HP 635n HP Jetdirect Print Server Administrator's Guide (Firmware V.36) - Page 121

IPsec Protocols (Manual Keys), Manual Keys, IPsec Protocols

Page 121 highlights

Table 5-13 Advanced IKE Settings page (continued) Item Description IKE Retries Specify the number of times that IKE protocols are to be retried if a failure occurs. Enter a value from 0 to 20. IKE Retransmit Interval Specify the time (in seconds) between successive IKE protocol retries if a failure occurs. Enter a value from 0 to 5. IPsec Protocols (Manual Keys) Items on the IPsec Protocols page are described below. To use manual keys for key negotiation: 1. Use this page to specify IPsec protocol encryption and authentication methods to use for Security Associations (SA) in this rule. Configuration of manual keys will depend on your selections. 2. Click OK, and proceed to configure the manual keys for this template. Table 5-14 IPsec Protocols (for Manual Keys) page Item Description Encapsulation Type Specify how the IPsec protocols selected (ESP or AH) will be encapsulated: ● Transport (default): Only the user data in each IP packet is protected, the IP packet header is not protected. ● Tunnel: All packet fields are protected, including the IP packet header. Cryptographic Parameters Specify the encryption protocol and settings to be used. ● ESP: Use IPsec Encapsulating Security Payload (ESP) protocol for IP packets. ESP headers are inserted in packets to ensure privacy and integrity of packet contents. Select among the supported encryption methods/strengths and authentication methods to be used for data protection. ● AH: Use IPsec Authentication Header (AH) protocol for IP packets. AH headers are inserted in packets to protect integrity of packet contents through cryptographic checksums. Select among the supported authentication methods. CAUTION: The use of IPsec AH may not function properly in environments that use Network Address Translation (NAT). NOTE: For manual keys, only one authentication method can be selected. ESP authentication cannot be used if AH is enabled. If you enable ESP and AH, you must select an AH authentication method. Manual Keys Items on the Manual Keys page are described below. Use this page to configure encryption keys and Security Associations (SA) manually. Because the applicable hosts will also be manually configured, authentication and dynamic key generation are not needed. Table 5-15 Manual Keys page Item Description SPI Format Choose whether you will use Hexadecimal or Decimal values to specify Security Parameters Index (SPI) entries. ENWW HP Jetdirect IPsec/Firewall Wizard 111

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

Item
Description
IKE Retries
Specify the number of times that IKE protocols are to be retried if a failure occurs. Enter
a value from 0 to 20.
IKE Retransmit Interval
Specify the time (in seconds) between successive IKE protocol retries if a failure occurs.
Enter a value from 0 to 5.
IPsec Protocols (Manual Keys)
Items on the
IPsec Protocols
page are described below. To use manual keys for key negotiation:
1.
Use this page to specify IPsec protocol encryption and authentication methods to use for Security
Associations (SA) in this rule. Configuration of manual keys will depend on your selections.
2.
Click
OK
, and proceed to configure the manual keys for this template.
Table 5-14
IPsec Protocols (for Manual Keys) page
Item
Description
Encapsulation Type
Specify how the IPsec protocols selected (ESP or AH) will be encapsulated:
Transport
(default): Only the user data in each IP packet is protected, the IP
packet header is not protected.
Tunnel
: All packet fields are protected, including the IP packet header.
Cryptographic Parameters
Specify the encryption protocol and settings to be used.
ESP
: Use IPsec Encapsulating Security Payload (ESP) protocol for IP packets.
ESP headers are inserted in packets to ensure privacy and integrity of packet
contents. Select among the supported encryption methods/strengths and
authentication methods to be used for data protection.
AH
: Use IPsec Authentication Header (AH) protocol for IP packets. AH headers
are inserted in packets to protect integrity of packet contents through cryptographic
checksums. Select among the supported authentication methods.
CAUTION:
The use of IPsec AH may not function properly in
environments that use Network Address Translation (NAT).
NOTE:
For manual keys, only one authentication method can be selected.
ESP
authentication cannot be used if
AH
is enabled. If you enable
ESP
and
AH
, you must select an
AH
authentication method.
Manual Keys
Items on the
Manual Keys
page are described below. Use this page to configure encryption keys and
Security Associations (SA) manually. Because the applicable hosts will also be manually configured,
authentication and dynamic key generation are not needed.
Table 5-15
Manual Keys page
Item
Description
SPI Format
Choose whether you will use Hexadecimal or Decimal values to specify Security
Parameters Index (SPI) entries.
Table 5-13
Advanced IKE Settings page (continued)
ENWW
HP Jetdirect IPsec/Firewall Wizard
111