Ricoh Pro C9100 Operating Instructions Manual page 104

Hide thumbs Also See for Pro C9100:
Table of Contents

Advertisement

5. Enhanced Network Security
23.
Select the protocol type for IPsec, and then click [Next].
If you are using IPsec with IPv6, select "58" as the protocol number for the "Other" target protocol
type.
24.
Click [Finish].
25.
Click [OK].
26.
Select the IP filter that was just created, and then click [Next].
27.
Click [Add].
Filter action wizard appears.
28.
Click [Next].
29.
In [Name], enter an IP Filter action name, and then click [Next].
30.
Select "Negotiate security", and then click [Next].
31.
Select "Allow unsecured communication if a secure connection cannot be established.",
and then click [Next].
32.
Select "Custom" and click [Settings].
33.
In "Integrity algorithm", select the authentication algorithm that was specified on the
machine in "Encryption Key Auto Exchange Settings Phase 2".
34.
In "Encryption algorithm", select the encryption algorithm that specified on the machine in
"Encryption Key Auto Exchange Settings Phase 2".
35.
In "Session key settings", select "Generate a new key every", and enter the validity
period (in seconds) that was specified on the machine in "Encryption Key Auto Exchange
Settings Phase 2".
36.
Click [OK].
37.
Click [Next].
38.
Click [Finish].
39.
Select the filter action that was just created, and then click [Next].
If you set "Encryption Key Auto Exchange Settings" to "Authentication and High Level Encryption",
select the IP filter action that was just created, click [Edit], and then check "Use session key perfect
forward secrecy (PFS)" on the filter action properties dialog box. If using PFS in Windows, the PFS
group number used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman
group number (set in Step 11). Consequently, if you change the security level specified automatic
settings on the machine and "User Setting" appears, you must set the same the group number for
"Phase 1 Diffie-Hellman Group" and "Phase 2 PFS" on the machine to establish IPsec transmission.
40.
Select the authentication method, and then click [Next].
If you select "Certificate" for authentication method in "Encryption Key Auto Exchange Settings" on
the machine, specify the device certificate. If you select "PSK", enter the same PSK text specified on
the machine with the pre-shared key.
102

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pro c9110

Table of Contents