HP 635n HP Jetdirect Print Server Administrator's Guide - Page 151

IPsec Rules, IPsec SA Table, Available Network Services

Page 151 highlights

Message Rekeys: IKE Connections OK (1/Q): Description Displays the number of times keys have been regenerated (for example, after a key lifetime setting has been exceeded and then regenerated). Displays the number of successful IPsec connections for both Phase 1 and Quick Mode attempts, separated by a slash (Phase 1 count / Quick Mode count). IPsec Rules This section of the Security page identifies the IPsec Policy of the print server. The IPsec Policy consists of rules that control the security of the traffic received and transmitted by the print server. Rules are configured using an IPsec configuration wizard accessed through the print server's embedded Web server. Up to ten rules can be configured. The heading of this section will indicate the default rule for IPsec traffic: ■ Pass: The default IPsec rule is configured to allow all non-IPsec traffic. ■ Drop: The default IPsec rule is configured to drop all non-IPsec traffic. For each rule configured, the names of the IP address template, service template, and IPsec template that define the rule will be displayed. For more information, see IPsec Configuration. IPsec SA Table The IPsec SA Table lists the Security Associations (SA) of cached IPsec sessions between two hosts. While the number of active sessions may be large, the number of security associations listed in the table is limited to eight. Table 8-15 IPsec Security Associations Message SA Pair #: Protocol: SRC: DST: In: Out: Dropped: Description A table entry number for a Security Association pair. Up to eight entries will be displayed. Displays the protocol used by the hosts: TCP, UDP, or ICMP. Displays the IP address of the host that initiates the IPsec traffic. Displays the IP address of the host that receives the IPsec traffic. Displays the number of IPsec packets received, transmitted, or dropped by the print server. Available Network Services This section of the Security page is used to list the well-known ports of Jetdirect services being accessed. A remote port is one associated with a remote client application, while a local port identifies a service and port number on the HP Jetdirect print server. In addition, a port may be identified as secure or not secure depending on the IPsec policy configuration. ENWW Security Configuration Page 141

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

Message
Description
Rekeys:
Displays the number of times keys have been regenerated (for example, after a key
lifetime setting has been exceeded and then regenerated).
IKE Connections OK (1/Q):
Displays the number of successful IPsec connections for both Phase 1 and Quick
Mode attempts, separated by a slash (Phase 1 count / Quick Mode count).
IPsec Rules
This section of the Security page identifies the IPsec Policy of the print server. The IPsec Policy
consists of rules that control the security of the traffic received and transmitted by the print server.
Rules are configured using an IPsec configuration wizard accessed through the print server's
embedded Web server. Up to ten rules can be configured.
The heading of this section will indicate the default rule for IPsec traffic:
Pass
: The default IPsec rule is configured to allow all non-IPsec traffic.
Drop
: The default IPsec rule is configured to drop all non-IPsec traffic.
For each rule configured, the names of the IP address template, service template, and IPsec
template that define the rule will be displayed. For more information, see
IPsec
Configuration
.
IPsec SA Table
The IPsec SA Table lists the Security Associations (SA) of cached IPsec sessions between two
hosts. While the number of active sessions may be large, the number of security associations listed
in the table is limited to eight.
Table 8-15
IPsec Security Associations
Message
Description
SA Pair #:
A table entry number for a Security Association pair. Up to eight entries will be
displayed.
Protocol:
Displays the protocol used by the hosts: TCP, UDP, or ICMP.
SRC:
Displays the IP address of the host that initiates the IPsec traffic.
DST:
Displays the IP address of the host that receives the IPsec traffic.
In:
Out:
Dropped:
Displays the number of IPsec packets received, transmitted, or dropped by the print
server.
Available Network Services
This section of the Security page is used to list the well-known ports of Jetdirect services being
accessed. A remote port is one associated with a remote client application, while a local port
identifies a service and port number on the HP Jetdirect print server. In addition, a port may be
identified as secure or not secure depending on the IPsec policy configuration.
ENWW
Security Configuration Page
141