11. Appendix

Specifying IPsec Settings on the Computer

Specify exactly the same settings for IPsec SA settings on your computer as are specified for the IPsec Settings on the machine. Setting methods differ according to the computer's operating system. The following procedure is based on Windows 7 in an IPv4 environment as an example.

1.On the [Start] menu, click [Control Panel], [System and Security], and then click [Administrative Tools].

2.Double-click [Local Security Policy], and then click [IP Security Policies on Local Computer].

3.In the "Action" menu, click [Create IP Security Policy...]. The IP Security Policy Wizard appears.

4.Click [Next].

5.Enter a security policy name in "Name", and then click [Next].

6.Clear the "Activate the default response rule (earlier versions of Windows only)." check box, and then click [Next].

7.Select "Edit properties", and then click [Finish].

8.In the "General" tab, click [Settings...].

9.In "Authenticate and generate a new key after every", enter the same validity period (in minutes) that is specified on the machine in [IKE Life Time], and then click [Methods...].

10.Confirm that the Encryption Algorithm ("Encryption"), Hash Algorithm ("Integrity"), and IKE Diffie-Hellman Group ("Diffie-Hellman Group") settings in "Security method preference order" all match those specified on the machine in [IKE Settings].

If the settings are not displayed, click [Add...].

11.Click [OK] twice.

12.Click [Add...] in the "Rules" tab. The Security Rule Wizard appears.

13.Click [Next].

14.Select "This rule does not specify a tunnel", and then click [Next].

15.Select the type of network for IPsec, and then click [Next].

16.Click [Add...] in the IP Filter List.

17.In [Name], enter an IP Filter name, and then click [Add...]. The IP Filter Wizard appears.

18.Click [Next].

348

Page 350
Image 350
Ricoh SP C252SF Specifying IPsec Settings on the Computer, If the settings are not displayed, click Add, Click OK twice