
AH Protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. The authentication algorithm and authentication key are
specified automatically.
AH Pr ESP Protocol
When combined, the ESP and AH protocols provide secure transmission through both encryption
and authentication. These protocols provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. The encryption algorithm and encryption key are specified
automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. The authentication algorithm and authentication key are
specified automatically.
• Some operating systems use the term "Compliance" in place of "Authentication".
Security Association
This machine uses encryption key exchange as the key setting method. With this method, agreements
such as the IPsec algorithm and key must be specified for both sender and receiver. Such agreements
form what is known as an SA (Security Association). IPsec communication is possible only if the
receiver's and sender's SA settings are identical.
The SA settings are auto configured on both parties' machines. However, before the IPsec SA can be
established, the ISAKMP SA (Phase 1) settings must be auto configured. When this is done, the IPsec SA
(Phase 2) settings, which allow actual IPsec transmission, will be auto configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time
limit) for its settings. This machine only supports IKEv1 for encryption key exchange.
Multiple settings can be configured in the SA.
Settings 1-10
You can configure ten separate sets of SA details (such as different shared keys and IPsec
algorithms).
IPsec policies are searched through one by one, starting at [No.1].
12. Appendix
402
Summary of Contents for SP C260SFNw
Page 2: ......
Page 14: ...5 Click the manual you want to refer to The PDF file manual opens 12...
Page 23: ...DUE207 2 1 3 Interior 1 2 3 4 5 DUE212 Guide to Components 21...
Page 46: ...Deleting characters 1 Press or C to delete characters 1 Guide to the Machine 44...
Page 126: ...4 Copying Originals 124...
Page 176: ...5 Scanning Originals 174...
Page 294: ...9 Close the Web browser 8 Configuring the Machine Using Utilities 292...
Page 340: ...5 Clean the parts indicated below DUE322 6 Close the ADF cover 9 Maintaining the Machine 338...
Page 354: ...Main unit DUE292 1 3 2 1 DUE288 2 DUE289 10 Troubleshooting 352...
Page 355: ...3 DUE290 Paper feed unit DUE320 1 1 DUE291 Removing Paper Jams 353...
Page 363: ...DUE253 5 Close the ADF Removing Paper Jams 361...
Page 419: ...Weight Less than 4 kg 8 9 lb Specifications of the Machine 417...
Page 436: ...12 Appendix 434...
Page 441: ...MEMO 439...
Page 442: ...MEMO 440 EN GB EN US EN AU M0AX 8604C...
Page 443: ...2017 2020...
Page 444: ...M0AX 8604C AU EN US EN GB EN...