Network User's Guide
Table Of Contents
- Network User’s Guide
- Table of Contents
- 1 Introduction
- 2 Changing Your Network Settings
- 3 Configuring Your Machine for a Wireless Network (ADS-2800W / ADS-3600W)
- Overview
- Confirm Your Network Environment
- Configuration
- Configuration in Ad-hoc Mode
- Configure Your Machine for a Wireless Network Using the Machine’s Control Panel Setup Wizard
- Use Wi-Fi Direct®
- Scan from Your Mobile Device Using Wi-Fi Direct®
- Configure Your Wi-Fi Direct® Network
- Wi-Fi Direct® Network Configuration Overview
- Configure Your Wi-Fi Direct® Network Using the One-Push Method
- Configure Your Wi-Fi Direct® Network Using the One-Push Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Wi-Fi Direct® Network Using the PIN Method
- Configure Your Wi-Fi Direct® Network Using the PIN Method of Wi-Fi Protected Setup™ (WPS)
- Configure Your Wi-Fi Direct® Network Manually
- 4 Web Based Management
- Overview
- Configure Your Machine Settings
- Set a Login Password
- Use LDAP Authentication
- Restrict Users
- Synchronize with the SNTP Server
- Change the Scan to FTP Configuration
- Change the Scan to SFTP Configuration
- Change the Scan to Network Configuration (Windows®)
- Change the Scan to SharePoint Configuration (Windows®)
- Configure TCP/IP Advanced Settings
- Address Book Import/Export (ADS-2800W / ADS-3600W)
- 5 Scan to E-mail Server (ADS-2800W / ADS-3600W)
- 6 Security Features
- 7 Troubleshooting
- 8 Additional Network Settings (Windows®)
- A Appendix
- B Index
Security Features
82
6
NOTE
• ESP is a protocol for carrying out encrypted communication using IPsec. ESP encrypts the payload
(communicated contents) and adds additional information. The IP packet consists of the header and the
encrypted payload, which follows the header. In addition to the encrypted data, the IP packet also includes
information regarding the encryption method and encryption key, the authentication data, and so on.
• AH is part of the IPsec protocol that authenticates the sender and prevents manipulation of the data
(ensures the completeness of the data). In the IP packet, the data is inserted immediately after the header.
In addition, the packets include hash values, which are calculated using an equation from the
communicated contents, secret key, and so on, to prevent the falsification of the sender and manipulation
of the data. Unlike ESP, the communicated contents are not encrypted, and the data is sent and received
as plain text.
Encryption
Select DES, 3DES, AES-CBC 128, or AES-CBC 256. The encryption can be selected only when ESP is
selected in Protocol.
Hash
Select None, MD5, SHA1, SHA256, SHA384, or SHA512.
None can be selected only when ESP is selected in Protocol.
SA Lifetime
Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).
Encapsulation Mode
Select Transport or Tunnel.
Remote Router IP-Address
Specify the IP address (IPv4 or IPv6) of the connection destination. Enter this information only when the
Tunnel mode is selected.
NOTE
SA (Security Association) is an encrypted communication method using IPsec or IPv6 that exchanges and
shares information, such as the encryption method and encryption key, to establish a secure
communication channel before communication begins. SA may also refer to a virtual encrypted
communication channel that has been established. The SA used for IPsec establishes the encryption
method, exchanges the keys, and carries out mutual authentication according to the IKE (Internet Key
Exchange) standard procedure. In addition, the SA is updated periodically.
Submit
Click this button to register the settings.
NOTE
When you change the settings for the template currently in use, the IPsec screen in Web Based
Management closes and opens again.