Installing Software

199

AFT, ALB and IPSec functions

checkbox, and set the same temporary shared key as in (4). When you have set the temporary shared key, select “Next”.

(10)When the “IP Filter List” screen is displayed, mark the “All IP Traffic” checkbox, and select “Next”.

(11)When the “Filter Action” screen is displayed, mark the “Request Security (Optional)” checkbox, and select “Next”. The screen changes to the “Completing the Rule Wizard” screen. Make sure that the “Edit properties” checkbox is marked, and select “Done”.

(12)When the “New Rule Properties” screen is displayed, make sure that the “All IP traffic” checkbox is marked, and select “OK”.

(13)In the “Security rules for Communicating with other Comput- ers” screen, make sure that both the “All IP Traffic” and “Dynamic” checkboxes are marked, and select “Add”.

(14)When the “Security Rules Used for Communications with Other Computers” screen is displayed, make sure that the “Dynamic” checkbox is marked, and that the “Use Add Wiz- ard” checkbox at the bottom right is marked, and select “Add”. Then select “Next” in the next screen (“Welcome to the IP Security Rule Wizard”).

(15)When the “Tunnel Endpoint” screen is displayed, make sure that the “This rule does not specify a tunnel” checkbox is marked, and select “Next”.

(16)When the “Network Type” screen is displayed, make sure that the “All network connections” checkbox is marked, and select “Next”.

(17)The sequence from here up to step (20) is the “ICMP Traffic” security setup.

The screen changes to the “Authentication Method” screen. The screen changes to the “Authentication Method” screen. In the same way as in step (4), mark the “Use this string to protect the key exchange (preshared key)” checkbox, and set the same temporary shared key as in (4). When you have set the temporary shared key, select “Next”.