
[Web Management Tool]
13-13
13.6
Using IPsec communication
13
[Authen-
tication
Method]
Select an authentication method.
[Local
Authenti-
cation
Method]
Select the authentication method of this machine when [IKEv2] is selected in
[Key Exchange Method].
[Peer Au-
thentica-
tion
Method]
Select the peer authentication method when [IKEv2] is selected in [Key Ex-
change Method].
[ESP En-
cryption
Algo-
rithm]
If you select [ESP] for [Security Protocol], configure the ESP encryption algo-
rithm.
[ESP Au-
thentica-
tion
Algo-
rithm]
If you select [ESP] for [Security Protocol], configure the ESP authentication al-
gorithm.
[AH Au-
thentica-
tion
Algo-
rithm]
If you select [AH] for [Security Protocol], configure the AH authentication algo-
rithm.
[Perfect
Forward-
Secrecy]
Select this check box if you wish to increase the IKE strength.
Selecting this check box increases the time spent for communication.
[Diffie-
Hellman
Group(IK
Ev1)]/[Dif
fie-Hell-
man
Group(IK
Ev2)]
Select the Diffie-Hellman group.
[Manual Key Settings]
When using a device that does not support automatic key exchange using IKE,
configure each parameter manually.
This is required when [Manual Key] is selected in [Key Exchange Method].
[Encryp-
tion Algo-
rithm]
Select the algorithm to be used for encryption.
[Authen-
tication
Algo-
rithm]
Select the algorithm to be used for authentication.
[SA In-
dex]
Specify the SA Security Parameter Index to be added to the IPsec header.
[Com-
mon Key
Encryp-
tion]
Specify the common key used for encryption.
You can specify different common keys respectively for send and receive.
[Com-
mon Key
Authenti-
cation]
Specify the common key used for authentication.
You can specify different common keys respectively for send and receive.
Settings
Description
Summary of Contents for D310 Series
Page 12: ...1 Web Connection...
Page 14: ...2 Operations Required to Use Web Connection...
Page 18: ...3 Basic Usage...
Page 40: ...4 ConfiguringBasicInformation Settings of this Machine...
Page 44: ...5 Configuring Network Settings of this Machine...
Page 56: ...6 Setting up the Operating Environment of Web Connection...
Page 61: ...6 4 Changing the time period until automatic log out 6 Web Management Tool 6 6...
Page 62: ...7 Configuring the Scan Environment...
Page 82: ...8 Configuring the Printing Environment...
Page 106: ...9 Configuring the Fax Environment...
Page 120: ...10 Configuring the Network Fax Environment...
Page 132: ...11 Configuring the User Box Environment...
Page 148: ...12 Restricting Users from Using this Device...
Page 199: ...12 22 Using a mobile terminal for authentication purposes 12 Web Management Tool 12 52...
Page 200: ...13 Reinforcing Security...
Page 226: ...14 Managing the Machine Status...
Page 264: ...15 Registering Various Types of Information...
Page 292: ...16 Associating with External Application...
Page 324: ......