HP Jetdirect 640n HP Jetdirect Print Servers 640n and 695n - Administrator's G - Page 117

IPsec/Firewall Policy Table 5-1

Page 117 highlights

Table 5-1 IPsec/Firewall Policy page Item Description Enable IPsec/Firewall or Select the check box to enable your IPsec or Firewall policy. Clear this check box to disable IPsec/Firewall operation. Enable Firewall IPsec/Firewall Rules Configure up to ten rules in descending order of precedence. For example, Rule 1 is higher in precedence than Rule 2. Define each rule using the following fields: ● Enable Select whether a configured rule is enabled or disabled for the policy. ● Address Template Set the IP addresses for which the rule applies. Select among several predefined templates, or specify a custom template. Click on a template entry to view or modify the template configuration. ● Services Template Identify the services for which the rule applies. Select among several predefined templates, or specify a custom template. Click on a template entry to view or modify the template configuration. CAUTION: If the All Services template for a rule is not specified, a security risk can exist. Future networking applications deployed after the IPsec Policy is in place might not be IPsec-protected unless the All Services template is used. For example, installing a third-party Chai service plug-in, or upgrading firmware for the printer or print server, can result in a new service that is not covered by the IPsec policy. Review policies whenever firmware is updated or a new Chai applet is installed. ● Action on Match Define how to process the IP traffic that contains the addresses and services specified. For Firewall operation, the traffic is allowed or dropped, depending on the action specified by the rule. For IPsec operation, the traffic is allowed without IPsec protection, dropped, or IPsec-protected using an IPsec template specified for the rule. Click on a template entry to view or modify the template configuration. Default Rule Indicate whether the default rule drops or allows the traffic. The default rule specifies whether to process IP packets that do not match the configured rules. Select Drop (default) to discard traffic not covered by the configured rules. Select Allow to allow traffic that is not covered by the configured rules. Allowing IP packets that do not match the configured rules is not secure. For an example, see Default Rule example on page 108. Add Rules Select Add Rules to configure rules using the IPsec wizard.. Delete Rules Select Delete Rules to remove one or more rules from the policy. Advanced Configure a Failsafe feature to prevent lock out of the print server over HTTPS (secure Web browser access) during IPsec/Firewall policy set up. You can allow selected multicast and broadcast traffic to bypass your IPsec/Firewall policy. This might be required for device discovery by system installation utilities. ENWW 107

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228

Table 5-1
IPsec/Firewall Policy page
Item
Description
Enable IPsec/Firewall
or
Enable Firewall
Select the check box to enable your IPsec or Firewall policy. Clear this check box to
disable IPsec/Firewall operation.
IPsec/Firewall Rules
Configure up to ten rules in descending order of precedence. For example, Rule 1 is
higher in precedence than Rule 2.
Define each rule using the following fields:
Enable
Select whether a configured rule is enabled or disabled for the policy.
Address Template
Set the IP addresses for which the rule applies. Select
among several predefined templates, or specify a custom template. Click on a
template entry to view or modify the template configuration.
Services Template
Identify the services for which the rule applies. Select
among several predefined templates, or specify a custom template. Click on a
template entry to view or modify the template configuration.
CAUTION:
If the
All Services
template for a rule is not specified, a security
risk can exist. Future networking applications deployed after the IPsec Policy is
in place might not be IPsec-protected unless the
All Services
template is used.
For example, installing a third-party Chai service plug-in, or upgrading firmware
for the printer or print server, can result in a new service that is not covered by
the IPsec policy. Review policies whenever firmware is updated or a new Chai
applet is installed.
Action on Match
Define how to process the IP traffic that contains the
addresses and services specified.
For Firewall operation, the traffic is allowed or dropped, depending on the action
specified by the rule.
For IPsec operation, the traffic is allowed without IPsec protection, dropped, or
IPsec-protected using an IPsec template specified for the rule. Click on a
template entry to view or modify the template configuration.
Default Rule
Indicate whether the default rule drops or allows the traffic. The default rule specifies
whether to process IP packets that do not match the configured rules.
Select
Drop
(default) to discard traffic not covered by the configured rules.
Select
Allow
to allow traffic that is not covered by the configured rules. Allowing IP
packets that do not match the configured rules is not secure.
For an example, see
Default Rule
example
on page
108
.
Add Rules
Delete Rules
Select
Add Rules
to configure rules using the IPsec wizard..
Select
Delete Rules
to remove one or more rules from the policy.
Advanced
Configure a
Failsafe
feature to prevent lock out of the print server over HTTPS
(secure Web browser access) during IPsec/Firewall policy set up.
You can allow selected multicast and broadcast traffic to bypass your IPsec/Firewall
policy. This might be required for device discovery by system installation utilities.
ENWW
107