Ipsec, Ipsec] -31 – Konica Minolta bizhub C3350 User Manual

Page 37

Advertising
background image

1.5

Available operations in Administrator mode

1

[Applied Functions]

1-31

[IPsec]

The IPsec technology prevents the falsification or leakage of data on the IP packet basis using encryption
technology.

Configure the settings if IPsec is installed in your environment.

1

In the administrator mode, select [Security] - [IPsec] - [IPsec], then click [Edit] in [IPsec Settings].

The [IPsec Settings] screen appears.

2

Click [Edit] from [IKEv1] or [IKEv2] on the [IPsec Settings] screen, then configure the following settings.

3

Click [Edit] from [SA] on the [IPsec Settings] screen, then register the Security Association (SA).

% Up to 10 groups can be registered for the [SA].

[Proxy Settings]

When confirming the expiration date via a proxy server, register the currently
used proxy server.

[Proxy Server Ad-
dress]

Enter the address of the proxy server you are using.
Use one of the following formats.

Example of host name entry: "host.example.com"

Example of IP address (IPv4) entry: "192.168.1.1"

Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

[Proxy Server Port
Number]

If necessary, change the proxy server port number.
[8080] is specified by default.

[User Name]

Enter the user name to log in to the proxy server (using ASCII characters of up
to 63 bytes).

[Password]

Enter the password (using ASCII characters of up to 63 bytes).
To enter (change) the password, select the [Change Password] check box,
then enter a new password.

[No Proxy for fol-
lowing domain]

If necessary, enter the address that does not use the proxy server.
Use one of the following formats.

Example of host name entry: "host.example.com"

Example of IP address (IPv4) entry: "192.168.1.1"

Example of IP address (IPv6) entry: "fe80::220:6bff:fe10:2f16"

Item

Description

[Encryption Algorithm]

Select the encryption algorithm used for generating a common key used in
communication.

[Authentication Algo-
rithm]

Select the authentication algorithm used for generating a common key used in
communication.

[Encryption Key Validity
Period]

Enter a validation period of a common key used for encrypted communication.
When this period has expired, a new key is created. This can secure the com-
munication.
[28800] sec. is specified by default.

[Diffie-Hellman Group]

Select the Diffie-Hellman group.
[Group2] is specified by default.

[Negotiation Mode]

Select the method to securely generate a common key used for encrypted
communication.
This is required when [IKEv1] is selected on the [IPsec Settings] screen.
[Main Mode] is selected by default.

Item

Description

[Name]

Enter the SA name (using up to 10 characters).

[Encapsulation Mode]

Select an IPsec operation mode.
[Transport] is specified by default.

[Security Protocol]

Select a security protocol.
[AH] is specified by default.

Item

Description

Advertising
This manual is related to the following products: