24.
Select "A specific IP address" in "Destination Address", enter the machine's IP address, and
then click [Next].
25.
Select the protocol type for IPsec, and then click [Next].
26.
Click [Finish].
27.
Click [OK].
28.
Select the IP filter that was just created, and then click [Next].
29.
Select the IPsec security filter, and then click [Edit].
30.
Click [Add], select the "Custom" check box, and then click [Settings].
31.
In "Integrity algorithm", select the authentication algorithm that was specified on the
machine in Encryption Key Auto Exchange Settings Phase 2.
32.
In "Encryption algorithm", select the encryption algorithm that was specified on the machine
in Encryption Key Auto Exchange Settings Phase 2.
33.
In Session Key settings, select "Generate a new key every", and enter the validity period
(in seconds) that was specified on the machine in Encryption Key Auto Exchange Settings
Phase 2.
34.
Click [OK] three times.
35.
Click [Next].
36.
Click [Finish].
37.
Click [OK].
38.
Click [Close].
The new IP security policy (IPsec settings) is specified.
39.
Select the security policy that was just created, right click, and then click [Assign].
IPsec settings on the computer are enabled.
• To disable the computer's IPsec settings, select the security policy, right click, and then click [Un-
assign].
• If you specify the "Authentication and High Level Encryption" security level in encryption key auto
exchange settings, also select the "Master key perfect forward secrecy (PFS)" check box in the Security
Filter Properties screen (which appears in step 29). If using PFS in Windows XP, the PFS group number
used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman group number (set in
step 11). Consequently, if you change the security level specified automatic settings on the machine
and "User Setting" appears, you must set the same the group number for "Phase 1 Diffie-Hellman
Group" and "Phase 2 PFS" on the machine to establish IPsec transmission.
5. Enhanced Network Security
136
5
Summary of Contents for Pro C550EX
Page 9: ...INDEX 229 7...
Page 18: ...1 Getting Started 16 1...
Page 68: ...2 Authentication and its Application 66 2...
Page 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Page 96: ...3 Ensuring Information Security 94 3...
Page 104: ...4 Managing Access to the Machine 102 4...
Page 148: ...5 Enhanced Network Security 146 5...
Page 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Page 162: ...6 Specifying the Extended Security Functions 160 6...
Page 180: ...7 Troubleshooting 178 7...
Page 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Page 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Page 233: ...MEMO 231...
Page 234: ...MEMO 232 EN USA D0797508...