23.
Click [Finish], and then click [OK].
24.
Select the IP filter that you have just created, and then click [Next].
25.
Click [Add...] in the Filter Action.
The Filter Action Wizard appears.
26.
Click [Next].
27.
In [Name], enter a Filter Action name, and then click [Next].
28.
Select "Negotiate security", and then click [Next].
29.
Select one of options for computers allowed to communicate with, and then click [Next].
30.
Select "Custom" and click [Settings...].
31.
When [ESP] is selected for the machine in [Security Protocol] under [IPsec Settings], select
[Data integrity and encryption (ESP)], and configure the following settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for ESP]
specified on the machine.
Set the value of [Encryption algorithm] to the same value as the [Encryption Algorithm for ESP]
specified on the machine.
32.
When [AH] is selected for the machine in [Security Protocol] under [IPsec Settings], select
[Data and address integrity without encryption (AH)], and configure the following
settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for AH]
specified on the machine.
Clear the [Data integrity and encryption (ESP)] check box.
33.
When [ESP&AH] is selected for the machine in [Security Protocol] under [IPsec Settings],
select [Data and address integrity without encryption (AH)], and configure the following
settings:
Set the value of [Integrity algorithm] under [Data and address integrity without encryption (AH)] to
the same value as [Authentication Algorithm for AH] specified on the machine.
Set the value of [Encryption algorithm] under [Data integrity and encryption (ESP)] to the same
value as [Encryption Algorithm for ESP] specified on the machine.
34.
In the Session key settings, select "Generate a new key every", and enter the same
validity period (in seconds or Kbytes) as that specified for [Life Time] on the machine.
35.
Click [OK], and then click [Next].
36.
Click [Finish].
If you are using IPv6 under Windows Vista or a newer version of Windows, you must repeat this
procedure from Step 12 and specify ICMPv6 as an exception. When you reach Step 22, select
[58] as the protocol number for the "Other" target protocol type, and then set [Negotiate security]
to [Permit].
7. Appendix
98
Summary of Contents for SP 310 DN
Page 2: ......
Page 6: ...Trademarks 110 INDEX 113 4...
Page 14: ...12...
Page 26: ...1 Guide to the Machine 24...
Page 40: ...11 Click Close 2 Loading Paper 38...
Page 48: ...3 Printing Documents 46...
Page 74: ...5 Maintaining the Machine 72...
Page 94: ...6 Troubleshooting 92...
Page 107: ...USB 2 0 Wi Fi Printer language PCL6c Fonts 80 fonts Specifications of the Machine 105...
Page 114: ...7 Appendix 112...
Page 117: ...MEMO 115...
Page 118: ...MEMO 116 GB GB EN US EN AU M174 8600...
Page 119: ...2013...
Page 120: ...M174 8600 AU EN US EN GB EN...