Security Features
ColorQube 8570/8870 Color Printer
System Administrator Guide
72
4.
Next to
Key Lifetime
, type the lifetime and select
seconds
or kilobytes (
KB
). Kilobytes are based
on the amount of network traffic sent over the policy. Seconds are based on when the policy is
first connected to. Key Lifetime must be at least 12 seconds or 2560 KB. The default setting is
28800 seconds (8 hours).
5.
On the IKE Phase 2 Configuration page, under IKE Phase 2, select
Tunnel
or
Transport
as the
IPsec Mode
. The default setting is Transport.
6.
If Tunnel Mode is selected, type the
Remote Tunnel Address
up to 40 characters in length.
7.
Under
IPsec Proposal 1
,
2
and
3
, select IPsec encryption/hash pair SA Proposal Protocols for use
during IPsec protocol negotiation. Choose None, ESP+AH, ESP, or AH. A proposal is a hashing and
encryption method that the printer offers to another device connecting to it, during the setup of
an encrypted session. At least one of these proposals must match the proposals of a device that is
attempting to connect to the printer. The default setting is None. You must select at least one
proposal.
•
For ESP+AH, select IPsec Encryption Algorithms to provide confidentiality and Hash
Algorithms for authentication and integrity. Encryption Algorithms you can select include
Advanced Encryption Standard CBC (
AES-CBC 128bit
), Triple Data Encryption Standard
(
3DES
), and Data Encryption Standard (
DES
). Hash Algorithms you can select include
SHA1
and
MD5
. You must select at least one encryption algorithm and at least one hash algorithm.
•
For ESP, in addition to the algorithms supported for ESP+AH, you can select
Null Encryption
Algorithm
and
None
for Hash Algorithm. You must select at least one encryption algorithm
and at least one hash algorithm. The combination of Null and None is not valid.
•
For AH, Hash Algorithms you can select
SHA1
and
MD5
. You must select at least one hash
algorithm.
8.
Select the DH Group. Choose
None
or
Group 2 (1024-bit MODP)
. Diffie-Hellman (DH) groups are
used to determine the length of the base prime numbers used during the key exchange process.
The cryptographic strength of any key derived depends, in part, on the strength of the DH Group
upon which the prime numbers are based. Group 2 provides 1024 bits of keying strength.
9.
Next to
Key Lifetime
, type the lifetime and select
seconds
or kilobytes (
KB
). Kilobytes are based
on the amount of network traffic sent over the policy. Seconds are based on when the policy is
first connected to. Key Lifetime must be at least 12 seconds or 2560 KB. The default setting is
3600 seconds.
10. Click
Next
.
11. Click
Finish
.
12. Click
Apply
at the bottom of the page to update the IPsec Policy database and save the new
policies.
Modifying IPsec Actions
To view or modify an action, click the Name of the action. You can sort the list of actions by Name or
Description by clicking the column titles.
Summary of Contents for COLORQUBE 8570
Page 8: ...Contents ColorQube 8570 8870 Color Printer System Administrator Guide 8...
Page 18: ...Overview ColorQube 8570 8870 Color Printer System Administrator Guide 18...
Page 26: ...Network Installation Features ColorQube 8570 8870 Color Printer System Administrator Guide 26...
Page 84: ...Security Features ColorQube 8570 8870 Color Printer System Administrator Guide 84...
Page 102: ...Printer Commands ColorQube 8570 8870 Color Printer System Administrator Guide 102...