Table 5-10 Kerberos Settings page (continued)
Item | Description |
|
|
Clock Skew | Clock skew is a measure of allowed differences between clocks during transactions. |
| A Kerberos installation uses clocks that are reasonably synchronized. When the |
| HP Jetdirect print server checks time stamps of incoming packets from clients, the |
| clock skew specifies the time interval (in seconds) within which the HP Jetdirect print |
| server accepts a packet. If the time interval is exceeded, the packet is discarded. |
| NOTE: Timing differences between the HP Jetdirect print server and a domain |
| controller depends on the clock skew configuration on the domain controller. |
|
|
Time Sync Period | Time interval (in minutes) that the HP Jetdirect print server requests to synchronize |
| its clock with an SNTP time server. |
|
|
SNTP Server | FQDN or IP address of an SNTP time server, if required. By default, the SNTP server |
| is the server used as the KDC. |
|
|
IKEv1/IKEv2 Phase 1 (Authentication)
Use IKE to create security associations dynamically. Configure SA parameters for authentication and to securely generate IPsec session keys for encryption and authentication algorithms. Items on this page are described in the following table.
Table 5-11 IKEv1/IKEv2 Phase 1 (Authentication) page
Item | Description |
|
|
Negotiation Mode | (Required) IKE provides two modes of negotiation during an exchange for keys and |
| security services to be used for a Security Association: |
| Main Uses identity protection between the hosts. This method is slower but secure. |
| Aggressive Uses half the message exchanges. It is faster, but less secure. |
|
|
Cryptographic Parameters | (Required) |
| securely exchanged between two hosts over an unprotected network. A Diffie- |
| Hellman group determines the parameters to use during a |
| Multiple |
| IKEv1 supports up to |
| IKEv2 supports up to |
| To change the entries in the list, click Edit. Selecting all the groups results in a single |
| negotiated group. |
|
|
Encryption and Authentication | (Required) Encryption methods and strengths, and the authentication methods to |
| use. |
| Selecting all the methods results in a single negotiated method. |
|
|
Security Association | (Required) Specify the SA Lifetime, in seconds (30 to 86400), that the keys |
| associated with this security association are valid. |
|
|
IKEv1/IKEv2 Phase 2 / Quick Mode (IPsec Protocols)
Items on this page are described in the following table.
ENWW | HP Jetdirect IPsec/Firewall wizard 117 |