124CHAPTER 7: CONFIGURING IP SECURITY

Encryption

Encryption

Description (continued)

Type

Level

 

 

 

Custom

varies

This provides encryption and an extra

 

 

authentication that includes the IP header.

 

 

Custom allows you to select options for both AH

 

 

and ESP, such as MD%/SHA-1 and DES/3DES. And

 

 

you can select the rate at which new keys are

 

 

negotiated.

 

 

Microsoft uses IKE key exchange to renew keys

 

 

every x seconds or y bytes. However, this practice

 

 

is computationally very high in overhead. Some

 

 

users may set these values low and have frequent

 

 

key updates. Users more concerned with

 

 

performance will set these values higher.

 

 

For more information, see the Microsoft

 

 

documentation about creating IPSec flows.

 

 

 

Creating a Security Policy

The process you use to create and enable a security policy will depend on your network environment requirements. The following is an example of one approach to creating a security policy.

You must complete all of the sequences in this section to establish and enable a security policy for transmitting and receiving encrypted data over the network.

Defining the Console

This sequence establishes the Console and defines its parameters.

To define the Console:

1In the Windows taskbar, click Start, Programs, Accessories, and then Command Prompt.

2At the DOS prompt, type MMC and press Enter. The Console1 screen appears.

3In the menu click Console and then Add/Remove Snap-in.

The Add/Remove Snap-in screen appears.

Page 124
Image 124
3Com 3CR990-TX-97, 3CR990-TX-95, 3CR990SVR97, 3CR990SVR95 manual Creating a Security Policy, Defining the Console