8 [Administration] Tab Page
176 [Setup] Item List
Setting up IP Security
With the IP security function, you can enable data encryption communication using IPsec (IP Security Protocol).
With the [Flush Connections] button, if the keys for IPsec communication are leaked or a security violation occurs, you
can manually delete (flush) the current session with the flush connection function and start a new session. If you want
to delete the information of SAD (Security Association Database) for any reason, you can delete it in the same way.
Item name
Description
1
[Return] button
Closes the [IP Security] screen.
2
Enable IPsec
Specify whether or not to enable IPsec.
y
Enable
— Enables IPsec.
y
Disable
— Disables IPsec.
3
Policy
Select a policy to use in IPsec.
To enable data encryption communication using IPsec, you must first create IPsec policies
according to your system environment.
P.185 “[Add Policy] / [Modify Policy] screen”
4
Filter
Creates a filter for the IPsec environment.
[Add] button
— You can add a filter on the [Add Filter] screen.
P.177 “[Add Filter] / [Modify Filter] screen”
[Delete] button
— Select filters to delete and click the [Delete] button to delete them.
Filter Name
— Click a registered filter name to modify its content.
P.177 “[Add Filter] / [Modify Filter] screen”
Filter Action
— Displays the action of the registered filter.
5
Manual Key
Set the IPsec manual key.
[Add] button
— You can add a manual key on the [Add Manual Key] screen.
P.179 “[Add Manual Key] / [Modify Manual Key] screen”
[Delete] button
— Select manual keys to delete and click the [Delete] button to delete
them.
Manual Key Name
— Click a registered manual key name to modify its content.
P.179 “[Add Manual Key] / [Modify Manual Key] screen”
Encryption Algorithm
— Displays the registered encryption algorithms.
6
IKE Key
Set the IPsec IKE key.
[Add] button
— You can add an IKE key on the [Add IKE] screen.
P.181 “[Add IKE] / [Modify IKE] screen”
[Delete] button
— Select keys to delete and click the [Delete] button to delete them.
Key Name
— Click a registered key name to modify its content.
P.181 “[Add IKE] / [Modify IKE] screen”
IKE Type
— Displays the registered IKE types.
7
Profile
First create a filter and a manual key or IKE key according to your IPsec environment, and
then create profiles by combining them.
[Add] button
— You can add a profile on the [Add Profile] screen.
P.183 “[Add Profile] / [Modify Profile] screen”
[Delete] button
— Select profiles to delete and click the [Delete] button to delete them.
Profile Name
— Click a registered profile name to modify its content.
P.183 “[Add Profile] / [Modify Profile] screen”
Profile Mode
— Displays the registered profile mode.
1
2
3
4
5
6
7
8
Содержание ES9455
Страница 22: ...1 Overview 20 Accessing TopAccess 6 The TopAccess website appears...
Страница 26: ......
Страница 52: ......
Страница 106: ......
Страница 140: ......
Страница 347: ...8 Administration Tab Page Registration Administration tab How to Set and How to Operate 345 8 Administration Tab Page...
Страница 348: ...8 Administration Tab Page 346 Registration Administration tab How to Set and How to Operate...
Страница 349: ...8 Administration Tab Page Registration Administration tab How to Set and How to Operate 347 8 Administration Tab Page...
Страница 350: ...8 Administration Tab Page 348 Registration Administration tab How to Set and How to Operate...
Страница 373: ...11 APPENDIX This chapter contains the following contents Installing Certificates for a Client PC 372...
Страница 380: ......
Страница 385: ...ES9455 MFP ES9465 MFP ES9475 MFP...
Страница 386: ...www okiprintingsolutions com Oki Data Corporation 4 11 22 Shibaura Minato ku Tokyo 108 8551 Japan 45686091EE...