Enabling the IPSec Protocol on
Microsoft Windows NT 4.0
®
User’s Guide
Intel® Packet Protect User’s Guide
Where to Go for More Information
Readme Files
For more information about installation and general information about
the product, see the readme text file. To view the files, view the root
folder on the Intel CD-ROM. Open readme.txt with any text editor.
Online Services
You can use the Internet to do wnload software updates, and to view
troubleshoot ing tips, installation notes, and more. Online services are
on the World Wide Web at:
make any commitment to update the information contained herein.
* Other product and corporate names may be trademarks of other companies and are used only for
explanation and to the owners’ benefit, without intent to infringe.
ii
Contents
Where to Go for More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
Assign security behavior roles to computers that you want to use
Packet Protect 9
Develop a strategy for handling pre-shared keys 10
Understand the Default Rule 11
Consider exceptions to the Default Rule 11
What are the Trade-offs? 12
Conclusion 14
Set up Your System Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
What is a Policy? 25
What is a Rule? 25
The Default Rule 26
Importance of Rule Order 27
How Does the System Policy Work? 28
Add Rules to th e System Policy 28
With the growing amount of inf orm ation that travels on your local area network
(LAN), confidential informa tion has become a ta rget for intruders both inside
and outside your company. These intruders may be employees, visitors to your
company, or a hac ker who breaks through your firewall.
Intel ® Packet Protec t helps protect Internet Prot ocol (IP) traffic as it travels
between computers on your LAN. This protects confidentia l data from being
retrieved by intruders.
In this chapter, you’ll find information about:
•Packet Protect overview
•How Packet Protect works
•Getting started
1
Intel® Packet Protect User’s Guide
What is Intel
Packet Protect is designed to protect the confidentiality and authenticity of IP
traffic on your LAN.
Packet Protect can assist you in creating a departmental solution for your security concerns.
Many data compromises are attempted from within a company firewall. Unless
you prote ct information as it travels on the network, it can be received by
unwanted users.
For example, employees retrieving confidential designs from a Research &
Development department server use Packet Protect to encrypt the information
while it travels on th e LA N . Encryption prot ects the confi dentiality of the information. Each employee’s computer can also verify the integrit y of the information upon receipt.
Pac k et Prot e ct ?
Packet Protect Features
Packet Protect enables you to:
•Protect confidentiality and authenticity of IP traffic on your LAN using
Internet Protocol Security (IPSec), including Internet Key Exchange (IKE).
•Offloa d se cu rity task s to an Intel PRO/100 S Management or Server
Adapter to optimize netw ork performance.
Complete Your Security Solution
If you need to protect data stored on a computer, use operating system features
combin ed with Packet Pro te c t . Pa ck et Protect prot e cts data trave ling between
computers, not while it’s store d on a com puter. You should use your operating
system features or net w ork infrastructure element to provide access control to
certain areas of the computers on the network.
Hardware Acceleration
Implement i ng an IPSec sol ut ion can incr ea se CPU ut ili zat ion fo r co mput er s that
use the IPSec software. This is common when implementing any IPSec solution
because of the intense computation required to encr ypt, decrypt, an d validate
packet s. However, there is a way to offload securit y tasks from the CPU.
You can combine Packet Protect with the use of an Intel PRO/100 S Management or Ser v er A dap ter t o re duc e CPU ut il iz atio n. This fr ees C PU ut ili zat ion fo r
other tasks, while reducing the impact to network performance.
Domestic and Export Versions
Packet Protect is available in both domestic and export v ersions. The e xport version supports DES (56-bit) encryption only. The domestic version, available in
the United States and Canada, supports DES and 3DES (168-bit) encryption.
2
Additional Information
This Packet Protect User’s Guide in Adobe Acrobat* format can be found in the
Packe t Protect directory on the product CD-ROM. Packet Protect help can be
found in the H elp directory on the product CD-ROM.
