![Xerox WORKCENTRE 5755 System Administrator Manual Download Page 182](http://html1.mh-extra.com/html/xerox/workcentre-5755/workcentre-5755_system-administrator-manual_3560762182.webp)
Security
Xerox WorkCentre 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide
174
3.
To add or edit a Protocol Group in the
IP Protocol Groups
area click on either the
[Add New
Protocol Group]
button or highlight a Protocol Group and click on the
[Edit]
button.
Note:
If you change the name of a Protocol Group that is being used in Security policy, then the
updated protocol group name will also be reflected in the security policy entry.
a.
In the
IP Protocol Group Details
area, enter the name of the protocol group in the
[Group
Name]
field.
b.
Enter description for this protocol group in the
[Description]
field.
c.
Check the required services checkboxes for this protocol group under
[Service Name]
.
4.
In the
Custom Protocol
area:
a.
Check the corresponding checkboxes to select or deselect a custom protocol. Enter details in
the
[Service Name]
field.
b.
From the
[Protocol]
drop-down menu select the protocol type.
c.
Enter the port number in the
[Port]
field.
d.
From the
[Device is]
drop-down menu, select either
[Server]
or
[Client]
.
Note:
The
Service Name
,
Protocol Type
,
Port Number
and
Device is
fields for a Custom Protocol
will be disabled when its associated checkbox is unchecked.
5.
Click on the
[Save]
button to return to the
IPSec
page.
Actions
This option displays the list of actions associated with the IPsec security policies. You can view and
manage IP actions that can be used in the security policies.
1.
From the
IP Sec
page, click on the
[Actions]
tab under
IPsec
heading.
2.
To delete an Action, highlight an Action in the
IP Actions
area and click on the
[Delete]
button. If
the Action selected is not being used by a security policy, then click on the
[OK]
button.
3.
To add or edit an Action, in the
IP Protocol Group
area:
a.
Click either on the
[Add New Action]
button to add a new Action or highlight an Action and
click on the
[Edit]
button to edit details of an Action.
Note:
If you change the name of an Action that is being used in Security policy, then the updated
action name will also change in the security policy entry.
4.
Step 1 of 2
page displays, in the
IP Action Details
area:
a.
Enter a name for this IP Action in the
[Action Name]
field.
b.
Enter description for this IP Action in the
[Description]
filed.
5.
In the
Keying Method
area:
a.
Select a Keying Method. This will specify the type of authentication used in an IP Sec policy.
Select one of the following:
•
Manual Keying
- this method is used if client devices are not configured for, or do not
support, IKE.
•
Internet Key Exchange (IKE)
- this is a keying protocol that works on top of IPsec. IKE
offers a number of benefits including: automatic negotiation and authentication; anti-
replay services; certification authority (CA) support; and the ability to change encryption
keys during an IPsec session. Generally, IKE is used as part of virtual private networking.
Summary of Contents for WORKCENTRE 5755
Page 12: ...Introduction Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 4...
Page 196: ...Security Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 188...
Page 256: ...E mail Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 248...
Page 300: ...LAN Fax Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 292...
Page 356: ...Index Xerox WorkCentre 5735 5740 5745 5755 5765 5775 5790 System Administrator Guide 348...