HP 635n HP Jetdirect Print Server Administrator's Guide - Page 113

IKEv1 Phase 1 (Authentication), Table 5-6

Page 113 highlights

Table 5-6 Create IPsec Template page Item IPsec Template Name Description Enter a name for a custom IPsec template in the edit box. This name will be added to the Step 3-Specify IPsec Template page. NOTE The IPsec policy template name must be unique for all IPsec policy templates. Authentication Type Hosts specified in the Address template must negotiate IPsec security settings during a session. During negotiation, authentication must occur to validate sender/ receiver identities. Select one of the following authentication types. Dynamic Keys: Use Internet Key Exchange (IKE) protocols for authentication and encryption and to create Security Associations . You must select one of the following methods: ■ Pre-Shared Key: Enter a pre-shared key (ASCII string) that is shared by all hosts specified by this rule. If a pre-shared key is used, it should be protected; any host that knows this key may be authenticated. ■ Certificates: Certificates may be used for authentication. A self-signed Jetdirect certificate is pre-installed by factory default, and can be replaced. In addition, a CA certificate must be installed for server authentication. For information on requesting, configuring and installing certificates, see Configuring Certificates. After selecting a dynamic key method, you must configure IKE parameters using the IKEv1 Phase 1 (Authentication) page. Manual Keys: Select this option to configure encryption keys and create Security Associations manually through the Manual Keys page. IKEv1 Phase 1 (Authentication) Internet Key Exchange (IKE) is used to create Security Associations dynamically. Use this page to configure SA parameters for authentication and to securely generate IPsec session keys for encryption and hashing algorithms. Items on this page are described below. Table 5-7 IKE Phase 1 (Authentication) page Item Diffie-Hellman Groups SA Lifetime Negotiation Mode Description (Required) A Diffie-Hellman exchange allows a secret key and security services to be securely exchanged between two hosts over an unprotected network. A DiffieHellman group determines the parameters to use during a Diffie-Hellman exchange. Multiple well-known Diffie-Hellman groups are provided and can be selected. Selecting all the groups will result in a single negotiated group. (Required) Specify the lifetime, in seconds, that the keys associated with this Security Association will be valid. (Required) IKE provides two modes of negotiation during an exchange for keys and security services to be used for a Security Association: Main: This mode features identity protection between the hosts and is slower but secure. Aggressive: This mode uses half the message exchanges. It is faster, but less secure than Main mode. ENWW HP Jetdirect IPsec Wizard 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

Table 5-6
Create IPsec Template page
Item
Description
IPsec Template Name
Enter a name for a custom IPsec template in the edit box. This name will be added to
the
Step 3-Specify IPsec Template
page.
NOTE
The IPsec policy template name must be unique for all IPsec policy
templates.
Authentication Type
Hosts specified in the Address template must negotiate IPsec security settings
during a session. During negotiation, authentication must occur to validate sender/
receiver identities. Select one of the following authentication types.
Dynamic Keys
: Use Internet Key Exchange (IKE) protocols for authentication and
encryption and to create Security Associations . You must select one of the following
methods:
Pre-Shared Key
: Enter a pre-shared key (ASCII string) that is shared by all
hosts specified by this rule. If a pre-shared key is used, it should be protected;
any host that knows this key may be authenticated.
Certificates
: Certificates may be used for authentication. A self-signed Jetdirect
certificate is pre-installed by factory default, and can be replaced. In addition, a
CA certificate must be installed for server authentication. For information on
requesting, configuring and installing certificates, see
Configuring
Certificates
.
After selecting a dynamic key method, you must configure IKE parameters using the
IKEv1 Phase 1 (Authentication)
page.
Manual Keys
: Select this option to configure encryption keys and create Security
Associations manually through the
Manual Keys
page.
IKEv1 Phase 1 (Authentication)
Internet Key Exchange (IKE) is used to create Security Associations dynamically. Use this page to
configure SA parameters for authentication and to securely generate IPsec session keys for
encryption and hashing algorithms. Items on this page are described below.
Table 5-7
IKE Phase 1 (Authentication) page
Item
Description
Diffie-Hellman Groups
(Required) A Diffie-Hellman exchange allows a secret key and security services to
be securely exchanged between two hosts over an unprotected network. A Diffie-
Hellman group determines the parameters to use during a Diffie-Hellman exchange.
Multiple well-known Diffie-Hellman groups are provided and can be selected.
Selecting all the groups will result in a single negotiated group.
SA Lifetime
(Required) Specify the lifetime, in seconds, that the keys associated with this
Security Association will be valid.
Negotiation Mode
(Required) IKE provides two modes of negotiation during an exchange for keys and
security services to be used for a Security Association:
Main: This mode features identity protection between the hosts and is slower but
secure.
Aggressive: This mode uses half the message exchanges. It is faster, but less
secure than Main mode.
ENWW
HP Jetdirect IPsec Wizard
103