
13.6
Using IPsec communication
13
[Web Management Tool]
13-12
13.6
Using IPsec communication
Configure the setting if your environment requires IPsec.
The IPsec technology prevents the falsification or leakage of data on the IP packet basis by using encryption
technology. As IPsec encrypts data in the network layer, secure communication is ensured even if you use
protocols in an upper layer or applications that do not support encryption.
1
In the administrator mode, select [Network] - [TCP/IP Setting] - [IPsec] - [IPsec Setting], then click [OK].
2
Click [Edit] from [IKEv1] or [IKEv2] in [IPsec Setting], then configure the following settings.
3
From [SA] in [IPsec Setting], click [Create] and register the Security Association (SA).
%
Up to 10 groups can be registered for the SA.
Settings
Description
[Encryption Algorithm]
Select the encryption algorithm to create a common key used for communica-
tion.
[Authentication Algo-
rithm]
Select the authentication algorithm to create a common key used for commu-
nication.
[Encryption Key Validity
Period]
Specify the validity period of a common key to securely create a common key
used to encrypt communications.
When this period has expired, a new key is created. This can secure the com-
munication.
[Diffie-Hellman Group]
Select the Diffie-Hellman group.
[Negotiation Mode]
Select the method to securely create a common key used to encrypt commu-
nications.
Settings
Description
[Name]
Enter the SA name (using 1 to 10 characters, excluding ").
[Encapsulation Mode]
Select an IPsec operation mode.
[Security Protocol]
Select a security protocol.
[Key Exchange Meth-
od]
Select the key replacement method to securely create a common key used to
encrypt communications.
[Tunnel End Point]
Enter the IP address of the peer's IPsec gateway.
This is required when [Tunnel] is selected in [Encapsulation Mode].
[Lifetime After Estab-
lishing SA]
Enter the lifetime of a common key used to encrypt communications.
[IKE Setting]
Configure IKE settings used for this SA.
This is required when [IKEv1] or [IKEv2] is selected in [Key Exchange Method].
Summary of Contents for D310 Series
Page 12: ...1 Web Connection...
Page 14: ...2 Operations Required to Use Web Connection...
Page 18: ...3 Basic Usage...
Page 40: ...4 ConfiguringBasicInformation Settings of this Machine...
Page 44: ...5 Configuring Network Settings of this Machine...
Page 56: ...6 Setting up the Operating Environment of Web Connection...
Page 61: ...6 4 Changing the time period until automatic log out 6 Web Management Tool 6 6...
Page 62: ...7 Configuring the Scan Environment...
Page 82: ...8 Configuring the Printing Environment...
Page 106: ...9 Configuring the Fax Environment...
Page 120: ...10 Configuring the Network Fax Environment...
Page 132: ...11 Configuring the User Box Environment...
Page 148: ...12 Restricting Users from Using this Device...
Page 199: ...12 22 Using a mobile terminal for authentication purposes 12 Web Management Tool 12 52...
Page 200: ...13 Reinforcing Security...
Page 226: ...14 Managing the Machine Status...
Page 264: ...15 Registering Various Types of Information...
Page 292: ...16 Associating with External Application...
Page 324: ......