HP 630n HP Jetdirect Print Servers - Administrator's Guide - Page 120

IPsec Protocols (Manual Keys), Manual Keys, IPsec Protocols

Page 120 highlights

IPsec Protocols (Manual Keys) Items on the IPsec Protocols page are described in the following table. To use manual keys for key negotiation, use the following steps: 1. Specify IPsec protocol encryption and authentication methods to use for security associations (SA) in this rule. Configuration of manual keys depends on your selections. 2. Click OK, and then configure the manual keys for this template. Table 5-14 IPsec Protocols (Manual Keys) page Item Description Encapsulation Type Specify how the selected IPsec protocols (ESP or AH) are encapsulated: ● Transport (default): Only the user data in each IP packet is protected, the IP packet header is not protected. ● Tunnel: All packet fields are protected, including the IP packet header. Cryptographic Parameters Set the encryption method/strength and the authentication methods used: ● ESP IPsec encapsulating security payload (ESP) protocol for IP packets. ESP headers are inserted in packets to ensure privacy and integrity of packet contents. Select among the supported encryption methods/strengths and authentication methods to be used for data protection. ● AH IPsec authentication header (AH) protocol for IP packets. AH headers are inserted in packets to protect integrity of packet contents through cryptographic checksums. Select among the supported authentication methods. CAUTION: IPsec AH might not function properly in environments that use network address translation (NAT). NOTE: For manual keys, you can select only one authentication method. You cannot use ESP authentication if AH is enabled. If you enable ESP and AH, you must select an AH authentication method. Manual Keys Items on the Manual Keys page are described in the following table. Use this page to configure encryption keys and Security Associations (SA) manually. Because the applicable hosts are also manually configured, authentication and dynamic key generation are not needed. Table 5-15 Manual Keys page Item Description SPI Format Use hexadecimal or decimal values to specify SPI values. ESP SPI (ESP SPI fields are listed if ESP is enabled on the IPsec Protocols page.) A 32-bit field in an ESP header used to identify the IPsec security association (SA). In Value for an SA to use for packets received by the device. Out Value for an SA to use for packets sent by the device. AH SPI (AH SPI fields are listed if AH is enabled on the IPsec Protocols page.) A 32-bit field in an authentication header used to identify the IPsec SA. In Value for an SA to use for packets received by the device. Out Value for an SA to use for packets sent by the device. 110 Chapter 5 IPsec/Firewall configuration (V.38.xx) ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

IPsec Protocols (Manual Keys)
Items on the
IPsec Protocols
page are described in the following table. To use manual keys for key
negotiation, use the following steps:
1.
Specify IPsec protocol encryption and authentication methods to use for security associations (SA)
in this rule. Configuration of manual keys depends on your selections.
2.
Click
OK
, and then configure the manual keys for this template.
Table 5-14
IPsec Protocols (Manual Keys) page
Item
Description
Encapsulation Type
Specify how the selected IPsec protocols (ESP or AH) are encapsulated:
Transport
(default): Only the user data in each IP packet is protected, the IP
packet header is not protected.
Tunnel
: All packet fields are protected, including the IP packet header.
Cryptographic Parameters
Set the encryption method/strength and the authentication methods used:
ESP
IPsec encapsulating security payload (ESP) protocol for IP packets. ESP
headers are inserted in packets to ensure privacy and integrity of packet contents.
Select among the supported encryption methods/strengths and authentication
methods to be used for data protection.
AH
IPsec authentication header (AH) protocol for IP packets. AH headers are
inserted in packets to protect integrity of packet contents through cryptographic
checksums. Select among the supported authentication methods.
CAUTION:
IPsec AH might not function properly in environments that use
network address translation (NAT).
NOTE:
For manual keys, you can select only one authentication method. You cannot
use
ESP
authentication if
AH
is enabled. If you enable
ESP
and
AH
, you must select
an
AH
authentication method.
Manual Keys
Items on the
Manual Keys
page are described in the following table. Use this page to configure
encryption keys and Security Associations (SA) manually. Because the applicable hosts are also
manually configured, authentication and dynamic key generation are not needed.
Table 5-15
Manual Keys page
Item
Description
SPI Format
Use hexadecimal or decimal values to specify SPI values.
ESP SPI
(ESP SPI fields are listed if ESP is enabled on the
IPsec Protocols
page.) A 32-bit field
in an ESP header used to identify the IPsec security association (SA).
In
Value for an SA to use for packets received by the device.
Out
Value for an SA to use for packets sent by the device.
AH SPI
(AH SPI fields are listed if AH is enabled on the
IPsec Protocols
page.) A 32-bit field
in an authentication header used to identify the IPsec SA.
In
Value for an SA to use for packets received by the device.
Out
Value for an SA to use for packets sent by the device.
110
Chapter 5
IPsec/Firewall configuration (V.38.xx)
ENWW