Introduction
3
Intel® Packet Protect User’s Guide
How Packet Protect Works
Packet Protect helps you protect netw ork traff ic that is sent from one server or
client to another. Packet Protect uses these steps to protect information traveling
on the ne twork:
1.Activate IKE (Internet Key Ex ch ange). Negotia tes param e ters for secure
communication.
2.Activate IPSe c (Internet Protocol Security). Protects the communication
using th e security parameters it negotiated success fully using IKE.
What is IP Security?
Internet Protocol (I P) Security (commonly called IPSec) is a s et of standard protocols used to protect the confiden tiality and authenticity of IP communications.
IPSec accomplishes this using the following:
•Encryption. Protects confident iality of information traveling on the network. Each packet is encrypted so that unw anted recipients can’t interpret
it. Packet Prot ect uses DES 56-bit and 3DES 168-bit encryption algorithms
(3DES in U .S . an d Ca na da versi o n on ly).
•Integrity. Protects the authenticity of the information traveling on the network by verifying that each packet was unc hanged in transport. Pa cket Protect uses MD5 and SHA-1 authentication algorithms for both ESP and AH
authentication.
•Ant i -repla y pro tecti on. Protects the network by preventing an intruder
from successfully repeatedly sending an identical packet in an attempt to
confuse the system.
For more information about IPSec, see “Appendix A — IKE and IPSec” on
page 53.
What is Internet Key Exchange?
Internet K e y Exc han ge (IKE) i s a s tanda rd p ro tocol use d to nego ti ate a pro te cted
communication. Negotiation is the first phase in setting u p a secure communi cation. IKE verifies the identity of the computers using pre-shared keys. Then it
negot iates a set of secu rity settings to protect the communication.
IKE is a proto col t hat ope ra te s ins ide a fra me wo rk def ine d b y I SAKM P (Int er net
Security A ssociation Key Management Protocol) and is used to support the
establishment of Security Associations.
For more information about IKE, see “Appendix A — IKE and IPSec” on
page 53.
4
The Process
If two computers require security, each tim e they attemp t to communicat e w ith
each other Packet Protect follows these steps to attempt a protected comm unication:
1.Ea ch co mputer uses IKE to ver ify t hat the oth er i s th e comp ute r it cl aim s to
2.I f iden ti ty v er if ica ti on is s ucc es sful i n St ep 1, the tw o comp ute rs use IK E to
3.I f the agreem ent is successful in Step 2, both computers will use the agreed
As long as the protected communication is active, the two computers can
exchange informati on, without repea ting Steps 1 and 2 (up to th e pre-define d
time and size limits — see Table6 on page 34 for more information).
The following diagram shows the roles of IKE and IPSec.
Introduction
be.
agree upon the IPSec settings to use.
upon IPSec settings to protect the data as it travels.
Step 1: IKE Verifies Pre-shared Key
Step 2: IKE Negotiates IPSec Settings
Step 3: IPSec Protects the Communication
5
Intel® Packet Protect User’s Guide
Get Started
T o start using Packet Protect
1.Evaluate your network architecture and decide which areas require Packet
Protect. For details , see “Developing Your Deployment Model” on page8.
2.I n stall Packet Protect on those computers that require security . For details,
see “Install Packet Protect” on page17.
3.Set up security settings for each computer where you installed Packet Protect. F or details, s ee C hapter 3, “Configuring Security Settings” on
page 21.
6
2
Installing Packet Prote ct
To set up your netw o rk in pre pa ra tion fo r de p loying securi ty, ther e are severa l
things to cons id er. This chapt er gui des you t hro ugh th e setup proce ss so you can
begin de p lo ying se cu r ity most effe ctively.
In this chapter, you’ll find information about:
•Developing your dep loyment model.
•Setti ng up Intel
•Installing Packet Protect.
network adapters.
7
Intel® Packet Protect User’s Guide
Developing Your Deployment Model
In order to use Packet Prot ect successful ly, you must deve lop a deployment
model that fulfills your security needs on your ne twork. There are sev eral stages
to consider in developing your deplo yment model.
