Ricoh SP 311SFN User's Guide Page 248

  • Download
  • Add to my manuals
  • Print
  • Page
    / 272
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 247
25. Click [Add...] in the Filter Action.
The Filter Action Wizard appears.
26. Click [Next].
27. In [Name], enter a Filter Action name, and then click [Next].
28. Select "Negotiate security", and then click [Next].
29. Select one of options for computers allowed to communicate with, and then click [Next].
30. Select "Custom" and click [Settings...].
31. When [ESP] is selected for the machine in [Security Protocol] under [IPsec Settings], select
[Data integrity and encryption (ESP)], and configure the following settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for ESP]
specified on the machine.
Set the value of [Encryption algorithm] to the same value as the [Encryption Algorithm for ESP]
specified on the machine.
32. When [AH] is selected for the machine in [Security Protocol] under [IPsec Settings], select
[Data and address integrity without encryption (AH)], and configure the following
settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for AH]
specified on the machine.
Clear the [Data integrity and encryption (ESP)] check box.
33. When [ESP&AH] is selected for the machine in [Security Protocol] under [IPsec Settings],
select [Data and address integrity without encryption (AH)], and configure the following
settings:
Set the value of [Integrity algorithm] under [Data and address integrity without encryption (AH)] to
the same value as [Authentication Algorithm for AH] specified on the machine.
Set the value of [Encryption algorithm] under [Data integrity and encryption (ESP)] to the same
value as [Encryption Algorithm for ESP] specified on the machine.
34. In the Session key settings, select "Generate a new key every", and enter the same
validity period (in seconds or Kbytes) as that specified for [Life Time] on the machine.
35. Click [OK], and then click [Next].
36. Click [Finish].
If you are using IPv6 under Windows Vista or a newer version of Windows, you must repeat this
procedure from Step 12 and specify ICMPv6 as an exception. When you reach Step 22, select
[58] as the protocol number for the "Other" target protocol type, and then set [Negotiate security]
to [Permit].
37. Select the filter action that you have just created, and then click [Next].
38. Select one of options for an authentication method, and then click [Next].
11. Appendix
246
Page view 247
1 2 ... 243 244 245 246 247 248 249 250 251 252 253 ... 271 272

Comments to this Manuals

No comments