Table 5-10Kerberos Settings page (continued)

Item

Description

 

 

Clock Skew

Clock skew is a measure of allowed differences between clocks during transactions.

 

A Kerberos installation uses clocks that are reasonably synchronized. When the

 

HP Jetdirect print server checks time stamps of incoming packets from clients, the

 

clock skew specifies the time interval (in seconds) within which the HP Jetdirect print

 

server accepts a packet. If the time interval is exceeded, the packet is discarded.

 

NOTE: Timing differences between the HP Jetdirect print server and a domain

 

controller depends on the clock skew configuration on the domain controller.

 

 

Time Sync Period

Time interval (in minutes) that the HP Jetdirect print server requests to synchronize

 

its clock with an SNTP time server.

 

 

SNTP Server

FQDN or IP address of an SNTP time server, if required. By default, the SNTP server

 

is the server used as the KDC.

 

 

IKEv1/IKEv2 Phase 1 (Authentication)

Use IKE to create security associations dynamically. Configure SA parameters for authentication and to securely generate IPsec session keys for encryption and authentication algorithms. Items on this page are described in the following table.

Table 5-11IKEv1/IKEv2 Phase 1 (Authentication) page

Item

Description

 

 

Negotiation Mode

(Required) IKE provides two modes of negotiation during an exchange for keys and

 

security services to be used for a Security Association:

 

Main Uses identity protection between the hosts. This method is slower but secure.

 

Aggressive Uses half the message exchanges. It is faster, but less secure.

 

 

Cryptographic Parameters

(Required) Diffie-Hellman Groups Allows a secret key and security services to be

 

securely exchanged between two hosts over an unprotected network. A Diffie-

 

Hellman group determines the parameters to use during a Diffie-Hellman exchange.

 

Multiple well-known Diffie-Hellman groups are listed.

 

IKEv1 supports up to DH-18.

 

IKEv2 supports up to DH-24.

 

To change the entries in the list, click Edit. Selecting all the groups results in a single

 

negotiated group.

 

 

Encryption and Authentication

(Required) Encryption methods and strengths, and the authentication methods to

 

use.

 

Selecting all the methods results in a single negotiated method.

 

 

Security Association

(Required) Specify the SA Lifetime, in seconds (30 to 86400), that the keys

 

associated with this security association are valid.

 

 

IKEv1/IKEv2 Phase 2 / Quick Mode (IPsec Protocols)

Items on this page are described in the following table.

ENWW

HP Jetdirect IPsec/Firewall wizard 117