Xerox ColorQube 8570 System Administrator Manual page 71

Hide thumbs Also See for ColorQube 8570:
Table of Contents

Advertisement

encryption algorithm and at least one hash algorithm. The combination of Null and None is not
valid. For ESP, only one pair of Inbound and Outbound SPI are used.
5.
If you select AH, Hash Algorithms you can select include SHA1 and MD5. You must select at least
one hash algorithm. For AH, only one pair of Inbound and Outbound SPI are used.
6.
Next to Inbound SPI, change the SPI number to any unsigned 32 bit integer. The Inbound SPI
default is 0.
7.
Under Inbound Decryption Key and Inbound Authentication Key, type a hexadecimal value.
The Decryption Key must be an exact length for the following algorithms:
AES-CBC: 32 hexadecimal characters.
3DES: 48 hexadecimal characters.
DES: 16 hexadecimal characters.
Authentication Key must be an exact length for the following algorithms:
SHA1: 40 hexadecimal characters.
MD5: 32 hexadecimal characters.
8.
Next to Outbound SPI, change the SPI number to any unsigned 32 bit integer. The Inbound SPI
default is 0.
9.
Under Outbound Encryption Key, Outbound Encryption IV and Outbound Authentication Key,
type a hexadecimal value. Encryption Key must be an exact length for these algorithms:
AES-CBC: 32 hexadecimal characters.
3DES: 48 hexadecimal characters.
DES: 16 hexadecimal characters.
Encryption IV is optional. If used, it must be an exact length for these algorithms:
AES-CBC: 32 hexadecimal characters.
3DES: 16 hexadecimal characters.
DES: 16 hexadecimal characters.
Authentication Key must be an exact length for these algorithms:
SHA1: 40 hexdecimal characters.
MD5: 32 hexadecimal characters.
IKE
If IKE is selected, configure the following:
1.
On the IKE Phase 1 Configuration Part 1 page, select X.509 Certificate, or Pre-shared Key as the
authentication mehod.
For X.509 Certificate, select the Local Device Certificate and Remote Certificate Trust Point
from the list of certificates stored on the device. Certificates that have not been previously
configured must be configured for use with IPsec.
If Pre-shared Key is selected, type a pass phrase up to128 characters long. The field cannot be
blank, and cannot contain the following special characters:" ' & ? + = < > ;
Click Next.
2.
3.
On the IKE Phase 1 Configuration Part 2 page, select at least one IPsec encryption/hash
Authentication Transforms for use during IPsec protocol negotiation. A transform describes a
security protocol with its corresponding algorithms.
ColorQube 8570/8870 Color Printer
System Administrator Guide
Security Features
71

Advertisement

Table of Contents
loading

This manual is also suitable for:

Colorqube 8870

Table of Contents