Configuring Microsoft Windows Vista and Windows Server 2008 to Operate with HP-UX IPSec

Introduction.........................................................................................................................................

2

Related Documentation .....................................................................................................................

2

Protocol implementation differences....................................................................................................

2

IKE version ..................................................................................................................................

2

IKE authentication method .............................................................................................................

2

IKE default algorithms ...................................................................................................................

2

IKE aggressive mode ....................................................................................................................

3

IPsec default transform ..................................................................................................................

3

Configuration overview ........................................................................................................................

3

Configuring Windows IKE algorithms.....................................................................................................

3

Configuring connection security rules .....................................................................................................

4

Using the Windows Firewall MMC to configure connection security rules ...............................................

4

Using the netsh advfirewall consec command to configure connection security rules.................................

5

Configuring inbound and outbound firewall rules ....................................................................................

6

(Optional) Configuring IPsec transforms..................................................................................................

6