Skip header
 

Specifying IPsec Settings on the Computer

Specify exactly the same settings for IPsec SA settings on your computer as are specified for the IPsec Settings on the machine. Setting methods differ according to the computer's operating system. The following procedure is based on Windows 7 in an IPv4 environment as an example.

1On the [Start] menu, click [Control Panel], [System and Security], and then click [Administrative Tools].

2Double-click [Local Security Policy], and then click [IP Security Policies on Local Computer].

3In the "Action" menu, click [Create IP Security Policy...].

The IP Security Policy Wizard appears.

4Click [Next].

5Enter a security policy name in "Name", and then click [Next].

6Clear the "Activate the default response rule (earlier versions of Windows only)." check box, and then click [Next].

7Select "Edit properties", and then click [Finish].

8In the "General" tab, click [Settings...].

9In "Authenticate and generate a new key after every", enter the same validity period (in minutes) that is specified on the machine in [IKE Life Time], and then click [Methods...].

10Confirm that the Encryption Algorithm ("Encryption"), Hash Algorithm ("Integrity"), and IKE Diffie-Hellman Group ("Diffie-Hellman Group") settings in "Security method preference order" all match those specified on the machine in [IKE Settings].

If the settings are not displayed, click [Add...].

11Click [OK] twice.

12Click [Add...] in the "Rules" tab.

The Security Rule Wizard appears.

13Click [Next].

14Select "This rule does not specify a tunnel", and then click [Next].

15Select the type of network for IPsec, and then click [Next].

16Click [Add...] in the IP Filter List.

17In [Name], enter an IP Filter name, and then click [Add...].

The IP Filter Wizard appears.

18Click [Next].

19In [Description:], enter a name or a detailed explanation of the IP filter, and then click [Next].

You may click [Next] and proceed to the next step without entering any information in this field.

20Select "My IP Address" in "Source address", and then click [Next].

21Select "A specific IP Address or Subnet" in "Destination address", enter the machine's IP address, and then click [Next].

22For the IPsec protocol type, select "Any", and then click [Next].

23Click [Finish], and then click [OK].

24Select the IP filter that you have just created, and then click [Next].

25Click [Add...] in the Filter Action.

The Filter Action Wizard appears.

26Click [Next].

27In [Name], enter a Filter Action name, and then click [Next].

28Select "Negotiate security", and then click [Next].

29Select one of options for computers allowed to communicate with, and then click [Next].

30Select "Custom" and click [Settings...].

31When [ESP] is selected for the machine in [Security Protocol] under [IPsec Settings], select [Data integrity and encryption (ESP)], and configure the following settings:

Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for ESP] specified on the machine.

Set the value of [Encryption algorithm] to the same value as the [Encryption Algorithm for ESP] specified on the machine.

32When [AH] is selected for the machine in [Security Protocol] under [IPsec Settings], select [Data and address integrity without encryption (AH)], and configure the following settings:

Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for AH] specified on the machine.

Clear the [Data integrity and encryption (ESP)] check box.

33When [ESP&AH] is selected for the machine in [Security Protocol] under [IPsec Settings], select [Data and address integrity without encryption (AH)], and configure the following settings:

Set the value of [Integrity algorithm] under [Data and address integrity without encryption (AH)] to the same value as [Authentication Algorithm for AH] specified on the machine.

Set the value of [Encryption algorithm] under [Data integrity and encryption (ESP)] to the same value as [Encryption Algorithm for ESP] specified on the machine.

34In the Session key settings, select "Generate a new key every", and enter the same validity period (in seconds or Kbytes) as that specified for [Life Time] on the machine.

35Click [OK], and then click [Next].

36Click [Finish].

If you are using IPv6 under Windows Vista or a newer version of Windows, you must repeat this procedure from step 12 and specify ICMPv6 as an exception. When you reach step 22, select [58] as the protocol number for the "Other" target protocol type, and then set [Negotiate security] to [Permit].

37Select the filter action that you have just created, and then click [Next].

38Select one of options for an authentication method, and then click [Next].

39Click [Finish], and then click [OK] twice.

The new IP security policy (IPsec settings) is specified.

40Select the security policy that you have just created, right click on it, and then click [Assign].

IPsec settings on the computer are enabled.

Note

  • To disable the computer's IPsec settings, select the security policy, right click, and then click [Un-assign].