HP CM8000 Practical IPsec Deployment for Printing and Imaging Devices - Page 152

Microsoft Windows: Kerberos Authentication

Page 152 highlights

Enter in the configuration manually. The output of the ktpass command and krb5.conf file can be used here, rather than the files themselves. CAPITALIZATION of the Principal is very important! Okay, those are the two manual methods for configuration Kerberos on Jetdirect. Once we've got that setup, now we need to go back to the Microsoft configuration and setup Kerberos there. Microsoft Windows: Kerberos Authentication Windows XP/2003/Vista/2008: IPv4 IP Security Policies NOTE: The "IP Security Policy Management" MMC Snap-In discussed in the following slides is available on Microsoft XP/2003/Vista/2008. However, it only protects IPv4 and is limited in its choice of IPsec parameters. For Microsoft Vista and Server 2008, the netsh commands or the Advanced Firewall MMC snap in should be used to provide IPv4/IPv6 protection as well as the ability to set more IPsec parameters. Rather than step through the entire Microsoft configuration again, we are going to assume that the user has simply right-clicked on the Policy or Rule that we've previously configured and did a properties view. In the MMC for the "IPsec Policy Manager" snap-in, going to the Authentication Method tab, we simply select Kerberos. Now we are done! 152

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

152
Enter in the
configuration
manually.
The
output of the
ktpass command
and krb5.conf
file can be used
here, rather than
the files
themselves.
CAPITALIZATION
of the Principal is
very important!
Okay, those are the two manual methods for configuration Kerberos on Jetdirect.
Once we’ve got
that setup, now we need to go back to the Microsoft configuration and setup Kerberos there.
Microsoft Windows: Kerberos Authentication
Windows XP/2003/Vista/2008: IPv4 IP Security Policies
NOTE: The “IP Security Policy Management” MMC Snap-In discussed in the following slides is
available on Microsoft XP/2003/Vista/2008.
However, it only protects IPv4 and is limited in its
choice of IPsec parameters.
For Microsoft Vista and Server 2008, the netsh commands or the
Advanced Firewall MMC snap in should be used to provide IPv4/IPv6 protection as well as the
ability to set more IPsec parameters.
Rather than step through the entire Microsoft configuration again, we are going to assume that the
user has simply right-clicked on the Policy or Rule that we’ve previously configured and did a
properties view.
In the MMC for
the “IPsec
Policy
Manager”
snap-in, going
to the
Authentication
Method tab, we
simply select
Kerberos.
Now we are
done!