· Setting Key Exchange
1
Select the [General] tab in the IP security policy properties window.
2
Click [Setup].
3
Enter a value (in minutes) in [Authenticate and generate a new key after every] in the
[Key Exchange Settings] window.
·
Enter the same value as specified in [Lifetime] in "Phase1 Proposal" in "Configuring the
Machine." [Lifetime] is specified in seconds, but enter a value in minutes in this step.
4
Click [Methods].
5
Click [Add] in the [Key Exchange Security Methods] window.
6
Specify [Integrity algorithm], [Encryption algorithm], and [Diffie-Hellman group].
·
Select the same values as specified in [IKE Encryption Algorithm], [IKE Hush Algorithm], and
[Diffie-Hellman group] in "Phase1 Proposal" in "Configuring the Machine."
7
Click [OK].
8
Click [OK] in the [Key Exchange Security Methods] window.
9
Click [OK] in the [Key Exchange Settings] window.
· Setting the IP Filter
1
Select the [Rules] tab in the IP security policy properties window.
2
Click [Add].
3
Click [Next] in [Security Rules Wizard].
4
On the [Tunnel Endpoint] screen, select [This rule does not specify a tunnel], and click [Next].
5
On the [Network Type] screen, select [All Network Connections], and click [Next].
6
Click [Add] on the [IP Filter List] screen.
7
Click [Add] in the [IP Filter List] window.
8
Click [Next] in [IP Filter Wizard].
9
Click [Next] on the [IP Filter Description and Mirrored property] screen.
10
Click [Next] on the [IP Traffic Source] screen.
11
Click [Next] on the [IP Traffic Destination] screen.
250
Need help?
Do you have a question about the 360C and is the answer not in the manual?
Questions and answers