23.
Select the protocol type for IPsec, and then click [Next].
If you are using IPsec with IPv6, select "58" as the protocol number for the "Other" target protocol
type.
24.
Click [Finish].
25.
Click [OK].
26.
Select the IP filter that was just created, and then click [Next].
27.
Click [Add].
Filter action wizard appears.
28.
Click [Next].
29.
In [Name], enter an IP Filter action name, and then click [Next].
30.
Select "Negotiate security", and then click [Next].
31.
Select "Allow unsecured communication if a secure connection cannot be established.",
and then click [Next].
32.
Select "Custom" and click [Settings].
33.
In "Integrity algorithm", select the authentication algorithm that was specified on the
machine in "Encryption Key Auto Exchange Settings Phase 2".
34.
In "Encryption algorithm", select the encryption algorithm that specified on the machine in
"Encryption Key Auto Exchange Settings Phase 2".
35.
In "Session key settings", select "Generate a new key every", and enter the validity
period (in seconds) that was specified on the machine in "Encryption Key Auto Exchange
Settings Phase 2".
36.
Click [OK].
37.
Click [Next].
38.
Click [Finish].
39.
Select the filter action that was just created, and then click [Next].
If you set "Encryption Key Auto Exchange Settings" to "Authentication and High Level Encryption",
select the IP filter action that was just created, click [Edit], and then check "Use session key perfect
forward secrecy (PFS)" on the filter action properties dialog box. If using PFS in Windows, the PFS
group number used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman
group number (set in Step 11). Consequently, if you change the security level specified automatic
settings on the machine and "User Setting" appears, you must set the same the group number for
"Phase 1 Diffie-Hellman Group" and "Phase 2 PFS" on the machine to establish IPsec transmission.
40.
Select the authentication method, and then click [Next].
If you select "Certificate" for authentication method in "Encryption Key Auto Exchange Settings" on
the machine, specify the device certificate. If you select "PSK", enter the same PSK text specified on
the machine with the pre-shared key.
5. Enhanced Network Security
102
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...