Customer Tips: Ipsec Client/Server Configuration Using Pre-Shared Keys in Windows Environments
Customer Tips: Ipsec Client/Server Configuration Using Pre-Shared Keys in Windows Environments
Customer Tips: Ipsec Client/Server Configuration Using Pre-Shared Keys in Windows Environments
Customer Tips
dc06cc0390 August 4, 2006
A client can use an IPSec tunnel as one method of secure printing available to Xerox devices. The IPSec protocol uses strong cryptography to provide both authentication and encryption services. By using the service you create a secure tunnel to transfer data safely through un-trusted networks. In essence you are creating a VPN (virtual private network). This document includes the following information: Configuration of the IPSec client/server in Windows 2000 with Service Pack 4, 2003 Server and XP environments A test of the client setup Configuration of IPSec on a Xerox device
IPSec Terminology
This section is part of an article in Microsofts Knowledge Base (Article 301284). It defines some of the terms you may encounter while setting up IPSec. Authentication: The process to determine if the identity of a computer is legitimate. Windows 2000/XP IPSec supports three kinds of authentication: Kerberos, certificates, and preshared keys. Kerberos authentication can work only if both endpoints (computers) are in the same Windows 2000/XP domain. If the computers are in different domains, or at least one of them is not in a domain, you must use either certificates or preshared keys. Certificates can work only if each endpoint contains a certificate that is signed by an authority that the other endpoint trusts. Preshared keys have the same problems that passwords do: They do not remain secret for a very long period of time. If the endpoints are not in the same domain and you cannot obtain certificates, preshared keys are your only authentication option. Encryption: The process of making data indistinct in preparation for transmission between two endpoints. By using well-tested algorithms, each endpoint constructs and exchanges cryptographic keys. The process ensures that only the endpoints know the
Page 1
keys; and if any key-exchange sequences are intercepted, the interceptor obtains nothing of value. Xerox devices support DES and 3DES encryption types. Filter: A description of the Internet Protocol (IP) addresses and protocols that can trigger the establishment of an IPSec security association. Filter action: The security requirements that are enabled when the traffic matches the filters in a filter list. Filter list: A collection of filters. Internet Protocol security policy: The collection of rules that describe how communications between computers are secured. Rule: The link between a filter list and a filter action. When the traffic matches a filter list, the corresponding filter action is triggered. An IPSec policy can contain multiple rules. Security association: The collection of authentication and encryption methods that the endpoints negotiate to establish a secure session.
To create a new policy and the rules that go with it, first define the filter lists and filter actions.
Page 2
2. On the Manage IP Filter Lists tab click Add. 3. On IP Filter List enter a Name for the filter list, for example, My Xerox Printer Filter. Click Add again to start the IP Filter Wizard.
Page 3
5. Click Next. For the Destination Address select A specific IP Address and enter in the IP address of the Xerox device.
Page 4
6. Click Next. For Select a protocol type select Any. This forces any protocol using TCP/IP to run over IPSec through the connection from the Source Address to the Destination Address.
7. Click Next. Click Finish then OK. The name of the filter list you created, for example, My Xerox Printer Filter, appears in the list of available IP filters on the Manage IP filter lists and filter actions window.
2. Click Add to start the Filter Action Wizard, then click Next. dc06cc0390 Customer Support
Page 5
3. Enter a name for the filter action, for example, My Xerox Printer Action, then click Next.
Page 6
5. Verify Do not communicate with computers that do not support IPSec is selected, then click Next.
Page 7
7. In the Encryption algorithm field select 3DES. Leave other settings/entries as they are.
8. Click OK. If a security warning appears, click OK then click Next. 9. Click Finish. The filter action you created, for example, My Xerox Printer Action, appears in the list of available Filter Actions. 10. Double-click the action you just created to edit its Properties.