•Review your network architecture and corporate security guidelines.
•Assign se curity behavior roles to computers that you want to use Packet
Protect.
•Develop a strategy for using pre-shared keys.
•Underst and the Default Rule.
•Consider exceptions to the Default Rule.
This di scussion represents o nly an overview of some of the issues t hat should be
conside red when deploying Packet Protect in your enterprise. For more detailed
information about deployment models, please refer to “Scalable Deployment of
IPSec in C orporate Int ranets”white paper from the Intel Archi tecture Labs In ternet Building Blocks Initiative. This white paper can be found at:
The amount of confidential information trav eling on your network grows as
more employees use your corporate network. This poses a secu rity risk if someone break s through your firewall, or someone already behind your fi rewall has
access to the network—those people can access confidential information. For
example, an intruder can mimic an IP address and recei ve information that was
intend ed for someone el se at that IP address. Or, an intrud er can use software to
view data as it tra vels on your LAN.
You can depl oy Packet Protect in the areas of your network that transmit sensitive information. Some areas of your network might re quire the additi onal protection provided by Packet Protec t, while other ar eas might not. Use your
corporate securit y guidelines to hel p determine which areas of your ne twork
requir e Packet Protect.
Perhaps you have a server that stores highly confidential information, such as
corporate financial figures or e-commerce transactions. You can use your operating system’s tools to help protect data stored on the server’s hard disk, but
what about when other compute rs access that in formation? Use P acket Protect
8
Installing Packet Protect
to prote ct your highly confidential informatio n as it travels to and from the
server.
Assign security behavior roles to computers that you want to use
Packet Protect
Packet Protect uses default security behavior t o determine how a computer will
communicate with other computers on th e network. There are three default
behaviors: Secure Responder, Secure Initiator and Lockdown.
Secure Responder
A computer with the defaul t behavior of Secure Responder always initiat es and
accep ts traffic that is no t se cured . H ow ever, it wil l accept a secur e co m m u n ication if it is initiated by another computer. Of course, the negotiation will succeed
only if on e th e propos al s in the li st of fere d b y the ini tiat or can be matc hed by the
responder.
Secure Responder is a likely behavior for the majority of workstations in a network. Communications will always be allowed in the clear between computers
that are Secure Responders or Secure Initiators, but will communicate securely
with a computer (usually a server) with Lockdown default behavior.
Secure Initiator
A computer with the defaul t behavior of Secure Initiator will always attempt to
initiate secure communications on all outbound traffic. Even if an inbound communica tion flow is ini tia te d i n the clear, the res po nse data flow wi ll ca u se the
computer to initiate a secure session. However, if a secure session cannot be initiated , the computers will fallbac k to communicating in the clear.
Secure In itiator beha vior is appropri ate for both workstations and servers. Computers who wish to use peer-to-peer se cure communications can use Secure Ini-
9
Intel® Packet Protect User’s Guide
tiator behavior. Also, many servers can use this behavior as well, as long as the
fallback behavior is acceptable for your network.
Secure In itiator is similar to Secure Responder, except that all outbound traffic
will result in an attempt to negotiate parameters for security.
Lockdown
A computer with Lockdown behavior will always initiate and respond securely
to all da ta flows. If the negotiat ion fails on either computer, then traffic will be
denied.
Lockdown behavior i s used for server s w ith high content value, as it requires
security for all data transmissions.
Communicating with non-Packet Protect computers
It is common to not use Packe t Protect on all the computers in your network.
While the se cur ity th at Pac ke t Pro tect can pro vi de is benef i ci al, th er e are sev er al
reasons to limit the computers on your networ k that use Packet Protect, such as:
•Only a limi ted number of comput ers on your network require secur e communications.
•In order to minimize CPU utilization, you want to limit use of Packet Protect to computers that already have PRO/100S Management or Server
adapters.
