Items
Settings and Explanation
Service Name
If you select
Service Name
for
Method of Choosing Port
, select an option.
Transport Protocol
If you select
Port Number
for
Method of Choosing Port
, you need to configure
an encapsulation mode.
Any Protocol
Select this to control all protocol types.
TCP
Select this to control data for unicast.
UDP
Select this to control data for broadcast and multicast.
ICMPv4
Select this to control ping command.
Local Port
If you select
Port Number
for
Method of Choosing Port
and if you select
TCP
or
UDP
for
Transport Protocol
, enter port numbers to control receiving packets,
separating them with commas. You can enter 10 port numbers at the maximum.
Example: 20,80,119,5220
If you do not enter a port number, all ports are controlled.
Remote Port
If you select
Port Number
for
Method of Choosing Port
and if you select
TCP
or
UDP
for
Transport Protocol
, enter port numbers to control sending packets, sep-
arating them with commas. You can enter 10 port numbers at the maximum.
Example: 25,80,143,5220
If you do not enter a port number, all ports are controlled.
IKE Version
Displays the IKE version.
Authentication Method
If you select
IPsec
for
Access Control
, select an option.
Pre-Shared Key
Enter a pre-shared key between 1 and 127 characters.
Confirm Pre-Shared Key
Enter the key you configured for confirmation.
Encapsulation
If you select
IPsec
for
Access Control
, you need to configure an encapsulation
mode.
Transport Mode
If you only use the printer on the same LAN, select
this. IP packets of layer 4 or later are encrypted.
Tunnel Mode
If you use the printer on the Internet-capable network
such as IPsec-VPN, select this option. The header and
data of the IP packets are encrypted.
Remote Gateway(Tunnel Mode)
If you select
Tunnel Mode
for
Encapsulation
, enter a gateway address between
1 and 39 characters.
Security Protocol
If you select
IPsec
for
Access Control
, select an option.
ESP
Select this to ensure the integrity of an authentication
and data, and encrypt data.
AH
Select this to ensure the integrity of an authentication
and data. Even if encrypting data is prohibited, you
can use IPsec.
Network Guide
Security Settings
42