41.
Click [Finish].
42.
Click [OK].
The new IP security policy (IPsec settings) is specified.
43.
Select the security policy that was just created, right-click, and then click [Assign].
The computer's IPsec settings are enabled.
• To disable the computer's IPsec settings, select the security policy, right-click, and then click [Un-
assign].
telnet Setting Commands
You can use telnet to confirm IPsec settings and make setting changes. This section explains telnet
commands for IPsec. For information about the user name and password for logging into telnet, ask the
administrator. For details about logging in to telnet and telnet operations, see "Remote Maintenance
Using telnet", Connecting the Machine/ System Settings.
• If you are using a certificate as the authentication method in encryption key auto exchange settings
(IKE), install the certificate using Web Image Monitor. A certificate cannot be installed using telnet.
ipsec
To display IPsec related settings information, use the "ipsec" command.
Display current settings
msh> ipsec
Displays the following IPsec settings information:
• IPsec settings values
• Encryption key auto exchange settings, IKE setting 1-4 values
• Encryption key auto exchange settings, IKE default setting values
Display current settings portions
msh> ipsec -p
• Displays IPsec settings information in portions.
ipsec exclude
To display or specify protocols excluded by IPsec, use the "ipsec exclude" command.
Configuring IPsec Settings
103