11. Verify the Accept unsecured communication, but always respond using IPSec.and Allow unsecured communication with non-IPSec-aware computer are not checked. 12. Check Session key perfect forward secrecy (PFS). dc06cc0390 Customer Support
Page 8
Page 9
4. Click Next, then click Finish. 5. The New IP Security Policy Properties window appears. Click Add to start a new rule.
6. Click Next to start the Security Rule Wizard. 7. For the Tunnel Endpoint select This rule does not specify a new tunnel then click Next.
Page 10
9. Click Next. Select Use this string to protect the key exchange (preshared key): for the Authentication Method. Note: This document only describes the preshared key authentication method. Other authentication methods are available.
10. Enter a string of alphanumeric characters to serve as the preshared key. IMPORTANT: You must duplicate this string in the Xerox device IPSec configuration process described in the next section, Configuring IPSec on a Xerox Device.
Page 11
11. Click Next. Select the filter created earlier (for example, My Xerox Printer Filter) from the list.
12. Click Next. Select the filter action created earlier (for example, My Xerox Printer Action) from the list.
13. Click Next then Finish. 14. Click OK then Close. 15. To activate the policy, on the Local Securities Settings window select IP Security Policies on Local Machine in the left hand pane, then right click on the My Xerox Printer Policy and select Assign.
Page 12
Page 13
3. Select Self Signed Certificate: Establish a Self Signed Certificate on this machine then click Continue.
Enter information for a self-signed certificate. The country code field entry is required. 4. Click Apply. The Administrator Authentication screen may appear. Enter the current User Name and Password and click OK. The SSL page appears and shows that the device has a Self Signed Certificate.
Page 14
2. Click Create New Certificate. Select Certificate Signing Request: Download a Certificate Signing Request to be processed by a Trusted Certificate Authority then click Continue.
3. Enter the information you wish to appear in your Certificate Signing Request.
4. Click Apply. The Administrator Authentication screen may appear. Enter the current User Name and Password and click OK.
Page 15
5. The certificate request information you entered is displayed. Below this data, rightclick the link and select Save Target As.
6. Save the .pem.txt file and send it to a trusted certificate authority. A status message appears on the SSL page indicating a Certificate Signing Request is pending.
You receive notification of the signed certificate in a manner that complies with the policy of the authority issuing the certificate (for example, via email). 1. When you receive the signed certificate, access the SSL page again and click Upload Signed Certificate. 2. Click Browse, locate the certificate (.pem file), and click Upload Certificate. 3. Current Status on the SSL page shows a Signed Certificate resides on the device.
Enable SSL
After a certificate exists you can enable SSL. 1. Enter the IP address or host name of the WorkCentre or WorkCentre Pro in a browser Address field. Select the Properties tab, expand Security and select SSL. 2. Select the Protocol Enabled box and click Apply.
Page 16
Enable IPSec
1. Enter the IP address or host name of the WorkCentre or WorkCentre Pro in the browser Address field. 2. Select the Properties tab and expand Security. Select IP Sec.
3. Check the Enabled box. 4. If required, click Flush All IP Sec Connections. 5. In the Shared Secret field, enter the pre-shared key string you entered in the Authentication Method screen of the Security Rule Wizard (see Creating an IP Security Policy Rule).
Now, when you send a print job try print to the device from an application, it is using IPSec. dc06cc0390 Customer Support
Page 17
Additional Information
Xerox Customer Support welcomes feedback on all documentation - send feedback via e-mail to: USA.DSSC.Doc.Feedback@mc.usa.xerox.com. You can reach Xerox Customer Support at 1-800-821-2797 (USA), TTY 1-800-855-2880 or at http://www.xerox.com. Other Tips about Xerox multifunction devices are available at the following URL: http://www.office.xerox.com/support/dctips/dctips.html.
XEROX , The Document Company , the digital X , and all Xerox product names are trademarks of XEROX CORPORATION. Other trademarks belong to their respective owners. Copyright XEROX CORPORATION 2006. All Rights Reserved.
Page 18