HP 630n HP Jetdirect Print Servers - Administrator's Guide - Page 119

Advanced IKE Settings, IKEv1 Phase 2 / Quick Mode Settings IPsec Protocols

Page 119 highlights

Table 5-12 IKEv1 Phase 2 / Quick Mode Settings (IPsec Protocols) page Item Description Encapsulation Type Specify how the selected IPsec protocols (ESP or AH) are encapsulated: ● Transport (default) Protect only the user data in each IP packet. Do not protect the IP packet header. ● Tunnel Protect all packet fields, including the header. Cryptographic Parameters Set the encryption methods and strengths, and the authentication methods used: ● ESP IPsec encapsulating security payload (ESP) protocol for IP packets. ESP headers are inserted in packets to ensure privacy and integrity of packet contents. Select among the supported encryption methods and strengths and the authentication methods to use for data protection. ● AH IPsec authentication header (AH) protocol for IP packets. AH headers are inserted in packets to protect integrity of packet contents through cryptographic checksums. Select among the supported authentication methods. CAUTION: IPsec AH might not function properly in environments that use network address translation (NAT). NOTE: You cannot use ESP authentication if AH is enabled. If you enable ESP and AH, you must select AH authentication methods. Security Association SA Lifetime Security association lifetime in seconds, the number of kilobytes (KB), or both. Within the limits specified, shorter lifetimes provide improved security depending on the frequency of SA use. Set to zero (0) to disable. Advanced IKE Settings Configure advanced IKE settings. Advanced IKE Settings The Advanced IKE Settings page contains the configuration settings described in the following table. Table 5-13 Advanced IKE Settings page Item Description Replay Detection Set the IPsec anti-replay algorithm. IPsec protocols support anti-replay services to prevent message interception for later use, such as attempting to gain access to resources. Key Perfect Forward Secrecy (Session PFS) Set session perfect forward secrecy (PFS) for key protection. When secret keys are periodically replaced, PFS indicates that the new keys are independently derived and unrelated to the prior keys. This can ensure that data protected by the new keys is secure. While PFS provides additional security, it requires additional processing overhead. Diffie-Hellman Groups (For Session PFS only) Multiple well-known Diffie-Hellman groups that can be used are listed. To change the entries in the list, click Edit. IKE Retries Number of times to retry IKE protocols if a failure occurs. Enter a value from 0 to 20. IKE Retransmit Interval Time (in seconds) between successive IKE protocol retries if a failure occurs. Enter a value from 0 to 5. ENWW HP Jetdirect IPsec/Firewall wizard 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

Table 5-12
IKEv1 Phase 2 / Quick Mode Settings (IPsec Protocols) page
Item
Description
Encapsulation Type
Specify how the selected IPsec protocols (ESP or AH) are encapsulated:
Transport
(default) Protect only the user data in each IP packet. Do not protect
the IP packet header.
Tunnel
Protect all packet fields, including the header.
Cryptographic Parameters
Set the encryption methods and strengths, and the authentication methods used:
ESP
IPsec encapsulating security payload (ESP) protocol for IP packets. ESP
headers are inserted in packets to ensure privacy and integrity of packet contents.
Select among the supported encryption methods and strengths and the
authentication methods to use for data protection.
AH
IPsec authentication header (AH) protocol for IP packets. AH headers are
inserted in packets to protect integrity of packet contents through cryptographic
checksums. Select among the supported authentication methods.
CAUTION:
IPsec AH might not function properly in environments that use
network address translation (NAT).
NOTE:
You cannot use
ESP
authentication if
AH
is enabled. If you enable
ESP
and
AH
, you must select
AH
authentication methods.
Security Association
SA Lifetime
Security association lifetime in seconds, the number of kilobytes (KB), or
both. Within the limits specified, shorter lifetimes provide improved security depending
on the frequency of SA use.
Set to zero (0) to disable.
Advanced IKE Settings
Configure advanced IKE settings.
Advanced IKE Settings
The
Advanced IKE Settings
page contains the configuration settings described in the following
table.
Table 5-13
Advanced IKE Settings page
Item
Description
Replay Detection
Set the IPsec anti-replay algorithm. IPsec protocols support anti-replay services to
prevent message interception for later use, such as attempting to gain access to
resources.
Key Perfect Forward Secrecy
(Session PFS)
Set session perfect forward secrecy (PFS) for key protection. When secret keys are
periodically replaced, PFS indicates that the new keys are independently derived and
unrelated to the prior keys. This can ensure that data protected by the new keys is
secure. While PFS provides additional security, it requires additional processing
overhead.
Diffie-Hellman Groups
(For Session PFS only) Multiple well-known Diffie-Hellman
groups that can be used are listed. To change the entries in the list, click
Edit
.
IKE Retries
Number of times to retry IKE protocols if a failure occurs. Enter a value from 0 to 20.
IKE Retransmit Interval
Time (in seconds) between successive IKE protocol retries if a failure occurs. Enter a
value from 0 to 5.
ENWW
HP Jetdirect IPsec/Firewall wizard
109