Computers tha t use the def a ult behavior of Secur e Resp onder or Sec ur e Ini tiat or
will always be able to c ommunicate in the clear with compu ters in your network
that do not use Packet Prot ect.
Computers that use the default behavior of Lockdown wil l not be able to communicat e with computers in you r network that do not use Packet Protect.
Develop a strategy for handling pre-shared keys
When two computers attempt secure communication, they negotiate parameters
for the co mmunication. In addition to using their defa ult behavior, descri bed in
the pre vious section, they also exchange a stri ng of characters known as a pre shared k ey.
When the computers begin to negotiate parameters, they compare their preshared key s. If bo th com p uters ha v e th e sam e p re-s har ed key, then the co mput ers
will go ahead and negotia te parameters for the session. If the computers have a
dif ferent pre-shared key, then the negotiation for secure commun ication will
cease.
Once the pre-shared keys have been compared and matched between the two
computers, the IKE protocol generates secure, secret session keys. N o one can
find out what these ses sion keys are, even if th ey know what the pre-shared k ey
is. Alt hough pre-shared keys are sometimes called passwords, they do not act
like pass wor ds . Ev en w hen you kno w w hat t he pr e-sh ar ed k e y is, y ou c anno t use
that key to intercept or decrypt the information that is being transmitted.
10
Shar ing keys
It’s important when you are developing you r deployment model that you decide
how to handle the distribution of the pre-shared key. Some networks use a
widely-published key, known as a “group key” or the “pre-shared key on the
wall.” In this str ategy, you make the pre-shared available to everyone. This way,
all computers will be configured to use the same key. This ensures that whe n
secure communications are requested, th en IKE will be able to negotiate secure
communications when the keys are matched between two computers.
In addit ion to “group key,” some enterprises may want to use additional, more
pri vate pre-shared keys in certain instances. For exam ple, the presi d ent and the
chief financial officer of a corporation may wish to send secured transmissions
to each other. In t h is instance, each of these computers would use the group key
as part of their standard System Policy, but would crea te a special rule to cover
communications just between them. (See “Consider exceptions to the Default
Rule” for more information on implementing this scenario.) In this case, they
might li k ely cho ose a mo re sec re t pr e-sh ar ed k e y that jus t t he tw o com puter s u se
with each other.
Understand the Default Rule
Every co m puter that uses Packet Protect has a single System Policy. Each System Policy initially contains a single Default Rule. The Default Rule is quite
simple:
For Everybody, use the Default Security Actio n . If the rule fails, Allow Communication without Se curity.
Installing Packet Protect
Note:For computers that use the Lockdown behavior wth the
Default Rule, if the rule fails then
fallback action.
See “The Default Rule” on page26 for more information .
Note:
If you want to have secure communication between a Packet
Protect computer and a Windows 2000* computer, you must
use the Default Rule. Intel recommends that you do not
delete the Default Rule.
See “What is a Rule?” on page 25 for more information about rules in Packet
Protect.
Consider exceptions to the Default Rule
Many enterprises may find that by careful consideration of th e default behavior
roles, a w idely publishe d pre-shared key, and the D efault Rule, they can meet
their security requirements without extra effort. This model is quite wor kable
and provides adequate security. It is also simple to deploy and maintain.
Deny Communi cat i on
is the
11
Intel® Packet Protect User’s Guide
Some enterprises may wish to create additional rules that govern communications be tw een two speci fic computers.
Earlier, we introduced a scenario where the president and chief financial officer
of a company wished to implement extra security for their communications. For
this scenario, a new rule is needed. Let’s compare a possible rule for this scenario to th e S ys te m Po licy’s Default Ru le :
PropertyNew RuleDefault Rule
Table 1: Rule Comparison
Destination
Workgroup
Security ActionNew Security Action: Up
Rule FailureDeny Communication.Allow communication in
Authenticat ionUse a n ew pre-share d
President and CFO onlyEverybody
Default Security Action:
to 15 minutes or 50 MB,
whichever occurs first.
Then, a new security
association is negotiated.
key, known only to these
two comput ers .
