• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol
Performs secure transmission using authentication only.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
• Some operating systems use the term "Compliance" in place of "Authentication".
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings
This machine provides two key setting methods: manual and auto exchange. Using either of these methods,
agreements such as the IPsec algorithm and key must be specified for both sender and receiver. Such
agreements form what is known as an SA (Security Association). IPsec communication is possible only if
the receiver's and sender's SA settings are identical.
If you use the auto exchange method to specify the encryption key, the SA settings are auto configured on
both parties' machines. However, before setting the IPsec SA, the ISAKMPSA (Phase 1) settings are auto
configured. After this, the IPsec SA (Phase 2) settings, which allow actual IPsec transmission, are auto
configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time limit)
for its settings. This machine only supports IKEv1 for encryption key auto exchange.
If you specify the encryption key manually, the SA settings must be shared and specified identically by both
parties. To preserve the security of your SA settings, we recommend that they are not exchanged over a
network.
Note that for both the manual and auto method of encryption key specification, multiple settings can be
configured in the SA.
Settings 1-4 and Default Setting
Using either the manual or auto exchange method, you can configure four separate sets of SA details
(such as different shared keys and IPsec algorithms). In the default settings of these sets, you can
include settings that the fields of sets 1 to 4 cannot contain.
When IPsec is enabled, set 1 has the highest priority and 4 has the lowest. You can use this priority
system to target IP addresses more securely. For example, set the broadest IP range at the lowest
priority (4), and then set specific IP addresses at a higher priority level (3 and higher). This way, when
IPsec transmission is enabled for a specific IP address, the higher level security settings will be applied.
5. Enhanced Network Security
124
5
Содержание Pro C550EX
Страница 9: ...INDEX 229 7...
Страница 18: ...1 Getting Started 16 1...
Страница 68: ...2 Authentication and its Application 66 2...
Страница 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Страница 96: ...3 Ensuring Information Security 94 3...
Страница 102: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user 4 Managing Access to the Machine 100 4...
Страница 104: ...4 Managing Access to the Machine 102 4...
Страница 148: ...5 Enhanced Network Security 146 5...
Страница 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Страница 162: ...6 Specifying the Extended Security Functions 160 6...
Страница 180: ...7 Troubleshooting 178 7...
Страница 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Страница 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Страница 233: ...MEMO 231...
Страница 234: ...MEMO 232 EN USA D0797508...
Страница 236: ...Operating Instructions Security Reference D079 7508 EN USA Type for Pro C550EX Type for Pro C700EX...