Oki MPS2731mc MC362w/MC562w/MPS2731mc Advanced User Guide (English) - Page 105

IP Filter Description and Mirrored Property

Page 105 highlights

6. Enter a Name and a Description and then click Next. 7. Clear the Activate the default response rule (earlier versions of Windows only). check box and then click Next. 8. Select Edit properties and then click Finish. 9. On the IP security policy properties window, select the General tab. 10. Click Settings. 11. On the Key Exchange Settings window, enter the value (minutes) in Authenticate and generate a new key after every. NOTE Specify the same value as Life time specified in the configuration for "Phase1 Proposal" in "Configuring your machine" on page 104. Although Life time is specified by seconds, enter a value by minutes in this step. 12. Click Methods. 13. On the Key Exchange Security Methods window, click Add. 14. Specify Integrity algorithm, Encryption algorithm, and Diffie-Hellman group. NOTE Select the same value specified in IKE Encryption Algorithm, IKE Hash Algorithm, and Diffie-Hellman group in the configuration for "Phase1 Proposal" in "Configuring your machine" on page 104. 15. Click OK. 16. On the Key Exchange Security Methods window, click OK. 17. On the Key Exchange Settings window, click OK. 18. On the IP security policy properties window, select the Rules tab. 19. Click Add. 20. On the Security Rule Wizard, click Next. 21. On the Tunnel Endpoint screen, make sure that This rule does not specify a tunnel is selected and then click Next. 22. On the Network Type screen, make sure that All network connections is selected and then click Next. 23. On the IP Filter List screen, click Add. 24. On the IP Filter List window, click Add. 25. On the IP Filter Wizard, click Next. 26. On the IP Filter Description and Mirrored Property screen, click Next. 27. On the IP Traffic Source screen, click Next. 28. On the IP Traffic Destination screen, click Next. 29. On the IP Protocol Type screen, click Next. 30. Click Finish. 31. On the IP Filter List wizard, click OK. 32. On the Security Rule Wizard, select the new IP filter from the list and then click Next. 33. On the Filter Action screen, click Add. Advanced network settings > 105

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157

Advanced network settings > 105
6.
Enter a
Name
and a
Description
and then click
Next
.
7.
Clear the
Activate the default response rule (earlier versions of Windows
only).
check box and then click
Next
.
8.
Select
Edit properties
and then click
Finish
.
9.
On the IP security policy properties window, select the
General
tab.
10.
Click
Settings
.
11.
On the
Key Exchange Settings
window, enter the value (minutes) in
Authenticate and generate a new key after every
.
12.
Click
Methods
.
13.
On the
Key Exchange Security Methods
window, click
Add
.
14.
Specify
Integrity algorithm
,
Encryption algorithm
, and
Diffie-Hellman group
.
15.
Click
OK
.
16.
On the
Key Exchange Security Methods
window, click
OK
.
17.
On the
Key Exchange Settings
window, click
OK
.
18.
On the IP security policy properties window, select the
Rules
tab.
19.
Click
Add
.
20.
On the
Security Rule Wizard
, click
Next
.
21.
On the
Tunnel Endpoint
screen, make sure that
This rule does not specify a
tunnel
is selected and then click
Next
.
22.
On the
Network Type
screen, make sure that
All network connections
is
selected and then click
Next
.
23.
On the
IP Filter List
screen, click
Add
.
24.
On the
IP Filter List
window, click
Add
.
25.
On the
IP Filter Wizard
, click
Next
.
26.
On the
IP Filter Description and Mirrored Property
screen, click
Next
.
27.
On the
IP Traffic Source
screen, click
Next
.
28.
On the
IP Traffic Destination
screen, click
Next
.
29.
On the
IP Protocol Type
screen, click
Next
.
30.
Click
Finish
.
31.
On the
IP Filter List
wizard, click
OK
.
32.
On the
Security Rule Wizard
, select the new IP filter from the list and then click
Next
.
33.
On the
Filter Action
screen, click
Add
.
NOTE
Specify the same value as
Life time
specified in the configuration for “Phase1
Proposal” in
“Configuring your machine” on page 104
. Although
Life time
is
specified by seconds, enter a value by minutes in this step.
NOTE
Select the same value specified in
IKE Encryption Algorithm
,
IKE Hash
Algorithm
, and
Diffie-Hellman group
in the configuration for “Phase1
Proposal” in
“Configuring your machine” on page 104
.