Up to 8 h ours, then a ne w
security association is
negotiated.
the clear.
Use the System Policy’s
settings
In addition to these rules, both the president and the Chief Financial Officer
would ha v e the Sec ur e In it iato r de f aul t behavior . The ru le mi ght al so w an t to us e
more secure options, such as perfect forward secrecy, which provides a ver y
secure negotiation of session keys. There are many other security options that
can be chosen when you create a security action for this rule. See “Customize
Securi ty A ctions” on page 33 for mor e information on options for security
actions.
By comparing the new rule and the default rule, you can see ho w the new rule
provi d es an extra mea sure of securit y. The new security action is much more
limite d. Longer time and/or size limits on a security acti on can give an intruder
an opport unity to intercept and possibly corrupt packets. By denying comm unication in case of rule failure, you ensure that co m munication between these two
computers will never occur in the clear.
What are the Trade-offs?
A very important part of developing your deployment model is to consider not
only the initial deployment, but maintaining the System Policies on all the computers that use Packet Protect in your network.
Clearl y, the simplest model w e discussed will be the easies t to deploy and ma intain. When all compute rs use the same def aults—Default Rule, security action,
12
Installing Packet Protect
fall back to clear com mu nication, same pre-shared key—then you’ll be able to
gain adequate security with minimum impact to your network.
If you decide on a more complex deployment model, you should consider the
benefits of the extra security that you have against the costs of maintaining and
running the model. There are t w o areas that you should evaluate—maintenance
and CPU util ization.
Maintenance
If you are considering a deployment model with many customizations and specialized rul es , be aw ar e of t he time a nd effort requir ed f or on going m aint ena nce .
Because each computer with Packet Prot ect must be configured individually,
customizations requ ire more effort to keep each com puter up-to-date.
Let’s consider the previous example of the special rule for the preside nt and
Chief Financial Officer of the co rporation. I n order for this rule to work as
designe d, al l a spect s o f t he rul e mus t matc h, or comm un icati on wil l be de ni ed. I f
the president’s computer uses a different setting in the security action from the
CFO’s computer , then a securit y association ca nnot be negotiat ed and therefore
all communication is denied. Consider then that it might take several days for
the pres ident and CFO to even discover that their communications haven’t been
taking place, as assumed.
Even a new computer for the president could prevent secure communication
from happening. For example, when you set up this special rule, you identified
the two co mputers to Packet Protect by t he names of the comput ers. The president’s new computer has a new nam e. When the pres ident and the CFO att empt
to communicate the next time, the rule will fail, because of the computer name.
You can imagine h ow difficult it can becom e to maint ain specia lized rules, destination workgroups, and secur ity actions in your n etwork. Intel recommen ds that
you begin by using the simple, default model for secure communications. Over
time, you may consider customizations to enhance secure communications in
special cases.
CPU Utilization
Another ve ry im port ant f acto r t o consi de r i s the ef fec t o f I PSec on y our net wo rk,
as well as the individua l com puters using Packet Protect. Generally, you can
assume that when you choose most sophisticated security options, th ere will be
impact on your network.
One example is choosing to use ESP (Encapsulation Security Payload) and AH
(Authen ticat i on Hea de r) aut hen ti ca tion t oge th er. While th is combi na ti on af f or ds
extra protection, you must consider that when you use both of these methods,
you cannot offload any processing to the adapter, and thus CPU utilization
increases. How ever, if you us e ju st ESP au th en ticat io n w it h th e approp r i at e
adapter, you can take advantage of the ha rdware offload and get better CPU utilitzation.
You must also consider the adapters that are installed in your Packet P rotect
computers. Only the Intel PRO/100 S Server Adapter and Intel PRO/ 100 S Man-
13
Intel® Packet Protect User’s Guide
agement Adapter can perform hardware offloading. If you ha ve other Intel PRO/
100 Adapters in Pack et Protect co mp uters, you won’t be able to offload an y processin g, thus incr easing CPU utilization and potenti ally slowi ng that computer’s
network performance.
