IPsec Protocols (Manual Keys)
Items on the IPsec Protocols page are described in the following table. To use manual keys for key negotiation, use the following steps:
1.
|
Specify IPsec protocol encryption and authentication methods to use for security associations (SA) in this rule. Configuration of manual keys depends on your selections.
|
|
2.
|
Click OK, and then configure the manual keys for this template.
|
|
IPsec Protocols (Manual Keys) page
|
|
|
Specify how the selected IPsec protocols (ESP or AH) are encapsulated:
|
●
|
Transport (default): Only the user data in each IP packet is protected, the IP packet header is not protected.
|
|
●
|
Tunnel: All packet fields are protected, including the IP packet header.
|
|
|
|
Set the encryption method/strength and the authentication methods used:
|
●
|
ESP IPsec encapsulating security payload (ESP) protocol for IP packets. ESP headers are inserted in packets to ensure privacy and integrity of packet contents. Select among the supported encryption methods/strengths and authentication methods to be used for data protection.
|
|
●
|
AH IPsec authentication header (AH) protocol for IP packets. AH headers are inserted in packets to protect integrity of packet contents through cryptographic checksums. Select among the supported authentication methods.
|
| CAUTION:
|
IPsec AH might not function properly in environments that use network address translation (NAT).
|
|
| NOTE:
|
For manual keys, you can select only one authentication method. You cannot use ESP authentication if AH is enabled. If you enable ESP and AH, you must select an AH authentication method.
|
|
This section provides information about the following topics:
HP Jetdirect Print Servers IPsec Protocols (Manual Keys)