Brother International ADS-3000N Network Users Guide - Page 75

Manage Your Network Machine Securely Using IPsec, Introduction to IPsec

Page 75 highlights

Security Features Manage Your Network Machine Securely Using IPsec 6  Introduction to IPsec IPsec (Internet Protocol Security) is a security protocol that uses an optional Internet Protocol function to prevent data manipulation and ensure the confidentiality of data transmitted as IP packets. IPsec encrypts data carried over the network. Because the data is encrypted at the network layer, applications that use a higher-level protocol use IPsec even if the user is not aware of its use.  Configure IPsec Using Web Based Management The IPsec connection conditions consist of two Template types: Address and IPsec. You can configure up to 10 connection conditions.  Configure an IPsec Address Template Using Web Based Management  Configure an IPsec Template Using Web Based Management 6 Introduction to IPsec 6 IPsec supports the following functions:  IPsec transmissions According to the IPsec setting conditions, the network-connected computer sends data to and receives data from the specified device using IPsec. When the devices start communicating using IPsec, keys are exchanged using Internet Key Exchange (IKE) first, and then the encrypted data is transmitted using the keys. In addition, IPsec has two operation modes: the Transport mode and Tunnel mode. The Transport mode is used mainly for communication between devices and the Tunnel mode is used in environments, such as a Virtual Private Network (VPN). NOTE For IPsec transmissions, the following conditions are necessary: • A computer that can communicate using IPsec is connected to the network. • Your Brother machine is configured for IPsec communication. • The computer connected to your Brother machine is configured for IPsec connections.  IPsec settings The settings that are necessary for connections using IPsec. These settings can be configured using Web Based Management. NOTE To configure the IPsec settings, you must use the browser on a computer that is connected to the network. 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114

Security Features
71
6
Manage Your Network Machine Securely Using IPsec
6
Introduction to IPsec
IPsec (Internet Protocol Security) is a security protocol that uses an optional Internet Protocol function to
prevent data manipulation and ensure the confidentiality of data transmitted as IP packets. IPsec encrypts
data carried over the network. Because the data is encrypted at the network layer, applications that use a
higher-level protocol use IPsec even if the user is not aware of its use.
Configure IPsec Using Web Based Management
The IPsec connection conditions consist of two
Template
types:
Address
and
IPsec
.
You can configure up to 10 connection conditions.
Configure an IPsec Address Template Using Web Based Management
Configure an IPsec Template Using Web Based Management
Introduction to IPsec
6
IPsec supports the following functions:
IPsec transmissions
According to the IPsec setting conditions, the network-connected computer sends data to and receives
data from the specified device using IPsec. When the devices start communicating using IPsec, keys are
exchanged using Internet Key Exchange (IKE) first, and then the encrypted data is transmitted using the
keys.
In addition, IPsec has two operation modes: the Transport mode and Tunnel mode. The Transport mode
is used mainly for communication between devices and the Tunnel mode is used in environments, such
as a Virtual Private Network (VPN).
NOTE
For IPsec transmissions, the following conditions are necessary:
A computer that can communicate using IPsec is connected to the network.
Your Brother machine is configured for IPsec communication.
The computer connected to your Brother machine is configured for IPsec connections.
IPsec settings
The settings that are necessary for connections using IPsec. These settings can be configured using Web
Based Management.
NOTE
To configure the IPsec settings, you must use the browser on a computer that is connected to the network.