Use Prefixed Template
Select
Custom
,
IKEv1 High Security
or
IKEv1 Medium Security
. The setting items are different depending
on the selected template.
The default template differs depending on whether you chose
Main
or
Aggressive
for
Negotiation Mode
on the
IPsec
configuration screen.
Internet Key Exchange (IKE)
IKE is a communication protocol that is used to exchange encryption keys in order to carry out encrypted
communication using IPsec. To carry out encrypted communication for that time only, the encryption algorithm
that is necessary for IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are
exchanged using the Diffie-Hellman key exchange method, and encrypted communication that is limited to
IKE is carried out.
If you selected
Custom
in
Use Prefixed Template
, select
IKEv1
.
Authentication Type
Configure the IKE authentication and encryption.
•
Diffie-Hellman Group
This key exchange method allows secret keys to be securely exchanged over an unprotected network.
The Diffie-Hellman key exchange method uses a discrete logarithm problem, not the secret key, to send
and receive open information that was generated using a random number and the secret key.
Select
Group1
,
Group2
,
Group5
, or
Group14
.
•
Encryption
Select
DES
,
3DES
,
AES-CBC 128
, or
AES-CBC 256
.
•
Hash
Select
MD5
,
SHA1
,
SHA256
,
SHA384
or
SHA512
.
•
SA Lifetime
Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).
Encapsulating Security
•
Protocol
Select
ESP
,
AH
or
AH+ESP
.
-
ESP is a protocol for carrying out encrypted communication using IPsec. ESP encrypts the payload
(communicated contents) and adds additional information. The IP packet is comprised of the header
and the encrypted payload, which follows the header. In addition to the encrypted data, the IP packet
also includes information regarding the encryption method and encryption key, the authentication data,
and so on.
-
AH is part of the IPsec protocol that authenticates the sender and prevents manipulation (ensures the
completeness) of the data. In the IP packet, the data is inserted immediately after the header. In
addition, the packets include hash values, which are calculated using an equation from the
communicated contents, secret key, and so on, in order to prevent the falsification of the sender and
manipulation of the data. Unlike ESP, the communicated contents are not encrypted, and the data is
sent and received as plain text.
•
Encryption
Select
DES
,
3DES
,
AES-CBC 128
, or
AES-CBC 256
. The encryption can be selected only when
ESP
is selected in
Protocol
.
•
Hash
Select
None
,
MD5
,
SHA1
,
SHA256
,
SHA384
, or
SHA512
.
When
AH+ESP
is selected in
Protocol
, select each protocol for
Hash(ESP)
and
Hash(AH)
.
•
SA Lifetime
Specify the IPsec SA lifetime.
470
Summary of Contents for DCP-L5500DN
Page 17: ...Related Information Introduction to Your Brother Machine 10 ...
Page 23: ...6 Press Med 7 Press Related Information Introduction to Your Brother Machine 16 ...
Page 25: ...Related Information Introduction to Your Brother Machine 18 ...
Page 61: ...Related Information Print from Your Computer Windows Print Settings Windows 54 ...
Page 72: ... Create or Delete Your Print Profile Windows Print Settings Windows 65 ...
Page 85: ...Related Information Print from Your Computer Macintosh Print Options Macintosh 78 ...
Page 90: ... Printing Problems 83 ...
Page 190: ...Related Information Scan Using Windows Photo Gallery or Windows Fax and Scan 183 ...
Page 206: ...Related Information Scan from Your Computer Macintosh TWAIN Driver Settings Macintosh 199 ...
Page 302: ...Home Fax PC FAX PC FAX PC FAX for Windows PC FAX for Macintosh 295 ...
Page 306: ... Transfer Faxes to Your Computer 299 ...
Page 323: ...Related Information Run Brother s PC FAX Receive on Your Computer Windows 316 ...
Page 371: ...364 ...
Page 411: ...Home Security Security Lock the Machine Settings Network Security Features 404 ...
Page 429: ...Related Information Use Active Directory Authentication 422 ...
Page 482: ...Related Information Configure an IPsec Template Using Web Based Management 475 ...
Page 490: ...483 ...
Page 521: ...Related Information ControlCenter4 Windows 514 ...
Page 544: ...5 Put the paper tray firmly back in the machine Related Information Paper Jams 537 ...
Page 551: ...Related Information Paper Jams 544 ...
Page 590: ... Clean the Corona Wire Clean the Drum Unit Clean the Paper Pick up Rollers 583 ...
Page 599: ...Related Information Clean the Machine Printing Problems 592 ...
Page 692: ...Related Information Appendix 685 ...
Page 695: ...Related Information Appendix Replace Supplies 688 ...
Page 704: ...X Xmit Report Transmission Verification Report Home Glossary 697 ...