Xerox WorkCentre 5755 System Administrator Manual page 184

Hide thumbs Also See for WorkCentre 5755:
Table of Contents

Advertisement

Security
2.
In the IKE Phase 2 area:
a.
Select from the [IPSec Mode] drop-down menu one of the following:
Transport Mode - this provides a secure connection between two endpoints as it
encapsulates the IP payload, while Tunnel Mode encapsulates the entire IP packet.
Tunnel Mode - this provides a virtual 'secure hop' between two gateways. It is used to
form a traditional VPN, where the tunnel generally creates a secure tunnel across an
untrusted Internet.
b.
If you select [Tunnel Mode], then select either [Disabled], [IPv4 Address] or [IPv6 Address].
c.
If you select IPv4 Address or IPv6 Address, enter IP Address details.
d.
From the [IPsec Security] drop-down menu, select either, Both, ESP or AH.
AH (Authentication Header) and ESP (Encapsulating Security Payload) are the two main
wire-level protocols used by IPsec, and they authenticate (AH) and encrypt and authenticate
(ESP) the data flowing over that connection. They can be used independently or together.
e.
For [Key Lifetime] enter length of time that this key will be valid for, either in seconds,
minutes or hours.
f.
Select the preferred option from the [Perfect Forward Secrecy] drop-down menu. Default is
'None'
g.
Check the required checkboxes for [Hash] and [Encryption].
Hash refers to the authentication mode, which calculates an Integrity Check Value (ICV) over
the packet's contents. This is built on top of a cryptographic hash (MD5 or SHA1).
Encryption uses a secret key to encrypt the data before transmission. This hides the contents
of the packet from eavesdroppers. Algorithm choices are AES and 3DES
Note:
Encryption will not be shown if [IPsec Security] is set to AH.
3.
Click on the [Save] button to return to the IPSec - Action page.
176
Xerox WorkCentre 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents