Network User's Guide
Table Of Contents
- Network User’s Guide
- Table of Contents
- 1 Introduction
- 2 Changing Your Network Settings
- 3 Configuring Your Machine for a Wireless Network (ADS-2800W / ADS-3600W)
- Overview
- Confirm Your Network Environment
- Configuration
- Configuration in Ad-hoc Mode
- Configure Your Machine for a Wireless Network Using the Machine’s Control Panel Setup Wizard
- Use Wi-Fi Direct®
- Scan from Your Mobile Device Using Wi-Fi Direct®
- Configure Your Wi-Fi Direct® Network
- Wi-Fi Direct® Network Configuration Overview
- Configure Your Wi-Fi Direct® Network Using the One-Push Method
- Configure Your Wi-Fi Direct® Network Using the One-Push Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Wi-Fi Direct® Network Using the PIN Method
- Configure Your Wi-Fi Direct® Network Using the PIN Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Wi-Fi Direct® Network Manually
- 4 Web Based Management
- Overview
- Configure Your Machine Settings
- Set a Login Password
- Use LDAP Authentication
- Restrict Users
- Synchronize with the SNTP Server
- Change the Scan to FTP Configuration
- Change the Scan to SFTP Configuration
- Change the Scan to Network Configuration (Windows®)
- Change the Scan to SharePoint Configuration (Windows®)
- Configure TCP/IP Advanced Settings
- Address Book Import/Export (ADS-2800W / ADS-3600W)
- 5 Scan to E-mail Server (ADS-2800W / ADS-3600W)
- 6 Security Features
- 7 Troubleshooting
- 8 Additional Network Settings (Windows®)
- A Appendix
- B Index
Security Features
75
6
IKEv1 Settings for an IPsec Template 6
Template Name
Type a name for the template (up to 16 characters).
Use Prefixed Template
Select Custom, IKEv1 High Security, IKEv1 Medium Security, IKEv2 High Security, or IKEv2 Medium
Security. The setting items are different depending on the selected template.
NOTE
The default template may differ depending on whether you selected Main or Aggressive for Negotiation
Mode on the IPsec configuration screen.
Internet Key Exchange (IKE)
IKE is a communication protocol used to exchange encryption keys to carry out encrypted communication
using IPsec. To carry out encrypted communication this time only, the encryption algorithm necessary for
IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are exchanged using
the Diffie-Hellman key exchange method, and the encrypted communication limited to IKE is carried out.
If you selected Custom in Use Prefixed Template, select IKEv1, IKEv2, or Manual. If you selected a setting
other than Custom, the IKE, authentication type and Encapsulating Security selected in Use Prefixed
Template are displayed.
Authentication Type
Configure the IKE authentication and encryption.
Diffie-Hellman Group
This key exchange method allows secret keys to be securely exchanged over an unprotected network.
The Diffie-Hellman key exchange method uses a discrete logarithm problem, not the secret key, to send
and receive open information that was generated using a random number and the secret key.
Select Group1, Group2, Group5, or Group14.
Encryption
Select DES, 3DES, AES-CBC 128, or AES-CBC 256.
Hash
Select MD5, SHA1, SHA256, SHA384 or SHA512.
SA Lifetime
Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).
Encapsulating Security
Protocol
Select ESP, AH+ESP or AH.