HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 172

Summary

Page 172 highlights

Oh - we better enable IPsec on the WJA10 server pretty quick - otherwise, WJA10 won't be able to communicate with Jetdirect anymore! All done with WJA10 and IPsec configuration! Here is what WJA10 configured for a user object in AD for Jetdirect so you know what it looks like. In AD users and computers, for the OU Printers, we can see the user object that was created. Summary We've sure covered a lot of material! HP hopes that this whitepaper has helped to clarify IPsec and shown you how to use IPsec to your advantage. It is important to remember that IPsec is a technology that can be used to correctly implement a security policy. IPsec doesn't solve all problems around security, but it can definitely solve some types of problems better than others. If you've determined that IPsec can help you implement a security policy, the next thing to focus on is how IPsec will be managed. IPsec gives you plenty of flexibility to make IPsec policy management an almost impossible job. Use the guidelines in this whitepaper to give you a start on some of the things to consider regarding IPsec policy management. Great security starts with being an easy and continuous process for everyone! 172

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

172
Oh – we better
enable IPsec on
the WJA10
server pretty
quick –
otherwise,
WJA10 won’t
be able to
communicate
with Jetdirect
anymore!
All done with WJA10 and IPsec configuration!
Here is what WJA10 configured for a user object in
AD for Jetdirect so you know what it looks like.
In AD users and
computers, for
the OU Printers,
we can see the
user object that
was created.
Summary
We’ve sure covered a lot of material!
HP hopes that this whitepaper has helped to clarify IPsec and
shown you how to use IPsec to your advantage.
It is important to remember that IPsec is a technology
that can be used to correctly implement a security policy.
IPsec doesn’t solve all problems around
security, but it can definitely solve some types of problems better than others.
If you’ve determined
that IPsec can help you implement a security policy, the next thing to focus on is how IPsec will be
managed.
IPsec gives you plenty of flexibility to make IPsec policy management an almost impossible
job.
Use the guidelines in this whitepaper to give you a start on some of the things to consider
regarding IPsec policy management.
Great security starts with being an easy and continuous process
for everyone!