Intel PRO/100 Computer Hardware User Manual


 
57
communications for all computers in the workgroup.
IPSec Settings
After IKE verifies the identity of each computer, it negotiates which IPSec set-
tings to use to protect the communication after negotiation. Packet Protect
comes with pre-defined IPSec options, or you can create your own.
Each computer must agree upon the IPSec settings to use before IKE can estab-
lish a protected communication for data transfer.
Pre-defined IPSec Settings
Packet Protect comes with pre-defined IPSec settings, called security actions.
These security actions are designed for maximum compatibility between com-
puters using Packet Protect and other IPSec products.
A computer that requests a protected communication proposes its IPSec settings
to the computer with which it is trying to communicate. The IPSec settings
include a list of algorithm combinations that appear in order of preference. The
other computer must allow one of these defined algorithm combinations, other-
wise, the communication is not allowed using IPSec.
For a description of the individual IPSec settings and how you might use them,
see “Available Settings for Security Actions” on page 34.
Custom IPSec Settings
Although it is recommended that you use the pre-defined IPSec settings (secu-
rity actions) that come with Packet Protect, you can also create your own to meet
your custom corporate security guidelines. If you create your own, keep in mind
that two computers must agree on certain settings in order to communicate using
IPSec.
For more information about creating your own IPSec security actions, see “Cus-
tomize Security Actions” on page 33.
Secure communication using the
same pre-shared key