Other se curity options are considered “costly” as we ll. Perfect Forward Secr ecy
is very secure, but if used widely throughout the network, there can be a significant effect on servers that have a lot of secure traffic.
Conclusion
Hopefully, this section provided some guidelines for you to consider as you
develop your deployment model. There are no hard-and-fast rules that you must
follow. However, Intel reco mme nds tha t you be gin your use of IPSe c an d Pack et
Protect slowly in your enterprise. You should consid er starting with a sm all
group t hat use the same pre-sh ared key and default System Policy. When you’ ve
had a chance to evalu ate this first implementation phase, you can t hen decide
how to expand your use of Packet Protect.
14
Set Up Intel Adapters
Before you install Packet Protect, install the necessary Intel adapters on your
serve rs and clients th at will use Packet Protect. Packet Protect only operates
with Intel adapters that are configured to use Intel drivers.
Insta ll Int e l A d apte rs
Packet Protect works with Intel adapters that are designed to offload CPU-intensive tasks to the adapter. This helps reduce the impact to network performance
and CPU util ization. Intel adapters that support the offload capabil ities include
the following:
•Intel PRO/100 S Server Adapter
•Intel PRO/100 S Managemen t Adapter
Installing Packet Protect
Note:
Note:
Although Intel adapters can be installed on various operating
systems , P acket Prot ect supports only Windows NT* 4.0 wit h
Service Pack 5.
Packet Protect also works with the following Intel adapters,
but security tasks will not offload to these adapters, and network performance will be affected.
PRO/10+ PCI LAN adapter
PRO/10 0B LAN ad apter
PRO/100B T4 LAN adapter
PRO/100+ LAN adapter
PRO/100+ Management adapter
PRO/100+ Server adapter
PRO/100+ Dual Port Server adapter
PRO/100 CardBus II
PRO/100 RealPort
PRO/100 LAN+Modem56 CardBus II
PRO/100 LAN+Modem56 RealPort
TM
CardBus II
TM
Cardbus II
Install Intel adapters for the servers and clie nts that use Packet Protect.
To install Intel adapters
1.Refer to the Installation Guide that came wit h the adapters for information
about in stallation
2.After instal lation, verify network access for each computer that wil l use
Packe t Prot ect b y che cki ng the Li nk a nd Acti v it y LEDs o n the ada pte r . You
can also double-click Network Neighborhood on a computer’s desktop to
verify tha t other ar e as of th e network are vi si ble.
Configure Intel Adapters
After you install adap ters in the compu ters that will use Packet Pro tect, configure them, as necessary, before yo u install Packet Protect. For example, you
15
Intel® Packet Protect User’s Guide
might instal l m ul tiple ad a pt ers on a server. Then you might te am those ad apter s
together to take advantage of adapter fault tolerance or adaptive load balancing.
Multip le A d ap t e rs
If you install multiple adapters in one computer, note the following:
•Install multiple adapters before installing Packet Protect.
•Each computer has only one sec urity policy. This means that the same
security settings will apply to all of the adapters in one computer.
•If you us e at least one Int el PRO/100 S Server or Management adapter in a
computer, Packet Protect will be able to offloa d encryption and aut hentication tasks to that adapter.
•If you need to add or remove an adapter from a team after you install
Packet Protect, you must uninstall Packet Protect from that computer, add
or remove the necessa ry adapters, and th en reinstall Packet Protect .
When you uninstall Packet Protect, you lose all of your customized information, including rules and security actions. When you reinstall Packet
Protect, you will only have the single Default Rule in your System Policy.
Adapter Teaming
Adapter Teaming and Packet Protect work together only for computers with
Windows NT operating s ystem installed. If you set up A dapter Teaming for multiple a dapters, keep the following in mind:
16
•Configure Adapter Teaming before inst alling Packet Protect.
