126
C
HAPTER
7: C
ONFIGURING
IP S
ECURITY
11 Enable the default option
This rule does not specify
a tunnel
, and then click
Next
.
The Network Type screen appears.
12 Enable the default option
All network connections
,
and then click
Next
.
The Authentication Methods screen appears.
13 Enable the
Use this string to protect the key
exchange (preshared key):
option, type the
appropriate string text in the entry field, and then
click
Next
.
Creating a Filter
This sequence creates a filter for the policy.
The IP Filter List screen appears.
1 Click
Add
.
A new IP Filter List screen appears.
2 Enter a name for the filter, and then click
Add
.
The IP Filter Wizard starts.
3 Click
Next
.
The IP Traffic Source screen appears.
4 Click
Next
.
The IP Traffic Destination screen appears.
5 Select A Specific IP Address in the pull-down list.
The IP Address entry box appears on the IP Traffic
Destination screen.
6 Enter destination IP address, and then click
Next
.
The IP Protocol Type screen appears.
7 Accept the default, and then click
Next
.
8 Click
Finish
to close the IP Filter Wizard.
9 Click
Close
to close the IP Filter List screen.