126CHAPTER 7: CONFIGURING IP SECURITY

11Enable the default option This rule does not specify a tunnel, and then click Next.

The Network Type screen appears.

12Enable the default option All network connections, and then click Next.

The Authentication Methods screen appears.

13Enable the Use this string to protect the key exchange (preshared key): option, type the appropriate string text in the entry field, and then click Next.

Creating a Filter

This sequence creates a filter for the policy.

The IP Filter List screen appears.

1Click Add.

A new IP Filter List screen appears.

2Enter a name for the filter, and then click Add. The IP Filter Wizard starts.

3Click Next.

The IP Traffic Source screen appears.

4Click Next.

The IP Traffic Destination screen appears.

5Select A Specific IP Address in the pull-down list.

The IP Address entry box appears on the IP Traffic Destination screen.

6Enter destination IP address, and then click Next.

The IP Protocol Type screen appears.

7Accept the default, and then click Next.

8Click Finish to close the IP Filter Wizard.

9Click Close to close the IP Filter List screen.

Page 126
Image 126
3Com 3CR990SVR97, 3CR990-TX-97, 3CR990-TX-95 manual Creating a Filter, Select a Specific IP Address in the pull-down list