Ricoh SP 310 DN User Manual page 100

Table of Contents

Advertisement

7. Appendix
23.
Click [Finish], and then click [OK].
24.
Select the IP filter that you have just created, and then click [Next].
25.
Click [Add...] in the Filter Action.
The Filter Action Wizard appears.
26.
Click [Next].
27.
In [Name], enter a Filter Action name, and then click [Next].
28.
Select "Negotiate security", and then click [Next].
29.
Select one of options for computers allowed to communicate with, and then click [Next].
30.
Select "Custom" and click [Settings...].
31.
When [ESP] is selected for the machine in [Security Protocol] under [IPsec Settings], select
[Data integrity and encryption (ESP)], and configure the following settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for ESP]
specified on the machine.
Set the value of [Encryption algorithm] to the same value as the [Encryption Algorithm for ESP]
specified on the machine.
32.
When [AH] is selected for the machine in [Security Protocol] under [IPsec Settings], select
[Data and address integrity without encryption (AH)], and configure the following
settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for AH]
specified on the machine.
Clear the [Data integrity and encryption (ESP)] check box.
33.
When [ESP&AH] is selected for the machine in [Security Protocol] under [IPsec Settings],
select [Data and address integrity without encryption (AH)], and configure the following
settings:
Set the value of [Integrity algorithm] under [Data and address integrity without encryption (AH)] to
the same value as [Authentication Algorithm for AH] specified on the machine.
Set the value of [Encryption algorithm] under [Data integrity and encryption (ESP)] to the same
value as [Encryption Algorithm for ESP] specified on the machine.
34.
In the Session key settings, select "Generate a new key every", and enter the same
validity period (in seconds or Kbytes) as that specified for [Life Time] on the machine.
35.
Click [OK], and then click [Next].
36.
Click [Finish].
If you are using IPv6 under Windows Vista or a newer version of Windows, you must repeat this
procedure from Step 12 and specify ICMPv6 as an exception. When you reach Step 22, select
[58] as the protocol number for the "Other" target protocol type, and then set [Negotiate security]
to [Permit].
98

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sp 310 dnw

Table of Contents