Secure Computing Soft-PK Version 5.1.3 Build 4 Network Router User Manual


 
Configuring a security policy on the Soft-PK
Installing and Working with Soft-PK 4-17
12.
Specify the Key Exchange settings. Select Key Exchange (Phase 2) ->
Proposal 1
.
Figure 4-16.
Soft-PK: Key Exchange
(Phase 2) -> Proposal 1
fields
SA Life: Select Unspecified to default to Sidewinder settings.
Compression should not be used.
Encapsulation Protocol: Select the same settings in the Encryption
and Hash Algorithms fields as Phase I. Do
not change Tunnel
Encapsulation
.
Do not use the Authentication Protocol (AH). (This does not encrypt
traffic.)
13. [Optional] Click Save to save the policy on this system.
IMPORTANT: You can export a policy without saving it, but the policy will then not
be saved on the system on which it was configured
14. Select File -> Export.
a. You will be prompted to protect your security policy. Your end users
will then not be able to change the settings or create new policies.
However, your end users will be able to change the
My Identity
fields.
b. Specify the location of the exported file.
15. Provide a copy of this file to the appropriate end users (see Chapter 5 for
details).