HP 635n HP Jetdirect Print Server Administrator's Guide - Page 114

IPsec Protocols, After authentication

Page 114 highlights

Table 5-7 IKE Phase 1 (Authentication) page (continued) Item Description Security Methods (Required) Select the Encryption methods and strengths and Hash methods to be used. Selecting all the methods will result in a single negotiated method. Perfect Forward Secrecy When secret keys are periodically replaced, Perfect Forward Secrecy (PFS) indicates that the new keys are independently derived and unrelated to the prior keys. This helps to ensure that data protected by the new keys is secure. While PFS provides additional security, it requires additional processing overhead. If PFS is desired, enable the following: Identity Perfect Forward Secrecy (Master PFS): Enables PFS for identity protection. Key Perfect Forward Secrecy (Session PFS): Enables PFS for key protection. Diffie-Hellman Groups: (For Session PFS only) Select one or more Diffie-Hellman groups to use during the key exchange. Replay detection IPsec protocols support anti-replay services. Enable or disable the IPsec anti-replay algorithm. IKE Retries Specify the number of times that IKE protocols are to be retried if a failure occurs. Enter a value from 0 to 20. IKE Retransmit Interval Specify the time (in seconds) between successive IKE protocol retries if a failure occurs. Enter a value from 0 to 5. IPsec Protocols After authentication, this page is used to specify IPsec protocols and associated encryption to use for Security Associations in this rule. Item ESP AH Description Use IPsec Encapsulating Security Payload (ESP) protocol for IP packets. ESP headers are inserted in packets to ensure privacy and integrity of packet contents. Select among the supported encryption methods/strengths and Hash methods to be used for data protection. Use IPsec Authentication Header (AH) protocol for IP packets. AH headers are inserted in packets to protect integrity of packet contents through cryptographic checksums. Select among the supported Hash methods. Encapsulation Type CAUTION The use of IPsec AH may not function properly in environments that use Network Address Translation (NAT). Specify how the IPsec protocols selected (ESP or AH) will be encapsulated: ■ Transport: Only the user data in each IP packet is protected, the IP packet header is not protected. ■ Tunnel: All packet fields are protected, including the IP packet header. SA Lifetime Specify the Security Association lifetime, either in seconds or in the number of Kbytes. Within the limits specified, shorter lifetimes will provide improved security depending on the frequency of SA use. 104 Chapter 5 IPsec Configuration ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

Item
Description
Security Methods
(Required) Select the Encryption methods and strengths and Hash methods to be
used.
Selecting all the methods will result in a single negotiated method.
Perfect Forward Secrecy
When secret keys are periodically replaced, Perfect Forward Secrecy (PFS)
indicates that the new keys are independently derived and unrelated to the prior
keys. This helps to ensure that data protected by the new keys is secure. While PFS
provides additional security, it requires additional processing overhead.
If PFS is desired, enable the following:
Identity Perfect Forward Secrecy (Master PFS): Enables PFS for identity protection.
Key Perfect Forward Secrecy (Session PFS): Enables PFS for key protection.
Diffie-Hellman Groups: (For Session PFS only) Select one or more Diffie-Hellman
groups to use during the key exchange.
Replay detection
IPsec protocols support anti-replay services. Enable or disable the IPsec anti-replay
algorithm.
IKE Retries
Specify the number of times that IKE protocols are to be retried if a failure occurs.
Enter a value from 0 to 20.
IKE Retransmit Interval
Specify the time (in seconds) between successive IKE protocol retries if a failure
occurs. Enter a value from 0 to 5.
IPsec Protocols
After authentication, this page is used to specify IPsec protocols and associated encryption to use for
Security Associations in this rule.
Item
Description
ESP
Use IPsec Encapsulating Security Payload (ESP) protocol for IP packets. ESP
headers are inserted in packets to ensure privacy and integrity of packet contents.
Select among the supported encryption methods/strengths and Hash methods to be
used for data protection.
AH
Use IPsec Authentication Header (AH) protocol for IP packets. AH headers are
inserted in packets to protect integrity of packet contents through cryptographic
checksums. Select among the supported Hash methods.
CAUTION
The use of IPsec AH may not function properly in environments
that use Network Address Translation (NAT).
Encapsulation Type
Specify how the IPsec protocols selected (ESP or AH) will be encapsulated:
Transport: Only the user data in each IP packet is protected, the IP packet
header is not protected.
Tunnel: All packet fields are protected, including the IP packet header.
SA Lifetime
Specify the Security Association lifetime, either in seconds or in the number of
Kbytes. Within the limits specified, shorter lifetimes will provide improved security
depending on the frequency of SA use.
Table 5-7
IKE Phase 1 (Authentication) page (continued)
104
Chapter 5
IPsec Configuration
ENWW