20 Encryption and Digital Signature Settings
8
Select [Close].
Step3 Configuration on the Computer
The following describes the configuration procedures on the computer.
Configure the following settings on the computer.
• Create an IP security policy
• Assign the IP security policy
For details on the settings, refer to the help of the computer.
470