HP 630n HP Jetdirect Print Servers - Administrator's Guide - Page 118

IKEv1 Phase 1 (Authentication), IKEv1 Phase 2 / Quick Mode (IPsec Protocols)

Page 118 highlights

Table 5-10 Kerberos Settings page (continued) Item Description A unique principal name is associated with each Kerberos account. For the HP Jetdirect print server active directory account, the principal is the user name for the print server. A Kerberos realm is similar in concept to a Windows domain and contains all the users, computers and services within a Kerberos installation. The realm is case-sensitive, and is typically the DNS domain name specified in all uppercase characters. For example, if the domain name is hp.com, the realm is HP.COM. Password Password for the HP Jetdirect account configured on active directory. Encryption Type Encryption type supported by the HP Jetdirect print server. Key Version Number Version number for the encryption keys associated with the principal and password. Clock Skew Clock skew is a measure of allowed differences between clocks during transactions. A Kerberos installation uses clocks that are reasonably synchronized. When the HP Jetdirect print server checks time stamps of incoming packets from clients, the clock skew specifies the time interval (in seconds) within which the HP Jetdirect print server accepts a packet. If the time interval is exceeded, the packet is discarded. NOTE: Timing differences between the HP Jetdirect print server and a domain controller depends on the clock skew configuration on the domain controller. Time Sync Period Time interval (in minutes) that the HP Jetdirect print server requests to synchronize its clock with an SNTP time server. SNTP Server FQDN or IP address of an SNTP time server, if required. By default, the SNTP server is the server used as the KDC. IKEv1 Phase 1 (Authentication) Use IKE to create security associations dynamically. Configure SA parameters for authentication and to securely generate IPsec session keys for encryption and authentication algorithms. Items on this page are described in the following table. Table 5-11 IKE Phase 1 (Authentication) page Item Description Negotiation Mode (Required) IKE provides two modes of negotiation during an exchange for keys and security services to be used for a Security Association: Main Uses identity protection between the hosts. This method is slower but secure. Aggressive Uses half the message exchanges. It is faster, but less secure. Cryptographic Parameters (Required) Diffie-Hellman Groups Allows a secret key and security services to be securely exchanged between two hosts over an unprotected network. A Diffie-Hellman group determines the parameters to use during a Diffie-Hellman exchange. Multiple well-known Diffie-Hellman groups are listed. To change the entries in the list, click Edit. Selecting all the groups results in a single negotiated group. Encryption and Authentication (Required) Encryption methods and strengths, and the authentication methods to use. Selecting all the methods results in a single negotiated method. Security Association (Required) IKEv1 Phase 2 / Quick Mode (IPsec Protocols) Items on this page are described in the following table. 108 Chapter 5 IPsec/Firewall configuration (V.38.xx) ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

Item
Description
A unique
principal
name is associated with each Kerberos account. For the HP Jetdirect
print server active directory account, the principal is the user name for the print server.
A Kerberos realm is similar in concept to a Windows domain and contains all the users,
computers and services within a Kerberos installation. The realm is case-sensitive, and
is typically the DNS domain name specified in all uppercase characters. For example,
if the domain name is hp.com, the realm is HP.COM.
Password
Password for the HP Jetdirect account configured on active directory.
Encryption Type
Encryption type supported by the HP Jetdirect print server.
Key Version Number
Version number for the encryption keys associated with the principal and password.
Clock Skew
Clock skew is a measure of allowed differences between clocks during transactions. A
Kerberos installation uses clocks that are reasonably synchronized. When the
HP Jetdirect print server checks time stamps of incoming packets from clients, the clock
skew specifies the time interval (in seconds) within which the HP Jetdirect print server
accepts a packet. If the time interval is exceeded, the packet is discarded.
NOTE:
Timing differences between the HP Jetdirect print server and a domain
controller depends on the clock skew configuration on the domain controller.
Time Sync Period
Time interval (in minutes) that the HP Jetdirect print server requests to synchronize its
clock with an SNTP time server.
SNTP Server
FQDN or IP address of an SNTP time server, if required. By default, the SNTP server
is the server used as the KDC.
IKEv1 Phase 1 (Authentication)
Use IKE to create security associations dynamically. Configure SA parameters for authentication and
to securely generate IPsec session keys for encryption and authentication algorithms. Items on this
page are described in the following table.
Table 5-11
IKE Phase 1 (Authentication) page
Item
Description
Negotiation Mode
(Required) IKE provides two modes of negotiation during an exchange for keys and
security services to be used for a Security Association:
Main
Uses identity protection between the hosts. This method is slower but secure.
Aggressive
Uses half the message exchanges. It is faster, but less secure.
Cryptographic Parameters
(Required)
Diffie-Hellman Groups
Allows a secret key and security services to be
securely exchanged between two hosts over an unprotected network. A Diffie-Hellman
group determines the parameters to use during a Diffie-Hellman exchange. Multiple
well-known Diffie-Hellman groups are listed. To change the entries in the list, click
Edit
. Selecting all the groups results in a single negotiated group.
Encryption
and
Authentication
(Required) Encryption methods and strengths, and the authentication methods to use.
Selecting all the methods results in a single negotiated method.
Security Association
(Required)
IKEv1 Phase 2 / Quick Mode (IPsec Protocols)
Items on this page are described in the following table.
Table 5-10
Kerberos Settings page (continued)
108
Chapter 5
IPsec/Firewall configuration (V.38.xx)
ENWW