Set Up Your System Policy

You set up basic security settings when you install Intel Packet Protect. If you are familiar with encryption and authentication settings you can use the advanced settings in Intel Packet Protect to configure specific security settings to apply to different types of communication. Intel Packet Protect comes with a system policy that contains advanced security settings.

What I a Policy?

A policy helps determine how the systems you manage communicate with each other and with other systems on the network. Policies contain one or more rules and use rules to specify how systems on the LAN communicate in a protected way. Your Intel Packet Protect policy comes with pre-defined rules. Each rule has its own set of conditions that, if matched, apply defined security settings. You can edit the pre-defined rules or create new rules for your policy.

What Is a Rule?

A rule defines how you want to communicate with other systems on the network. For example, one rule can define how to communicate with a file server using specific security settings. Another can define an entire group of systems for which communication will always be allowed "in the clear" (without security).

The rules in your system policy are listed in the Policy Editor. To view the Policy Editor, click Advanced on the Security tab.

Every rule contains the information described in the following table.

Rule Settings

Rule Setting

Description

Destination workgroup

Collection of systems with which a system communicates.

Security action

Collection of security settings used when negotiating a communication.

Rule failure

Definition of what happens when the rule is applied, but the communication is not negotiated successfully. You can allow the communication to occur unsecured, or deny the communication.

Authentication

Definition of how your system verifies the other system's pre-shared key when the rule is applied. You can use the authentication settings already specified for your system (on the Security tab), or use custom settings for the rule (propose a pre-shared key).


Copyright © 2000, Intel Corporation. All rights reserved.

Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.

* Other product and corporate names may be trademarks of other companies and are used only for explanation and to the owners' benefit, without intent to infringe.