Ricoh SP C240SF Operating Instructions Manual page 344

Hide thumbs Also See for SP C240SF:
Table of Contents

Advertisement

8. Configuring the Machine Using Web Image Monitor
Item
Action
IPsec Settings
Item
Encapsulation Type
Security Protocol
8
Authentication
Algorithm for AH
Encryption Algorithm
for ESP
342
Specify how the IP packets are processed from the following:
• [Allow]: IP packets are both sent and received without IPsec applied to
them.
• [Drop]: IP packets are discarded.
• [Require Security]: IPsec is applied to IP packets that are both sent and
received.
If you have selected [Require Security], you must configure [IPsec Settings]
and [IKE Settings].
Specify the encapsulation type from the following:
• [Transport]: Select this mode to secure only the payload section of
each IP packet when communicating with IPsec compliant devices.
• [Tunnel]: Select this mode to secure every section of each IP packet.
We recommend this type for communication between security
gateways (such as VPN devices).
Select the security protocol from the following:
• [AH]: Establishes secure communication that supports authentication
only.
• [ESP]: Establishes secure communication that supports both
authentication and data encryption.
• [ESP&AH]: Establishes secure communication that supports both data
encryption and authentication of packets, including packet headers.
Note that you cannot specify this protocol when [Tunnel] is selected
for [Encapsulation Type].
Specify the authentication algorithm to be applied when [AH] or [ESP&AH]
is selected for [Security Protocol] from the following:
[MD5], [SHA1]
Specify the encryption algorithm to be applied when [ESP] or [ESP&AH] is
selected for [Security Protocol] from the following:
[None], [DES], [3DES], [AES-128], [AES-192], [AES-256]
Description
Description

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sp c242sf

Table of Contents