Manage Your Network Machine Securely Using IPsec
> IKEv1 Settings for an IPsec Template
IKEv1 Settings for an IPsec Template
Option
Description
Template Name
Type a name for the template (up to 16 characters).
Use Prefixed Template
Select
Custom
,
IKEv1 High Security
or
IKEv1 Medium Security
. The
setting items are different depending on the selected template.
The default template differs depending on whether you chose
Main
or
Aggressive
for
Negotiation Mode
on the
IPsec
configuration screen.
Internet Key Exchange (IKE)
IKE is a communication protocol that is used to exchange encryption
keys in order to carry out encrypted communication using IPsec. To
carry out encrypted communication for that time only, the encryption
algorithm that is necessary for IPsec is determined and the encryption
keys are shared. For IKE, the encryption keys are exchanged using the
Diffie-Hellman key exchange method, and encrypted communication
that is limited to IKE is carried out.
If you selected
Custom
in
Use Prefixed Template
, select
IKEv1
.
Authentication Type
•
Diffie-Hellman Group
This key exchange method allows secret keys to be securely
exchanged over an unprotected network. The Diffie-Hellman key
exchange method uses a discrete logarithm problem, not the
secret key, to send and receive open information that was
generated using a random number and the secret key.
Select
Group1
,
Group2
,
Group5
, or
Group14
.
•
Encryption
Select
DES
,
3DES
,
AES-CBC 128
, or
AES-CBC 256
.
•
Hash
Select
MD5
,
SHA1
,
SHA256
,
SHA384
or
SHA512
.
•
SA Lifetime
Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).
Encapsulating Security
•
Protocol
Select
ESP
,
AH
, or
AH+ESP
.
-
ESP is a protocol for carrying out encrypted communication
using IPsec. ESP encrypts the payload (communicated
contents) and adds additional information. The IP packet
comprises the header and the encrypted payload, which
follows the header. In addition to the encrypted data, the IP
packet also includes information regarding the encryption
method and encryption key, the authentication data, and so
on.
-
AH is part of the IPsec protocol that authenticates the
sender and prevents manipulation (ensures the
completeness) of the data. In the IP packet, the data is
inserted immediately after the header. In addition, the
packets include hash values, which are calculated using an
equation from the communicated contents, secret key, and
so on, in order to prevent the falsification of the sender and
manipulation of the data. Unlike ESP, the communicated
contents are not encrypted, and the data is sent and
received as plain text.
187
Summary of Contents for HL-J6000DW
Page 1: ...Online User s Guide HL J6000DW HL J6100DW 2018 Brother Industries Ltd All rights reserved ...
Page 13: ...Related Topics Near Field Communication NFC 8 ...
Page 17: ... Check the Ink Volume Page Gauge 12 ...
Page 22: ...Related Information Introduction to Your Brother Machine 17 ...
Page 23: ...Home Paper Handling Paper Handling Load Paper 18 ...
Page 38: ... Change the Paper Size and Paper Type 33 ...
Page 41: ... Paper Type and Size for Each Operation 36 ...
Page 194: ...Related Information Configure an IPsec Template Using Web Based Management 189 ...
Page 220: ...Related Information Set Up Brother Web Connect 215 ...
Page 286: ...Related Topics My Brother Machine Cannot Print over the Network 281 ...
Page 299: ... Clean the Print Head from Your Brother Machine 294 ...
Page 308: ...Related Topics Paper Handling and Printing Problems 303 ...
Page 317: ... Change the Print Setting Options When Having Printing Problems 312 ...
Page 373: ...Visit us on the World Wide Web www brother com UK Version 0 ...