Advanced > Security > Ieee802.1X; Advanced > Security > Ipsec > General - Kyocera TASKalfa 8000i User Manual

Kyocera command center rx user guide rev-1.2
Hide thumbs Also See for TASKalfa 8000i:
Table of Contents

Advertisement

Advanced > Security > IEEE802.1x
Advanced > Security > IPSec > General
COMMAND CENTER RX
The IEEE802.1x security protocol allows the user to login to the secured
networks based on the client certificates.
IEEE802.1x
Specifies whether or not to use the IEEE802.1x protocol.
Authentication Type
Selects either EAP-TLS or PEAP (EAP-MS-CHAPv2) for the authentication
type.
Login User Name
Enter the name of the user who accesses the printing system. The
IEEE802.1x client certificate of this user must be valid.
Login Password
You can set a PEAP-based password. (This setting is valid when PEAP
[EAP-MS-CHAPv2] authentication type is selected.)
Common Name
Specifies the common name of the server certificate if the server is required
to be authenticated. (This setting is valid when PEAP [EAP-MS-CHAPv2]
authentication type is selected.)
Match Rule of Common Name
When the server certificate is verified, the common name specified under
Common Name is compared with the common name on the server
certificate. This item allows you to specify whether the common names are
considered to be matched if they exactly or partially match. (This setting is
valid when PEAP [EAP-MS-CHAPv2] authentication type is selected.)
Expiration Verification
When this option is enabled, the expiration of the server certificate is verified
at communicating. If the server certificate is found expired, communication
will fail. When it is disabled, the expiration will not be verified.
Certificate Status
Displays whether the certificate is active or not.
This section allows you to set access restrictions for IPSec protocol-based
communication.
IPSec
Specifies whether or not to enable the IPSec protocol. Select On to enable
the IPSec protocol. Select Off to disable it.
Restriction
Specifies the default policy for non-IPSec packets. Select Allow to allow
communication with all hosts and networks including those not permitted by
the rules described under
on page 6-48. Select Deny to allow communication only with the hosts and
networks permitted by the rules.
Authentication Type
Specifies the authentication type used for IKE phase1. To set a character
string as the shared key and use it for communication, select Pre-shared
and enter the string of the pre-shared key in the text box. To use a CA-
issued device certificate or root certificate, select Certificates. When
Advanced > Security > IPSec > Rule1 (to Rule3)
Settings Pages
6-47

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents