TIP: The tunnel setting is used by all packets selected using the address filters for the rule. Do not include any filters for
1.Start the IP Security Policies
2.Create an IP Security policy or modify an existing policy. To modify an existing policy, select the policy in the right navigation pane and right click the policy. Select Properties.
3.The IP Security configuration utility opens the Policy Properties dialog box. Select the Rules tab. Click Add to create a new rule or select a rule you want to modify and click Edit.
4.Configure a new rule or modify an existing rule with the appropriate address filter for the outbound tunnel rule or inbound tunnel rule, as described in “Outbound Rule” (page 34) or “Inbound Rule” (page 35). See “Step 4: Creating the IP Filter List and Filters for the Rule” (page 18) if you need additional information about configuring address filters.
Record the destination address; you will need it to configure the tunnel endpoint.
5.Return to the Rule Properties dialog box. Select the Tunnel Setting tab.
6.The IP Security configuration utility opens the Tunnel Setting dialog box. Select The tunnel endpoint is specified by this IP address.
Enter the IP address of the tunnel endpoint closest to the destination. Since this is an
7.Click Close to close the Tunnel Setting dialog box.
8.If this is a new rule, complete the configuration by configuring the appropriate filter action, authentication methods, and connection type.
Click Close to close the Rule Properties dialog box.
Example
In this example, IPsec secures all packets between the Windows system and the
The Windows system's address is 10.1.1.1
The
Windows Configuration
On the Windows system, you configure one rule for outbound packets and one for inbound packets.
Outbound Rule
The outbound rule is for packets from the Windows system (source address 10.1.1.1) to the
34