Configuring Microsoft Windows Vista and Windows Server 2008 to Operate with HP-UX IPSec
5
3. Select New Rule in the right menu.
4. In the wizard Rule Type dialog box, select Custom.
Click Next.
5. In the Endpoints dialog box, enter the IP addresses.
Click Next.
6. In the Requirements dialog box, select Require inbound and outbound.
Click Next.
7. In the Authentication Method dialog box, configure the IKE authentication method.
To use certificates for IKE authentication, select Computer Certificate and enter the
distinguished name for the CA in the CA Name field.
To use preshared keys, select Advanced and click the Customize button. In the Customize
Advanced Authentication Methods dialog box, select Preshared Key and enter an ASCII string in
the Key field.
Click Next.
8. The Profile dialog box specifies when the rule will be active according to the network status of the
system. Select the profiles appropriate for your topology. HP selected all the profiles.
Click Next.
9. In the Name dialog box, enter a name for the rule.
Click Finish.
Using the netsh advfirewall consec command to configure connection
security rules
To configure a connection security rule with specific ports or protocols, you must use the Microsoft
netsh advfirewall consec command. The netsh command has a built-in help utility that you
can use to display syntax information.
In most cases, you can use syntax similar to the following:
netsh advfirewall consec add rule name=rule_name enable=yes
endpoint1=ip_addr endpoint2=ip_addr
[protocol=protocol][port1=port] [port2=port]
action=requireinrequireout auth1=computerpsk auth1psk=my_preshared_key
For example, the following command configures a rule that applies IPsec security for the telnet (port
514) service on the Windows 2008 server (10.0.0.208) from the HP-UX system (10.0.0.11):
netsh advfirewall consec add rule name=iop-rule enable=yes
endpoint1=10.0.0.208 endpoint2=10.0.0.11 protocol=tcp port1=514
action=requireinrequireout auth1=computerpsk auth1psk=MyKey
Rules configured using the netsh advfirewall consec command are bidirectional. IPsec will be
used for TCP packets from 10.0.0.11 to port 514 on 10.0.0.208 and for packets in the reverse
direction.
The default IPsec transform is ESP with AES-128 encryption and SHA-1 authentication. To specify a
different transform, use the qmsecmethods option.