Security Features
ColorQube 8570/8870 Color Printer
System Administrator Guide
71
encryption algorithm and at least one hash algorithm. The combination of Null and None is not
valid. For ESP, only one pair of Inbound and Outbound SPI are used.
5.
If you select AH, Hash Algorithms you can select include
SHA1
and
MD5
. You must select at least
one hash algorithm. For AH, only one pair of Inbound and Outbound SPI are used.
6.
Next to
Inbound SPI
, change the SPI number to any unsigned 32 bit integer. The Inbound SPI
default is 0.
7.
Under
Inbound Decryption Key
and
Inbound Authentication Key
, type a hexadecimal value.
The Decryption Key must be an exact length for the following algorithms:
•
AES-CBC
: 32 hexadecimal characters.
•
3DES
: 48 hexadecimal characters.
•
DES
: 16 hexadecimal characters.
Authentication Key must be an exact length for the following algorithms:
•
SHA1
: 40 hexadecimal characters.
•
MD5
: 32 hexadecimal characters.
8.
Next to
Outbound SPI
, change the SPI number to any unsigned 32 bit integer. The Inbound SPI
default is 0.
9.
Under
Outbound Encryption Key
,
Outbound Encryption IV
and
Outbound Authentication Key
,
type a hexadecimal value. Encryption Key must be an exact length for these algorithms:
•
AES-CBC
: 32 hexadecimal characters.
•
3DES
: 48 hexadecimal characters.
•
DES
: 16 hexadecimal characters.
Encryption IV is optional. If used, it must be an exact length for these algorithms:
•
AES-CBC
: 32 hexadecimal characters.
•
3DES
: 16 hexadecimal characters.
•
DES
: 16 hexadecimal characters.
Authentication Key must be an exact length for these algorithms:
•
SHA1
: 40 hexdecimal characters.
•
MD5
: 32 hexadecimal characters.
IKE
If IKE is selected, configure the following:
1.
On the IKE Phase 1 Configuration Part 1 page, select
X.509 Certificate
, or
Pre-shared Key
as the
authentication mehod.
•
For X.509 Certificate, select the
Local Device Certificate
and
Remote Certificate Trust Point
from the list of certificates stored on the device. Certificates that have not been previously
configured must be configured for use with IPsec.
•
If Pre-shared Key is selected, type a pass phrase up to128 characters long. The field cannot be
blank, and cannot contain the following special characters:" ' & ? + = < > ;
2.
Click
Next
.
3.
On the IKE Phase 1 Configuration Part 2 page, select at least one IPsec encryption/hash
Authentication Transforms for use during IPsec protocol negotiation. A transform describes a
security protocol with its corresponding algorithms.
Summary of Contents for COLORQUBE 8570
Page 8: ...Contents ColorQube 8570 8870 Color Printer System Administrator Guide 8...
Page 18: ...Overview ColorQube 8570 8870 Color Printer System Administrator Guide 18...
Page 26: ...Network Installation Features ColorQube 8570 8870 Color Printer System Administrator Guide 26...
Page 84: ...Security Features ColorQube 8570 8870 Color Printer System Administrator Guide 84...
Page 102: ...Printer Commands ColorQube 8570 8870 Color Printer System Administrator Guide 102...