Oki MB471 Users Manual Advanced - Page 159

IP Filter Description and, Filter Action General Options

Page 159 highlights

Changing Network Settings From the Web Page 13 On the [Key Exchange Security Methods] window, click [Add]. 14 Specify [Integrity algorithm], [Encryption algorithm], and [DiffieHellman group]. Note  Select the same value that was specified in [IKE Encryption Algorithm], [IKE Hush Algorithm], and [Diffie-Hellman group] at the time of configuration for "Phase1 Proposal" in "Configuring Your Machine" P. 158. 15 Click [OK]. 16 On the [Key Exchange Security Methods] window, click [OK]. 17 On the [Key Exchange Settings] window, click [OK]. 18 On the IP security policy properties window, select the [Rules] tab. 19 Click [Add]. 20 On the [Security Rule Wizard], click [Next]. 21 On the [Tunnel Endpoint] screen, select [This rule does not specify a tunnel and then click [Next]. 22 On the [Network Type] screen, select [All Network Connections] and then click [Next]. 23 On the [IP Filter List] screen, click [Add]. 24 On the [IP Filter List] window, click [Add]. 25 On the [IP Filter Wizard], click [Next]. 26 On the [IP Filter Description and Mirrored Property] screen, click [Next]. 27 On the [IP Traffic Source] screen, click [Next]. 28 On the [IP Traffic Destination] screen, click [Next]. 29 On the [IP Protocol Type] screen, click [Next]. 30 Click [Finish]. 31 On the [IP Filter List] window, click [OK]. 32 On the [Security Rule Wizard], select the new IP filter from the list and then click [Next]. 33 On the [Filter Action] screen, click [Add]. 34 On the [Filter Action Wizard], click [Next]. 35 On the [Filter Action Name] screen, enter a [Name] and a [Description] and then click [Next]. 36 On the [Filter Action General Options] screen, select [Negotiate security] and then click [Next]. 37 On the [Communicating with computers that do not support IPsec] screen, select [Do not allow unsecured communication] and then click [Next]. 38 On the [IP Traffic Security] screen, select[Custom] and then click [Settings]. 39 On the [Custom Security Method Settings] window, configure the settings and then click [OK]. Note  Configure the AH and ESP settings to the same settings as configured for the "Phase2 Proposal" in "Configuring Your Machine" P. 158. 8 40 On the [IP Traffic Security] screen, click [Next]. 41 Select [Edit Properties] and then click [Finish]. 42 On the filter action properties window, select [Use session key perfect forward secrecy (PFS)] if you want to enable Key PFS. 43 Select [Accept unsecured communication, but always respond using IPsec] if you perform IPSec communication by the IPv6 global address. 44 Click [OK]. 45 Select the new filter action and then click [Next]. 46 On the [Authentication Method] screen, select the authentication method you want and then click [Next]. Network Settings - 159 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

Changing Network Settings From the Web Page
- 159 -
Network Settings
8
13
On the [
Key Exchange Security
Methods
] window, click [
Add
].
14
Specify [
Integrity algorithm
],
[
Encryption algorithm
], and [
Diffie-
Hellman group
].
Note
Select the same value that was specified in [
IKE
Encryption Algorithm
], [
IKE Hush Algorithm
],
and [
Diffie-Hellman group
] at the time of
configuration for "Phase1 Proposal" in
"Configuring
Your Machine" P. 158
.
15
Click [
OK
].
16
On the [
Key Exchange Security
Methods
] window, click [
OK
].
17
On the [
Key Exchange Settings
]
window, click [
OK
].
18
On the IP security policy properties
window, select the [
Rules
] tab.
19
Click [
Add
].
20
On the [
Security Rule Wizard
], click
[
Next
].
21
On the [
Tunnel Endpoint
] screen,
select [
This rule does not specify a
tunnel
and then click [
Next
].
22
On the [
Network Type
] screen, select
[
All Network Connections
] and then
click [
Next
].
23
On the [
IP Filter List
] screen, click
[
Add
].
24
On the [
IP Filter List
] window, click
[
Add
].
25
On the [
IP Filter Wizard
], click [
Next
].
26
On the [
IP Filter Description and
Mirrored Property
] screen, click
[
Next
].
27
On the [
IP Traffic Source
] screen, click
[
Next
].
28
On the [
IP Traffic Destination
] screen,
click [
Next
].
29
On the [
IP Protocol Type
] screen, click
[
Next
].
30
Click [
Finish
].
31
On the [
IP Filter List
] window, click
[
OK
].
32
On the [
Security Rule Wizard
], select
the new IP filter from the list and then
click [
Next
].
33
On the [
Filter Action
] screen, click
[
Add
].
34
On the [
Filter Action Wizard
], click
[
Next
].
35
On the [
Filter Action Name
] screen,
enter a [
Name
] and a [
Description
]
and then click [
Next
].
36
On the [
Filter Action General Options
]
screen, select [
Negotiate security
] and
then click [
Next
].
37
On the [
Communicating with
computers that do not support
IPsec
] screen, select [
Do not allow
unsecured communication
] and then
click [
Next
].
38
On the [
IP Traffic Security
] screen,
select[
Custom
] and then click
[
Settings
].
39
On the [
Custom Security Method
Settings
] window, configure the settings
and then click [
OK
].
Note
Configure the AH and ESP settings to the same
settings as configured for the "Phase2 Proposal" in
"Configuring Your Machine" P. 158
.
40
On the [
IP Traffic Security
] screen,
click [
Next
].
41
Select [
Edit Properties
] and then click
[
Finish
].
42
On the filter action properties window,
select [
Use session key perfect
forward secrecy (PFS)
] if you want to
enable Key PFS.
43
Select [
Accept unsecured
communication, but always respond
using IPsec
] if you perform IPSec
communication by the IPv6 global
address.
44
Click [
OK
].
45
Select the new filter action and then click
[
Next
].
46
On the [
Authentication Method
]
screen, select the authentication method
you want and then click [
Next
].