentication and encryption and to create security
associations.
Set IKE Defaults
Select a default security profile for IKE operation. Several
predefined profiles are provided. To configure a custom security profile, select
the
Specify Custom Profile
option.
Preview IKE Defaults
View the settings for a selected IKE default security
profile.
If you select IKE v1 for authentication and a default security profile, click
Next
to
display the
Identity Authentication
page.
Manual Keys
Configure IPsec authentication/encryption protocols and keys
manually. Click
Next
to display the
IPsec Protocols
page.
Identity Authentication
Use this page to choose an identity authentication method:
Pre-Shared Key
Certificates
Kerberos
Identity Authentication
page items are described in the following table.
Table 5-8
Identity Authentication page
Item
Description
Pre-Shared Key
Use a pre-shared key for authentication. Enter a pre-shared key (ASCII string) that is
shared by all hosts specified by this rule. If used, it should be protected. Any host that
knows this key can be authenticated.
Certificates
Use certificates for authentication. A self-signed HP Jetdirect certificate is pre-installed
by factory default, which you can replace. In addition, you must install a CA certificate
for server authentication.
Status
Indicates whether a certificate is installed.
View
Display the certificate data of an installed certificate..
Configure
Manage or install a certificate.
For information on requesting, configuring and installing certificates, see
Configure
certificates
on page
88
.
Kerberos
Use Kerberos authentication.
The status is displayed (
Configured
or
Not Configured
).
106
Chapter 5
IPsec/Firewall configuration (V.38.xx)
ENWW