• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH pr ESP protocol
When combined, the ESP and AH protocols provide secure transmission through both encryption
and authentication. These protocols provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
• Some operating systems use the term "Compliance" in place of "Authentication".
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings
This machine provides two key setting methods: manual and auto exchange. Using either of these
methods, agreements such as the IPsec algorithm and key must be specified for both sender and
receiver. Such agreements form what is known as an SA (Security Association). IPsec communication is
possible only if the receiver's and sender's SA settings are identical.
If you use the auto exchange method to specify the encryption key, the SA settings are auto configured
on both parties' machines. However, before setting the IPsec SA, the ISAKMP SA (Phase 1) settings are
auto configured. After this, the IPsec SA (Phase 2) settings, which allow actual IPsec transmission, are
auto configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time
limit) for its settings. This machine only supports IKEv1 for encryption key auto exchange.
If you specify the encryption key manually, the SA settings must be shared and specified identically by
both parties. To preserve the security of your SA settings, we recommend that they are not exchanged
over a network.
Note that for both the manual and auto method of encryption key specification, multiple settings can be
configured in the SA.
5. Enhanced Network Security
150
Summary of Contents for Aficio MP C3002
Page 7: ...6 ...
Page 15: ...1 Manuals Provided with This Machine 14 ...
Page 39: ...2 Safety Information 38 ...
Page 51: ...3 Information for This Machine 50 ...
Page 54: ...Cover Paper Thickness 0 10 Body Paper Thickness 0 08 Pages in Book 0 Spine Width 0 2011 ...
Page 60: ......
Page 65: ...INDEX 235 5 ...
Page 86: ...1 What You Can Do with This Machine 26 ...
Page 126: ...2 Getting Started 66 ...
Page 128: ...7 When the copy job is finished press the Reset key to clear the settings 3 Copy 68 ...
Page 197: ...Storing the Scanned Documents to a USB Flash Memory or SC Card 6 126D ...
Page 201: ...7 Document Server 130 ...
Page 205: ...8 Web Image Monitor 134 ...
Page 235: ...9 Adding Paper and Toner 164 ...
Page 303: ...10 Troubleshooting 232 ...
Page 309: ...MEMO 238 ...
Page 310: ...MEMO 239 ...
Page 311: ...MEMO 240 EN GB EN US EN AU D143 ...
Page 312: ... 2011 ...
Page 313: ...GB EN D143 7003 US EN AU EN ...
Page 320: ......
Page 360: ...3 Installing the Scanner Driver 40 ...
Page 372: ...5 Troubleshooting 52 ...
Page 378: ...6 Installing the Printer Driver Under Mac OS X 58 ...
Page 382: ...3 Quit uninstaller 7 Appendix 62 ...
Page 386: ...MEMO 66 ...
Page 387: ...MEMO 67 ...
Page 388: ...MEMO 68 EN GB EN US EN AU D143 7038 ...
Page 389: ......
Page 390: ...EN GB EN US EN AU D143 7038 2011 ...
Page 392: ......
Page 398: ...6 ...
Page 440: ...MEMO 48 EN GB EN US EN AU D143 7042 ...
Page 441: ......
Page 442: ...EN GB EN US EN AU D143 7042 2011 ...
Page 444: ......
Page 454: ...10 ...
Page 472: ...1 Getting Started 28 ...
Page 540: ...3 Restricting Machine Usage 96 ...
Page 560: ...4 Preventing Leakage of Information from Machines 116 ...
Page 717: ...7 Press Yes 8 Log out Limiting Machine Operations to Customers Only 273 ...
Page 724: ...7 Managing the Machine 280 ...
Page 829: ......
Page 830: ...EN GB EN US EN AU D143 7040 2011 ...