Konica Minolta bizhub 950i bizhub 950i/850i Security Operations User Guide - Page 39

Setting IPsec

Page 39 highlights

2.4 Setting IPsec 2 2.4 Setting IPsec The following are the authentication algorithms for the IPsec communication. IPsec IKE authentication algorithm IPsec ESP authentication algorithm • SHA-1 • SHA-2 (256bit/384bit/512bit) *The ESP authentication algorithm means HMAC-SHA. The same applies below. 2.4.1 IPsec setting The Web connection needs to be used to set the device certificate and an external certificate used in the IPsec network setting. Refer to "Home > Web Management Tool > Reinforcing Security > Encrypting Communications > Using IPsec communication" in the HTML manual for registration before setting [Enhanced Security Mode] to [ON]. Any certificate other than the IPsec certificate cannot be registered. Use [IPsec Setting] in the settings below. Setting item IKEv1 SA Peer Protocol Setting [Encryption Algorithm] [Authentication Algorithm] [Encryption Key Validity Period] [Diffie-Hellman Group] [Negotiation Mode] [Encapsulation Mode] [Security Protocol] [Key Exchange Method] [Lifetime After Establishing SA] [Authentication Method] [ESP Encryption Algorithm] [ESP Authentication Algorithm] [Pre-Shared Key Text] [Protocol Setting] [Protocol Identification Setting] Setting value AES-CBC (128bit/256bit) SHA-1 or SHA-2 (256bit/384bit/512bit) 600 to 86,400 sec. (set within 24 hours) Group 14 Main Mode (default) Transport (default) ESP IKEv1 (default) 600 to 28,800 sec. (set within 8 hours) Pre-Shared Key or Digital Signature AES-CBC (128bit/256bit) SHA-1 or SHA-2 (256bit/384bit/512bit) ASCII code (22 characters) or HEX code (44 characters) ON No Selection (Any) When using [Pre-Shared Key] in the machine for the authentication method of the communication counterpart, set a hard-to-guess value to [Pre-Shared Key Text] to prevent the value from leaking to nobody but the counterpart, in an appropriate manner. Do not set a value that can be easily guessed such as a birthday and an employee identification number. It is recommended, from the viewpoint of security, to set a large-size key of 128 characters or less. Leakage of the Pre-Shared Key strings of IPsec that have been set to the MFP results in an increased risk of spoofing of the MFP. Set different Pre-Shared Key strings for each device and safely keep them. Set and use strings that cannot be deciphered by dictionary attack and brute force attack, without using words in a dictionary and/or easily guessable strings. This machine gains ISO/IEC15408 certification with a Pre-Shared Key of 22 characters for ASCII input or 44 characters for HEX input. [SHA-1] of [IPsec Setting] - [IKEv-1] - [Authentication Algorithm] and [Digital Signature] of [IPsec Setting] [SA] - [IKE Setting] - [Authentication Method] cannot be set simultaneously. The setting set earlier is given priority. A certificate for the machine that has been issued by the reliable CA (certification authority) is required to adopt [Digital Signature] for the authentication method. To verify the chain of a presented certificate, the certificate for the CA issuing the presented certificate needs to be imported. For details of the procedure, see page 2-19. bizhub 950i/850i/AccurioPrint 950i/850i 2-16

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

bizhub 950i/850i/AccurioPrint 950i/850i
2-16
2.4
Setting IPsec
2
2.4
Setting IPsec
The following are the authentication algorithms for the IPsec communication.
*
The ESP authentication algorithm means HMAC-SHA. The same applies below.
2.4.1
IPsec setting
The
Web connection
needs to be used to set the device certificate and an external certificate used in the
IPsec network setting. Refer to "Home > Web Management Tool > Reinforcing Security > Encrypting Com-
munications > Using IPsec communication" in the HTML manual for registration before setting [Enhanced Se-
curity Mode] to [ON].
Any certificate other than the IPsec certificate cannot be registered.
Use [IPsec Setting] in the settings below.
When using [Pre-Shared Key] in the machine for the authentication method of the communication counter-
part, set a hard-to-guess value to [Pre-Shared Key Text] to prevent the value from leaking to nobody but the
counterpart, in an appropriate manner.
Do not set a value that can be easily guessed such as a birthday and an employee identification number. It
is recommended, from the viewpoint of security, to set a large-size key of 128 characters or less.
Leakage of the Pre-Shared Key strings of IPsec that have been set to the MFP results in an increased risk of
spoofing of the MFP. Set different Pre-Shared Key strings for each device and safely keep them. Set and use
strings that cannot be deciphered by dictionary attack and brute force attack, without using words in a dic-
tionary and/or easily guessable strings. This machine gains ISO/IEC15408 certification with a Pre-Shared Key
of 22 characters for ASCII input or 44 characters for HEX input.
[SHA-1] of [IPsec Setting] - [IKEv-1] - [Authentication Algorithm] and [Digital Signature] of [IPsec Setting] -
[SA] - [IKE Setting] - [Authentication Method] cannot be set simultaneously. The setting set earlier is given
priority.
A certificate for the machine that has been issued by the reliable CA (certification authority) is required to
adopt [Digital Signature] for the authentication method. To verify the chain of a presented certificate, the cer-
tificate for the CA issuing the presented certificate needs to be imported. For details of the procedure, see
page 2-19.
IPsec IKE authentication algorithm
SHA-1
SHA-2 (256bit/384bit/512bit)
IPsec ESP authentication algorithm
Setting item
Setting value
IKEv1
[Encryption Algorithm]
AES-CBC (128bit/256bit)
[Authentication Algorithm]
SHA-1 or SHA-2 (256bit/384bit/512bit)
[Encryption Key Validity Period]
600 to 86,400 sec. (set within 24 hours)
[Diffie-Hellman Group]
Group 14
[Negotiation Mode]
Main Mode (default)
SA
[Encapsulation Mode]
Transport (default)
[Security Protocol]
ESP
[Key Exchange Method]
IKEv1 (default)
[Lifetime After Establishing SA]
600 to 28,800 sec. (set within 8 hours)
[Authentication Method]
Pre-Shared Key or Digital Signature
[ESP Encryption Algorithm]
AES-CBC (128bit/256bit)
[ESP Authentication Algorithm]
SHA-1 or SHA-2 (256bit/384bit/512bit)
Peer
[Pre-Shared Key Text]
ASCII code (22 characters) or HEX code (44 char-
acters)
Protocol
Setting
[Protocol Setting]
ON
[Protocol Identification Setting]
No Selection (Any)