•Refer to the previous page to make sure all adapters in the team are either
off load-enabled Intel adapters, or appear in the list of compatible Intel
adapters on the previous page.
•If you need to add or remove an adapter from a team after you install
Packet Protect, you must uninstall Packet Protect from that computer, add
or remove the necessa ry adapters, and th en re-install Packet Protect.
•Consider using high-s peed adapters to limit upgrading.
Install Packet Protect
Before you install Packet Protect on your computer, make sure the computer
meets the following system requirements. Packet Protect computers can be servers or workstations.
System Requirements
Before installing P acket Protect, make sure your computers meet these requirements:
•Windows NT 4.0 with Service Pack 5 or 6a (or higher)
•40 MB available disk s pace
•32 MB RAM minimum, 64MB RAM recommended
®
•200 MHz Pentium
•Intel adapter (PRO/100 family)
Licensing
All inst allations are subject to the e nd user’s acceptance of th e applicable Intel
Software License Agreement.
Note
:See “Install Intel Adapters” on page 15 for information on
choosing an Int el ada pt er.
processor performance level or higher recommended
Installing Packet Protect
Install Packet Protect
You will need the information detailed in the following table during Packet Protect in stallation at each computer. To complete the installation most efficiently,
gather the following information before you begin.
Information
You Need
Default
behavior
Pre-shared key Enter a pre-shared key the computer will use to
Table 2: Required Information
Description
Decide how you want the computer to communicate
with other computers on the network:
• Secure Responder
• Secure Initiator
•Lockdown
For more information about these settings, see
“Default Behaviors for Packet Protect Computers” on
page 22.
communicate securely with other IPSec computers. A
pre-shared key is similar to a secret password.
17
Intel® Packet Protect User’s Guide
T o install Packet Protect
1.Verify that the computer you have chosen meets the minimum requirements detailed under “System Requirements” on page 17.
2.I nse rt th e pr odu ct CD- R OM into the CD-ROM driv e at t he com puter wh ere
you want to install Packet Protect.
3.Browse to the CD-ROM using Windows Explorer.
4.Double-click d:\packet protect\setup.exe , where d:\ is the dri ve of your CD ROM drive.
5.Follow the dialog box instruc tions on the screen.
Keep a confidenti al record of the information you enter. If you need to rein stall
Packet Protect later, you will need to re-ent er this information.
Notes:
If the static IP address or the DNS name of the computer
changes , y ou must restore the S ystem Policy. Y o u will lose all
your customizations when you restore the System Policy.
Also, if there are other computers in the network that have
rules that apply to the computers whose IP address or DNS
name changes, the rules of those computers need to be
changed. For information on restoring the System Policy, see
“Restore the Syst em Policy” on page 42.
You can also install from a mapped drive where you have
stored the Packet Protect installation files.
If you already have adapter teaming installed on the system,
there’s no need to re-enter the TCP/IP settings during Packet
Protect installation (you are not prompted for this information).
To verify that Packet Protect is install ed and running on a computer:
1.At the taskbar on the com puter, select Settings > Cont rol Panel.
2.Double -c lick Services and verify that Int el Po lic y A ge n t is starte d .
If Inte l Policy Agent doesn’t appear in the list, Packet Protect has been shut
down or is not functioning properly. See “T urn Security on Manually for an
Existi ng Com puter” on page 47 for details about restarting Packet Protect.
See the cha p ter “Troubleshooting and FAQ s” on page 49 for general tr oubleshooting guidelines and a l ist of common Packet Protect ins tallation problems
and thei r solutions.
18
View Your Security Settin gs
During installation, you set up basic security sett ings for the computer—the
authent icat i on meth od and the def aul t beha vi or for the cl ie nt. To view your security settings, double-click Intel(R) Packet Protect at the Control Panel. The
authentication setting and default behavior you chose during installation appear
in the Security tab.
Installing Packet Protect
See the next chapter for information on editing basic settings and configuring
advanc e d se cu rity se tt in gs.
19
Loading...
+ 57 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.