Ricoh Aficio SP 3510DN Software Guide - Page 120

Transmission Using IPsec, Encryption and Authentication by IPsec

Page 120 highlights

9. Appendix Transmission Using IPsec For securer communications, this printer supports the IPsec protocol. When applied, IPsec encrypts data packets at the network layer using shared key encryption. The printer uses encryption key exchange to create a shared key for both sender and receiver. To achieve even higher security, you can also renew the shared key on a validity period basis. • IPsec is not applied to data obtained through DHCP, DNS, or WINS. • IPsec compatible operating systems are Windows XP SP2, Windows Vista/7, Windows Server 2003/2003 R2/2008/2008 R2, Mac OS X 10.4.8 and later, Red Hat Enterprise Linux WS 4.0, and Solaris 10. However, some setting items are not supported depending on the operating system. Make sure the IPsec settings you specify are consistent with the operating system's IPsec settings. • If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec under [Network Setting] on the control panel, and then access Web Image Monitor. • For details about specifying the IPsec settings using Web Image Monitor, see p.85 "Configuring the IPsec Settings". • For details about enabling and disabling IPsec using the control panel, see p.123 "Enabling and Disabling IPsec Using the Control Panel". Encryption and Authentication by IPsec IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data, and the authentication function, which verifies the sender of the data and the data's integrity. This printer's IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec functions at the same time, and the AH protocol, which enables only the authentication function. ESP Protocol The ESP protocol provides secure transmission through both encryption and authentication. This protocol does not provide header authentication. • For successful encryption, both the sender and receiver must specify the same encryption algorithm and encryption key. The encryption algorithm and encryption key are specified automatically. • For successful authentication, the sender and receiver must specify the same authentication algorithm and authentication key. The authentication algorithm and authentication key are specified automatically. 118

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Transmission Using IPsec
For securer communications, this printer supports the IPsec protocol. When applied, IPsec encrypts data
packets at the network layer using shared key encryption. The printer uses encryption key exchange to
create a shared key for both sender and receiver. To achieve even higher security, you can also renew
the shared key on a validity period basis.
IPsec is not applied to data obtained through DHCP, DNS, or WINS.
IPsec compatible operating systems are Windows XP SP2, Windows Vista/7, Windows Server
2003/2003 R2/2008/2008 R2, Mac OS X 10.4.8 and later, Red Hat Enterprise Linux WS 4.0,
and Solaris 10. However, some setting items are not supported depending on the operating
system. Make sure the IPsec settings you specify are consistent with the operating system's IPsec
settings.
If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec under
[Network Setting] on the control panel, and then access Web Image Monitor.
For details about specifying the IPsec settings using Web Image Monitor, see p.85 "Configuring the
IPsec Settings".
For details about enabling and disabling IPsec using the control panel, see p.123 "Enabling and
Disabling IPsec Using the Control Panel".
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data,
and the authentication function, which verifies the sender of the data and the data's integrity. This
printer's IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec
functions at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. The encryption algorithm and encryption key are specified
automatically.
For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. The authentication algorithm and authentication key are
specified automatically.
9. Appendix
118