User Manual

Table Of Contents
Conguring IPSec Settings
52AC-080
Internet Protocol Security (IPSec or IPsec) is a pr
otocol suite for encrypting data transported over a network, including
Internet networks. While TLS only encrypts data used on a specic application, such as a Web browser or an e-mail
application, IPSec encrypts either whole IP packets or the payloads of IP packets, offering a more versatile security
system. The IPSec of the machine works in transport mode, in which the payloads of IP packets are encrypted. With
this feature, the machine can connect directly to a computer that is in the same virtual private network (VPN). Set the
necessary conguration on the computer before you congure the machine.
Registering Security Policies(P. 256)
Enabling IPSec Communication(P. 263)
Using IPSec with IP address lter
The IPSec settings are applied befor
e the IP address lter settings during packet reception while the IP
address settings are applied before the IPSec settings during packet transmission.
Specifying IP
Addresses for Fir
ewall Rules(P. 224)
Registering Security Policies
To use IPSec for encrypted communication, you need to r
egister security policies (SP) before enabling the IPSec
settings (
Enabling IPSec Communication(P. 263) ). A security policy consists of the groups of settings described
belo
w. You can register multiple policies according to a combination of the IP address and the port number. After
registering policies, specify the order in which they are applied.
Selector
Selector denes conditions for IP packets to apply IPSec communication. Selectable conditions include IP
addr
esses and port numbers of the machine and the devices to communicate with.
IKE
IKE congures the IKEv1 that is used for key exchange protocol. Note that instructions vary depending on the
authentication method selected.
[Pre-Shared Key Method]
A key of alphanumeric characters can be shared with the other devices. Enable TLS for the Remote UI in
advance ( Using TLS for Encrypted Communications(P. 252) ).
[Digital Signature Method]
The machine and the other de
vices authenticate each other by mutually verifying their digital signatures. Have
a key pair to use ready (
Using CA-issued Key Pairs and Digital Certicates(P. 279
) ).
Setting Protocols and Options
Specify the settings for ESP and AH, which are added to packets during IPSec communication. ESP and AH
cannot be used at the same time. You can also select whether or not to enable PFS for tighter security.
Security
256