Kyocera ECOSYS P2235dn Kyocera Command Center RX User Guide Rev-9.2016.6 - Page 73

Key Management Type, IP Address IPv4

Page 73 highlights

Network Settings This section allows you to set access restrictions for IPSec protocol-based communication. Specifies whether or not to enable the IPSec protocol. Select On to use the IPv6 protocol. Select Off when encryption is not used. 2. This section includes the following items for configuration. Expiration Verification When this option is enabled, the expiration of the server certificate is verified at communicating. If found expired, communication will fail. When it is disabled, the expiration will not be verified. Restriction Specifies the default policy for non-IPSec packets. Select Allow to allow communication with all hosts and networks including those not permitted by the rules. Select Deny to allow communication only with the hosts and networks permitted by the rules. Allowed means normal traffic (not defined by the IPSec rules) will be allowed to reach the device. Denied means only IPSec traffic (as defined by the IPSec rules) will be allowed to reach the device and all other traffic (not defined by the IPSec rules) will be denied to reach the device. Root Certificate Displays whether the certificate is active. Root Certificate 1 Subject through Root Certificate 5 Subject are displayed. Configure the device certificate on the Certificates page. IPSec Rules Allows to validate the rule used for communication using the IPSec protocol. Rule 1 through Rule 10 are displayed. To activate this item, click Settings button and configure the following on the IPSec Rule Settings page. 1. Policy Rule: Select whether the rules for IPSec communication are used or not. Key Management Type: Select a type of the key used for the rule from IKEv1, IKEv2, and Manual. Encapsulation Mode: Transport encapsulates an encrypted data and transmits along with an IP header. This is the simplest method when both the transmitting host and receiving host have the IPSec protocol supported. Tunnel uses a gateway provided in the network. The gateway receives the IP packets sent by the transmitting host, encrypt the entire IP packet which is then encapsulated by IPSec, then transmits along with a new IP header. Select whether the rules for IPSec communication are used or not. 2. IP address IP Version: Specifies the IP version of the other end. Select IPv4 or IPv6. IP Address (IPv4): Specifies the IPv4 addresses of the hosts or network with which the print system is connecting via IPSec. When you are restricting the scope of IPSec, be sure to specify the IP addresses. If this field is blank, all IPv4 addresses will be allowed to connect the print system. Subnet Mask: When IPv4 is selected for IP Version, this specifies the subnet mask of the hosts or network with which the print system is connecting via IPSec. If this field is blank, the specified addresses are considered to be host addresses. IP Address (IPv6): Specifies the IPv6 addresses of the hosts or network with which the print system is connecting via IPSec. When you are restricting the scope of IPSec, be sure to specify the IP addresses. If this field is blank, all IPv6 addresses will be allowed to connect the print system. User Guide 69

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

Network Settings
User Guide
69
This section allows you to set access restrictions for IPSec protocol-based
communication.
Specifies whether or not to enable the IPSec protocol. Select
On
to use the IPv6
protocol. Select
Off
when encryption is not used.
2.
This section includes the following items for configuration.
Expiration Verification
When this option is enabled, the expiration of the server certificate is verified at
communicating. If found expired, communication will fail. When it is disabled, the
expiration will not be verified.
Restriction
Specifies the default policy for non-IPSec packets. Select Allow to allow communi-
cation with all hosts and networks including those not permitted by the rules. Select
Deny to allow communication only with the hosts and networks permitted by the
rules.
Allowed
means normal traffic (not defined by the IPSec rules) will be allowed
to reach the device.
Denied
means only IPSec traffic (as defined by the IPSec
rules) will be allowed to reach the device and all other traffic (not defined by the
IPSec rules) will be denied to reach the device.
Root Certificate
Displays whether the certificate is active.
Root Certificate 1 Subject
through
Root
Certificate 5 Subject
are displayed. Configure the device certificate on the
Certifi-
cates
page.
IPSec Rules
Allows to validate the rule used for communication using the IPSec protocol.
Rule 1
through
Rule 10
are displayed. To activate this item, click
Settings
button and con-
figure the following on the IPSec Rule Settings page.
1. Policy
Rule
: Select whether the rules for IPSec communication are used or not.
Key Management Type
: Select a type of the key used for the rule from
IKEv1
,
IKEv2
, and
Manual
.
Encapsulation Mode
:
Transport
encapsulates an encrypted data and transmits
along with an IP header. This is the simplest method when both the transmitting
host and receiving host have the IPSec protocol supported.
Tunnel
uses a gate-
way provided in the network. The gateway receives the IP packets sent by the
transmitting host, encrypt the entire IP packet which is then encapsulated by
IPSec, then transmits along with a new IP header.
Select whether the rules for IPSec communication are used or not.
2.
IP address
IP Version
: Specifies the IP version of the other end. Select
IPv4
or
IPv6
.
IP Address (IPv4)
: Specifies the IPv4 addresses of the hosts or network with
which the print system is connecting via IPSec. When you are restricting the scope
of IPSec, be sure to specify the IP addresses. If this field is blank, all IPv4
addresses will be allowed to connect the print system.
Subnet Mask
: When
IPv4
is selected for
IP Version
, this specifies the subnet
mask of the hosts or network with which the print system is connecting via IPSec.
If this field is blank, the specified addresses are considered to be host addresses.
IP Address (IPv6)
: Specifies the IPv6 addresses of the hosts or network with
which the print system is connecting via IPSec. When you are restricting the scope
of IPSec, be sure to specify the IP addresses. If this field is blank, all IPv6
addresses will be allowed to connect the print system.