COMMAND CENTER Pages

Advanced > Security > IPSec > Rule1 (to Rule3)

These pages allow you to select or edit rules to use for IPSec protocol-based communication.

Item

Description

 

 

Rule

Specifies whether or not to enable the selected IPSec policy

 

rule. Select On to enable the rule. Select Off to disable it.

 

 

Key Exchange

When using IKE phase1, a secure connection with the other

(IKE phase1)

end is established by generating ISAKMP SAs. Configure the

 

following items so that they meet the requirement of the other

 

end.

 

 

Policy

Main Mode protects identifications but requires more

 

messages to be exchanged with the other end. Aggressive

 

Mode requires fewer messages to be exchanged with the

 

other end than Main Mode but restricts identification

 

protection and narrows the extent of the parameter

 

negotiations. When Aggressive Mode is selected and Pre-

 

shared is selected for Authentication Type, only host

 

addresses can be specified for IP addresses of the rule.

 

 

Hash

Selects the hash algorithm.

 

 

Encryption

Selects the encryption algorithm.

 

 

Diffie-

The Diffie-Hellman key-sharing algorithm allows two hosts on

Hellman

an unsecured network to share a private key securely. Select

Group

the Diffie-Hellman group to use for key sharing.

 

 

Lifetime

Specifies the lifetime of an ISAKMP SA in seconds.

(Time)

 

Data Protection (IKE phase2)

In IKE phase2, IPSec SAs such as AH or ESP are established by using SAs established in IKE phase1. Configure the following items so that they meet the requirement of the other end.

Protocol

Select ESP or AH for the protocol. ESP protects the privacy

 

and integrity of the packet contents. Select the hash algorithm

 

and encryption algorithm below. AH protects the integrity of

 

the packet contents using encryption checksum. Select the

 

hash algorithm below.

 

 

Hash

Selects the hash algorithm.

 

 

Encryption

Selects the encryption algorithm. (When ESP is selected

 

under Protocol.)

 

 

PFS

When PFS is set to On (enabled), even if a key is decrypted,

 

the decrypted key cannot be used to decrypt the other keys

 

generated after the decryption. This improves the safety, but

 

imposes a heavy burden because of more key-generation

 

processes.

Diffie-

Hellman

Group

The Diffie-Hellman key-sharing algorithm allows two hosts on an unsecured network to share a private key securely. Select the Diffie-Hellman group to use for key sharing.

48

KYOCERA COMMAND CENTER

Page 52
Image 52
Kyocera Multifunctional Printer manual Advanced Security IPSec Rule1 to Rule3, Pfs