Configuring the IPSec Settings
4XR3-0CY
By using IPSec, you can prevent third parties from intercepting or tampering with IP packets transported over the IP
network. Because IPSec adds security functions to IP, a basic protocol suite used for the Internet, it can provide
security that is independent of applications or network configuration. To perform IPSec communication with this
machine, you must configure settings such as the application parameters and the algorithm for authentication and
encryption. Administrator or NetworkAdmin privileges are required in order to configure these settings.
Communication mode
●
This machine only supports transport mode for IPSec communication. As a result, authentication and
encryption is only applied to the data portions of IP packets.
Key exchange protocol
This machine supports Internet Key Exchange version 1 (IKEv1) for exchanging keys based on the Internet
Security Association and Key Management Protocol (ISAKMP). For the authentication method, set either the pre-
shared key method or the digital signature method.
●
When setting the pre-shared key method, you need to decide on a passphrase (pre-shared key) in advance,
which is used between the machine and the IPSec communication peer.
●
When setting the digital signature method, use a CA certificate and a PKCS#12 format key and certificate to
perform mutual authentication between the machine and the IPSec communication peer. For more
information on registering new CA certificates or keys/certificates, see Registering a Key and Certificate
for Network Communication(P. 802) . Note that SNTP must be configured for the machine before it uses
this method. Making SNTP Settings(P. 67)
●
Regardless of the setting of <Format Encryption Method to FIPS 140-2> for IPSec communication, an
encryption module which has already obtained FIPS140-2 certification will be used.
●
In order to make IPSec communication comply with FIPS 140-2, you must set the key length of both DH and
RSA for IPSec communication to 2048-bit or longer in the network environment that the machine belongs to.
●
Only the key length for DH can be specified from the machine.
●
Take note when configuring your environment, as there are no settings for RSA in the machine.
●
You can register up to 10 security policies.
1
Press .
2
Press <Preferences> <Network> <TCP/IP Settings> <IPSec Settings>.
Managing the Machine
743
Summary of Contents for imageRUNNER ADVANCE C5535i III
Page 16: ...Setting Advanced Box to Public 79 Connecting to the Other Devices 84 Setting Up 2 ...
Page 37: ...LINKS Adapting to the Network Environment P 43 Setting Up 23 ...
Page 65: ...4 Press OK 5 Press Yes Setting Up 51 ...
Page 87: ...LINKS Faxing P 384 Options P 1513 Setting Up 73 ...
Page 119: ...Basic Operations 105 ...
Page 176: ...Starting the Remote UI P 784 Basic Operations 162 ...
Page 184: ...LINKS Hardware Specifications P 1485 Basic Operations 170 ...
Page 222: ... If you do not want to register settings select Unassigned Basic Operations 208 ...
Page 229: ...4 Press OK Basic Operations 215 ...
Page 279: ...7 Press Copying starts Copying 265 ...
Page 294: ...8 Press Start Copying Copying starts Copying 280 ...
Page 298: ... Copying starts Copying 284 ...
Page 322: ...8 Press Copying starts LINKS Making Booklets Booklet Copying P 299 Copying 308 ...
Page 337: ... Copying starts LINKS Inserting Sheets and Chapter Pages Insert Sheets P 317 Copying 323 ...
Page 344: ... Maximum number of job blocks that can be scanned 100 Copying 330 ...
Page 359: ...7 Select the number of sheets and press OK 8 Press Copying starts Copying 345 ...
Page 461: ...3 Click General Settings 4 Click Add Destination Faxing 447 ...
Page 513: ...LINKS Registering Destinations P 218 Scanning 499 ...
Page 543: ...Erasing Dark Borders When Scanning Erase Frame P 523 Scanning 529 ...
Page 549: ...Specifying E Mail Settings P 559 Scanning 535 ...
Page 641: ... N on 1 Print Comments Password to Open Doc Skip Blank Pages Using Storage Space 627 ...
Page 665: ...6 Click Fax Fax sending starts Linking with Mobile Devices 651 ...
Page 747: ...LINKS Specifying IP Addresses in Firewall Settings P 729 Managing the Machine 733 ...
Page 752: ...4 Press Apply Set Changes Yes Managing the Machine 738 ...
Page 782: ...LINKS Configuring the Forced Hold Printing Settings P 761 Managing the Machine 768 ...
Page 787: ...Restricting Copying Using a QR Code P 355 Managing the Machine 773 ...
Page 801: ...Settings Registration P 905 Managing the Machine 787 ...
Page 806: ...Starting the Remote UI P 784 Managing the Machine 792 ...
Page 1124: ... The reception speed set in RX Start Speed RX Start Speed P 1117 Settings Registration 1110 ...
Page 1237: ...6 Press OK Maintenance 1223 ...
Page 1453: ...Managing MEAP Applications P 1443 Managing MEAP Application Licenses P 1448 Appendix 1439 ...
Page 1507: ...Appendix 1493 ...
Page 1580: ...5 Close the right cover of the machine Appendix 1566 ...
Page 1595: ... 5 iproute 284 Squid 295 gst plugins base 341 webkit 352 ...
Page 1650: ... 60 libjpeg this software is based in part on the work of the Independent JPEG Group ...
Page 1663: ... 73 MD4 RSA Data Security Inc MD4 Message Digest Algorithm ...
Page 1850: ... 260 This file is distributed without any expressed or implied warranty ...
Page 2019: ...introduced by others ...