8. Configuring the Machine Using Web Image Monitor

 

Item

Description

 

 

 

 

Action

Specify how the IP packets are processed from the following:

 

 

• [Allow]: IP packets are both sent and received without IPsec applied to

 

 

them.

 

 

• [Drop]: IP packets are discarded.

 

 

• [Require Security]: IPsec is applied to IP packets that are both sent and

 

 

received.

 

 

If you have selected [Require Security], you must configure [IPsec Settings]

 

 

and [IKE Settings].

 

 

 

 

IPsec Settings

 

 

Item

Description

 

 

 

 

Encapsulation Type

Specify the encapsulation type from the following:

 

 

• [Transport]: Select this mode to secure only the payload section of

 

 

each IP packet when communicating with IPsec compliant devices.

 

 

• [Tunnel]: Select this mode to secure every section of each IP packet.

 

 

We recommend this type for communication between security

 

 

gateways (such as VPN devices).

 

 

 

8

Security Protocol

Select the security protocol from the following:

 

• [AH]: Establishes secure communication that supports authentication

 

 

 

 

only.

 

 

• [ESP]: Establishes secure communication that supports both

 

 

authentication and data encryption.

 

 

• [ESP&AH]: Establishes secure communication that supports both data

 

 

encryption and authentication of packets, including packet headers.

 

 

Note that you cannot specify this protocol when [Tunnel] is selected

 

 

for [Encapsulation Type].

 

 

 

 

Authentication

Specify the authentication algorithm to be applied when [AH] or [ESP&AH]

 

Algorithm for AH

is selected for [Security Protocol] from the following:

 

 

[MD5], [SHA1]

 

 

 

 

Encryption Algorithm

Specify the encryption algorithm to be applied when [ESP] or [ESP&AH] is

 

for ESP

selected for [Security Protocol] from the following:

 

 

[None], [DES], [3DES], [AES-128], [AES-192], [AES-256]

 

 

 

342

Page 344
Image 344
Ricoh C242SF Drop IP packets are discarded, Received, IKE Settings, Gateways such as VPN devices, Only, Authentication