Configuring Microsoft Windows Vista and Windows Server 2008 to Operate with HP-UX IPSec
Configuring Microsoft Windows
Vista and Windows Server
2008 to Operate with HP-UX IPSec
Introduction......................................................................................................................................... 2
Related Documentation ..................................................................................................................... 2
Protocol implementation differences.................................................................................................... 2
IKE version .................................................................................................................................. 2
IKE authentication method ............................................................................................................. 2
IKE default algorithms ................................................................................................................... 2
IKE aggressive mode .................................................................................................................... 3
IPsec default transform .................................................................................................................. 3
Configuration overview ........................................................................................................................ 3
Configuring Windows IKE algorithms..................................................................................................... 3
Configuring connection security rules ..................................................................................................... 4
Using the Windows Firewall MMC to configure connection security rules ............................................... 4
Using the netsh advfirewall consec command to configure connection security rules................................. 5
Configuring inbound and outbound firewall rules .................................................................................... 6
(Optional) Configuring IPsec transforms.................................................................................................. 6