List of Figures

 

1

IP Security Policy Wizard..............................................................................................................

16

2

Rules Tab.......................................................................................................................................

17

3

Rule Properties Dialog Box...........................................................................................................

17

4

Creating an IP Filter List...............................................................................................................

18

5

Address Tab for Filter Properties..................................................................................................

19

6

Protocol Tab for Filter Properties..................................................................................................

20

7

Selecting the Filter List for a Rule.................................................................................................

21

8

Security Methods for Filter Action................................................................................................

22

9

Security Method Dialog Box.........................................................................................................

23

10

Custom Security Methods Settings Dialog Box............................................................................

24

11

Selecting the Filter Action.............................................................................................................

25

12

Configuring A Preshared Key.......................................................................................................

26

13

General Policy Properties Dialog Box ..........................................................................................

27

14

Key Exchange Settings Dialog Box ...............................................................................................

28

15

IKE Security Algorithms Dialog Box ............................................................................................

29

16

IPSEC Services Properties Dialog Box...........................................................................................

30

17

Assigning the IP Security Policy...................................................................................................

31

18

Outbound Rule Filter....................................................................................................................

35

19

Outbound Rule Tunnel Settings....................................................................................................

35

20

Inbound Rule Filter.......................................................................................................................

36

21

Inbound Rule Tunnel Settings.......................................................................................................

36

5