8.[Administration] Tab Page
[Setup] Item List 181
8 [Administration] Tab Page
4
Profile Name
Enter the profile name. You can enter up to 63 alphanumerical characters, including
hyphen (-) and underscore (_).
Up to 30 profiles can be created.
5
Tunnel Settings:
Tunnel mode
Select whether or not to use tunnel mode for IPsec communications.
y
Yes
— Select this to use the tunnel mode.
y
No
— Select this not to use the tunnel mode. (The transport mode will be used
instead.)
IPv4/IPv6 Address
Enter the IP address for the gateway which encrypts and decrypts data in tunnel
mode.
6
Key Selection:
Key
Displays the IKE key settings registered in the equipment. IKE keys already registered
in this equipment are displayed.
7
Proposals:
ESP Transforms
Specify the transform for ESP.
y
Integrity
— Selects the authentication algorithm to be used in ESP.
-
SHA1
— Select this to use SHA1.
-
MD5
— Select this to use MD5.
-
AES-XCBC
— Select this to use AES-XCBC.
y
Encryption
— Selects the encryption algorithm to be used in ESP.
-
AES-256-CBC
— Select this to use AES-CBC (256 bits).
-
AES-192-CBC
— Select this to use AES-CBC (192 bits).
-
AES-128-CBC
— Select this to use AES-CBC (128 bits).
-
AES-CTR
— Select this to use AES-CTR.
-
3DES-CBC
— Select this to use 3DES-CBC.
-
DES-CBC
— Select this to use DES-CBC.
-
None
— Select this not to perform data encryption.
AH Transforms
Specify the transform for AH.
y
Integrity
— Selects the authentication algorithm to be used in AH.
-
SHA1
— Select this to use SHA1.
-
MD5
— Select this to use MD5.
-
AES-XCBC
— Select this to use AES-XCBC.
Session Key Settings
Specify the session key for IPsec communications.
y
Session Key Settings
— Sets an interval for regenerating the session key. The
interval can be set in time or the amount of data. Select the desired check box and
then key in the value in the entry box.
-
Generate a new key after [ ]/Seconds
— Specify the interval between key
generations in seconds. Specify within the range from 180 to 86,400 seconds
(24 hours).
-
Generate a new key after [ ]/KBytes
— Specify the data volume between key
generations in Kbytes. Specify within the range from 20,480 to 214,783,647
Kbytes.
IPCOMP Transform
Select if using the IPCOMP transform.
8
IP Filter
You can display a list of filter settings registered in this equipment. Select the check
box for the filter to be applied to the profile. If more than one filter is registered, you can
change their order in the list. Click [Move] for the desired filter, and then click [Move
Up] or [Move Down] to move the filter.
Item name
Description
Содержание MC780f
Страница 1: ...User s Manual TopAccess Guide ...
Страница 21: ...1 Overview 20 Accessing TopAccess 6 The TopAccess website appears ...
Страница 25: ...1 Overview 24 Access Policy Mode ...
Страница 29: ...2 Device Tab Page 28 Displayed Icons ...
Страница 103: ...5 Registration Tab Page 102 Registration How to Set and How to Operate ...
Страница 345: ...8 Administration Tab Page 344 Registration Administration tab How to Set and How to Operate ...
Страница 368: ...11 APPENDIX This chapter contains the following contents Installing Certificates for a Client PC 368 ...
Страница 375: ...11 APPENDIX 374 Installing Certificates for a Client PC ...
Страница 380: ...January 2013 45511102EE Rev1 ...