Rule Summary; Configuring Windows Systems - HP 635n - JetDirect IPv6/IPsec Print Server Administrator's Manual

Jetdirect print servers
Hide thumbs Also See for 635n - JetDirect IPv6/IPsec Print Server:
Table of Contents

Advertisement

Table 5-15
Manual Keys page (continued)
Item
ESP SPI
AH SPI
Key Format
Encryption
Authentication

Rule Summary

This page provides summary information for the IPsec/Firewall rules created. Click Create Another
Rule to define another IPsec/Firewall rule before returning to the IPsec/Firewall Policy page. Or, click
Finish to add all configured rules to the policy page.
When you click Finish, you will be prompted whether to enable the IPsec/Firewall policy, and whether
to enable the Failsafe feature.

Configuring Windows Systems

To configure IPsec on supported Windows systems, consult your system documentation, or search for
IPsec on the Microsoft Web site.
112 Chapter 5 IPsec/Firewall Configuration (V.36.xx)
Description
If ESP is enabled on the IPsec Protocols page, the ESP SPI fields are provided. The
ESP SPI is a 32-bit field in an ESP header that helps to identify the IPsec Security
Association (SA).
In: Enter a value for an SA to use for packets received by the device.
Out: Enter a value for an SA to use for packets sent by the device.
If AH is enabled on the IPsec Protocols page, the AH Security Parameters Index (SPI)
edit fields are provided. An AH SPI is a 32-bit field in an Authentication header that helps
to identify the IPsec SA.
In: Enter a value for an SA to use for packets received by the device.
Out: Enter a value for an SA to use for packets sent by the device.
CAUTION:
The use of IPsec AH may not function properly in environments
that use Network Address Translation (NAT).
Choose whether you will use Hexadecimal values or ASCII characters to specify
encryption or authentication entries.
Enter encryption keys in the fields provided.
In: Enter the Encryption keys for packets received by the device.
Out: Enter the Encryption keys for packets sent by the device.
Enter authentication keys in the fields provided. Authentication keys must be the same
for ESP and AH protocols if both are enabled.
In: Enter the authentication keys for packets received by the device.
Out: Enter the authentication keys for packets sent by the device.
ENWW

Advertisement

Table of Contents
loading

Table of Contents