Configuring Microsoft Windows IP Security to Operate with HP-UX IPSec
List of Figures
1 IP Security Policy Wizard..............................................................................................................16
2 Rules Tab.......................................................................................................................................17
3 Rule Properties Dialog Box...........................................................................................................17
4 Creating an IP Filter List...............................................................................................................18
5 Address Tab for Filter Properties..................................................................................................19
6 Protocol Tab for Filter Properties..................................................................................................20
7 Selecting the Filter List for a Rule.................................................................................................21
8 Security Methods for Filter Action................................................................................................22
9 Security Method Dialog Box.........................................................................................................23
10 Custom Security Methods Settings Dialog Box............................................................................24
11 Selecting the Filter Action.............................................................................................................25
12 Configuring A Preshared Key.......................................................................................................26
13 General Policy Properties Dialog Box ..........................................................................................27
14 Key Exchange Settings Dialog Box ...............................................................................................28
15 IKE Security Algorithms Dialog Box ............................................................................................29
16 IPSEC Services Properties Dialog Box...........................................................................................30
17 Assigning the IP Security Policy...................................................................................................31
18 Outbound Rule Filter....................................................................................................................35
19 Outbound Rule Tunnel Settings....................................................................................................35
20 Inbound Rule Filter.......................................................................................................................36
21 Inbound Rule Tunnel Settings.......................................................................................................36
5