1.
On the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then
click [Administrative Tools].
2.
Click [Local Security Policy].
3.
Click [IP Security Policies on Local Computer].
4.
In the "Action" menu, click [Create IP Security Policy].
The IP Security Policy Wizard appears.
5.
Click [Next].
6.
Enter a security policy name in "Name", and then click [Next].
7.
Clear the "Activate the default response rule" check box, and then click [Next].
8.
Select "Edit properties", and then click [Finish].
9.
In the "General" tab, click [Advanced].
10.
In "Authenticate and generate a new key after every" enter the same validity period (in
minutes) that is specified on the machine in Encryption Key Auto Exchange Settings Phase
1, and then click [Methods].
11.
Confirm that the combination of hash algorithm (on Windows XP, "Integrity"), the encryption
algorithm (on Windows XP, "Encryption"), and the Diffie-Hellman group settings in "Security
method preference order" match the settings specified on the machine in Encryption Key
Auto Exchange Settings Phase 1.
12.
If the settings are not displayed, click [Add].
13.
Click [OK] twice.
14.
Click [Add] in the "Rules" Tab.
The Security Rule Wizard appears.
15.
Click [Next].
16.
Select "This rule does not specify a tunnel", and then click [Next].
17.
Select the type of network for IPsec, and then click [Next].
18.
Select the "initial authentication method", and then click [Next].
19.
If you select "Certificate" for authentication method in Encryption Key Auto Exchange
Settings on the machine, specify the device certificate. If you select PSK, enter the same PSK
text specified on the machine with the pre-shared key.
20.
Click [Add] in the IP Filter List.
21.
In [Name], enter an IP Filter name, and then click [Add].
The IP Filter Wizard appears.
22.
Click [Next].
23.
Select "My Address" in "Source Address", and then click [Next].
Transmission Using IPsec
135
5
Summary of Contents for Pro C550EX
Page 9: ...INDEX 229 7...
Page 18: ...1 Getting Started 16 1...
Page 68: ...2 Authentication and its Application 66 2...
Page 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Page 96: ...3 Ensuring Information Security 94 3...
Page 104: ...4 Managing Access to the Machine 102 4...
Page 148: ...5 Enhanced Network Security 146 5...
Page 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Page 162: ...6 Specifying the Extended Security Functions 160 6...
Page 180: ...7 Troubleshooting 178 7...
Page 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Page 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Page 233: ...MEMO 231...
Page 234: ...MEMO 232 EN USA D0797508...