Справочник Пользователя для Secure Computing Soft-PK Version 5.1.3 Build 4
Configuring a security policy on the Soft-PK
Installing and Working with Soft-PK
4-17
12.
Specify the Key Exchange settings. Select
Key Exchange (Phase 2) ->
Proposal 1
.
Figure 4-16.
Soft-PK: Key Exchange
(Phase 2) -> Proposal 1
fields
SA Life
: Select
Unspecified
to default to Sidewinder settings.
Compression should not be used.
Encapsulation Protocol
: Select the
same settings
in the Encryption
and Hash Algorithms fields as Phase I. Do
not change Tunnel
Encapsulation
.
Do not use the Authentication Protocol (AH)
. (This does not encrypt
traffic.)
13.
[Optional] Click
Save
to save the policy on this system.
IMPORTANT: You can export a policy without saving it, but the policy will then not
be saved on the system on which it was configured
be saved on the system on which it was configured
14.
Select
File -> Export
.
a.
You will be prompted to protect your security policy. Your end users
will then not be able to change the settings or create new policies.
However, your end users will be able to change the
will then not be able to change the settings or create new policies.
However, your end users will be able to change the
My Identity
fields.
b.
Specify the location of the exported file.
15.
Provide a copy of this file to the appropriate end users (see Chapter 5 for
details).
details).