Ricoh SP C250DN Operating Instructions - Page 182

Encryption Key Exchange Settings Configuration Flow, Specifying Encryption Key Exchange Settings

Page 182 highlights

8. Appendix Encryption Key Exchange Settings Configuration Flow This section explains the procedure for specifying encryption key exchange settings. Machine PC 1. Set the IPsec settings on Web Image Monitor. 1. Set the same IPsec settings as the machine on PC. 2. Enable IPsec settings. 2. Enable IPsec settings. 3. Confirm IPsec transmission. • After configuring IPsec, you can use "ping" command to check if the connection is established correctly. Because the response is slow during initial key exchange, it may take some time to confirm that transmission has been established. • If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec on the control panel, and then access Web Image Monitor. • For details about disabling IPsec using the control panel, see page 92 "Host Interface Menu". Specifying Encryption Key Exchange Settings • [IPsec Settings] appears only if the administrator password has been configured. Specify it using Web Image Monitor. 1. Start the Web browser, and access the machine by entering its IP address. 2. Click [IPsec Settings]. 3. Click the [IPsec Policy List] tab. 4. Select the number of the setting you want to modify in the list, and then click [Change]. 5. Modify the IPsec related settings as necessary. 6. Enter the administrator password, and then click [Apply]. 7. Click the [IPsec Global Settings] tab, and then select [Active] in [IPsec Function]. 8. If necessary, specify [Default Policy], [Broadcast and Multicast Bypass], and [All ICMP Bypass] also. 9. Enter the administrator password, and then click [Apply]. 180

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Encryption Key Exchange Settings Configuration Flow
This section explains the procedure for specifying encryption key exchange settings.
Machine
PC
1. Set the IPsec settings on Web Image Monitor.
1. Set the same IPsec settings as the machine on
PC.
2. Enable IPsec settings.
2. Enable IPsec settings.
3. Confirm IPsec transmission.
After configuring IPsec, you can use "ping" command to check if the connection is established
correctly. Because the response is slow during initial key exchange, it may take some time to
confirm that transmission has been established.
If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec on
the control panel, and then access Web Image Monitor.
For details about disabling IPsec using the control panel, see page 92 "Host Interface Menu".
Specifying Encryption Key Exchange Settings
[IPsec Settings] appears only if the administrator password has been configured.
Specify it using Web Image Monitor.
1.
Start the Web browser, and access the machine by entering its IP address.
2.
Click [IPsec Settings].
3.
Click the [IPsec Policy List] tab.
4.
Select the number of the setting you want to modify in the list, and then click [Change].
5.
Modify the IPsec related settings as necessary.
6.
Enter the administrator password, and then click [Apply].
7.
Click the [IPsec Global Settings] tab, and then select [Active] in [IPsec Function].
8.
If necessary, specify [Default Policy], [Broadcast and Multicast Bypass], and [All ICMP
Bypass] also.
9.
Enter the administrator password, and then click [Apply].
8. Appendix
180