Contents

9

Installing and Configuring Data Encryption Offloads 23

 

Overview 23

 

 

 

 

Offloading Encryption Processing 23

 

Selecting Basic or Strong Encryption Processing 23

 

Configuring IPSec in Windows 2003, Windows XP, and Windows 2000 24

 

Creating a Security Policy

24

 

Defining the Console

25

 

Creating the Policy

25

 

 

Creating a Filter

26

 

 

 

Binding the Filter

26

 

 

Creating the Filter Action

26

 

Binding the Filter Action

27

 

Enabling Encryption

27

 

 

Disabling Encryption

27

10

Installing 3Com Advanced Server Features for Windows 29

 

About the Advanced Server Features 29

 

3Com DynamicAccess Advanced Server Features 29

 

Load Balancing 30

 

Failover

30

 

VLANs

31

Server Features Using Other NICs

31

 

 

Installing 3Com Advanced Server Software 32

 

 

Configuring Groups and VLANs

33

 

 

 

Planning the Configuration

33

 

 

 

Working With Server Features

34

 

 

 

Windows 2003, Windows XP, and Windows 2000

35

 

Windows NT

35

 

 

 

 

 

 

Creating a Group

35

 

 

 

 

 

 

Adding NICs to a Group

36

 

 

 

 

Specifying a Dedicated IP Address

36

 

 

Changing an IP Address

37

 

 

 

 

Creating a VLAN 37

 

 

 

 

 

 

Specifying Traffic Priorities

 

37

 

 

 

Saving the Configuration

 

38

 

 

 

 

Disabling Load Balancing for a Group 38

 

 

Changing the Primary NIC

 

38

 

 

 

Removing a NIC from a Group

38

 

 

 

Deleting or Editing a VLAN

38

 

 

 

Displaying NIC Properties

 

39

 

 

 

 

Displaying Group Properties

39

 

 

 

Troubleshooting a Load Balancing Configuration 39

 

 

Changing Windows 2003, Windows XP, and Windows 2000 Property Settings

40

Identifying Windows 2003 and Windows 2000 Miniport and LAN Connections

40

Using Windows 2003, Windows XP, and Windows 2000 Offload Features 40

 

Enabling Offloads

41

 

 

 

 

 

 

Configuring Offloads for a Group of Different NICs

42

 

Page 4
Image 4
HP Embedded Firewall manual Installing and Configuring Data Encryption Offloads