9. In "Authenticate and generate a new key after every", enter the same validity period (in
minutes) that is specified on the machine in [IKE Life Time], and then click [Methods...].
10. Confirm that the Encryption Algorithm ("Encryption"), Hash Algorithm ("Integrity"), and
IKE Diffie-Hellman Group ("Diffie-Hellman Group") settings in "Security method
preference order" all match those specified on the machine in [IKE Settings].
If the settings are not displayed, click [Add...].
11. Click [OK] twice.
12. Click [Add...] in the "Rules" tab.
The Security Rule Wizard appears.
13. Click [Next].
14. Select "This rule does not specify a tunnel", and then click [Next].
15. Select the type of network for IPsec, and then click [Next].
16. Click [Add...] in the IP Filter List.
17. In [Name], enter an IP Filter name, and then click [Add...].
The IP Filter Wizard appears.
18. Click [Next].
19. In [Description:], enter a name or a detailed explanation of the IP filter, and then click
[Next].
You may click [Next] and proceed to the next step without entering any information in this field.
20. Select "My IP Address" in "Source address", and then click [Next].
21. Select "A specific IP Address or Subnet" in "Destination address", enter the machine's IP
address, and then click [Next].
22. For the IPsec protocol type, select "Any", and then click [Next].
23. Click [Finish], and then click [OK].
24. Select the IP filter that you have just created, and then click [Next].
25. Click [Add...] in the Filter Action.
The Filter Action Wizard appears.
26. Click [Next].
27. In [Name], enter a Filter Action name, and then click [Next].
28. Select "Negotiate security", and then click [Next].
29. Select "Allow unsecured communication if a secure connection cannot be established.",
and then click [Next].
30. Select "Custom" and click [Settings].
31. In "Integrity algorithm", select the authentication algorithm that was specified on the
machine.
Transmission Using IPsec
461