• Enter the separate setting number [1-4] or [default] and specify the security policy for the
address specified in the selected setting.
• To apply IPsec to the relevant packets, specify [apply]. To not apply IPsec, specify [bypass].
• If you specify [discard], any packets to which IPsec can be applied are discarded.
• Not specifying a security policy displays the current setting.
Security protocol setting
msh> ipsec ike {1|2|3|4|default} proto {ah|esp|dual}
• Enter the separate setting number [1-4] or [default] and specify the security protocol.
• To specify AH, enter [ah]. To specify ESP, enter [esp]. To specify AH and ESP, enter [dual].
• Not specifying a protocol displays the current setting.
IPsec requirement level setting
msh> ipsec ike {1|2|3|4|default} level {require|use}
• Enter the separate setting number [1-4] or [default] and specify the IPsec requirement level.
• If you specify [require], data will not be transmitted when IPsec cannot be used. If you specify
[use], data will be sent normally when IPsec cannot be used. When IPsec can be used, IPsec
transmission is performed.
• Not specifying a requirement level displays the current setting.
Encapsulation mode setting
msh> ipsec ike {1|2|3|4|default} mode {transport|tunnel}
• Enter the separate setting number [1-4] or [default] and specify the encapsulation mode.
• To specify transport mode, enter [transport]. To specify tunnel mode, enter [tunnel].
• If you have set the address type in the default setting to [any], you cannot use [tunnel] in
encapsulation mode.
• Not specifying an encapsulation mode displays the current setting.
Tunnel end point setting
msh> ipsec ike {1|2|3|4|default} tunneladdr "beginning IP address" "ending IP
address"
• Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning
and ending IP address.
• Not specifying either the beginning or ending address displays the current setting.
IKE partner authentication method setting
msh> ipsec ike {1|2|3|4|default} auth {psk|rsasig}
• Enter the separate setting number [1-4] or [default] and specify the authentication method.
• Specify [psk] to use a shared key as the authentication method. Specify [rsasig] to use a
certificate at the authentication method.
Configuring IPsec Settings
105
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...