Xerox 6400XF WorkCentre 6400 System Administrator Guide - Page 67

Manual Keying Settings, Internet Key Exchange Settings, Enable Security End Point Address

Page 67 highlights

Security 7. If you selected IKE, under Pre-shared Key Passphrase, type the passphrase, then click Next. 8. Configure selected settings below. Manual Keying Settings Manual Keying is used when client systems either do not support IKE or are not configured for IKE. 1. Under IPsec Mode, select Transport Mode or Tunnel Mode. Note: Transport mode only encrypts the IP payload whereas Tunnel mode encrypts the IP header and the IP payload. Tunnel mode provides protection for an entire IP packet by treating it as an Authentication Header (AH), or Encapsulating Security Payload (ESP). 2. If you select Tunnel Mode, under Enable Security End Point Address, select the address type. Options are Disabled, IPv4 Address, or IPv6 Address. 3. Under IPsec Security, select ESP, AH, or BOTH. 4. In the Security Parameter Index: IN field. 5. In the Security Parameter Index: OUT field, type a 32-bit number larger than 256 that identifies the outbound Security Association (SA). 6. Under Hash, select an option: • Secure Hash Algorithm 1 (SHA1): SHA1 is a one-way hashing algorithm that produces a 128- bit hash. It is considered stronger than MD5 for security, but slower for encryption speed. • Method Digest 5 (MD5): MD5 is a one-way hashing algorithm that produces a 128-bit hash. It is considered weaker than MD5 for security, but faster for encryption speed. • None 7. Under Enter Keys as, select ASCII format or Hexadecimal number. 8. Type the following keys: • Hash Key: IN (20 characters) • Hash Key: OUT (20 characters) 9. If ESP or BOTH were selected as the IP Security type, select the Encryption Method (3DES, AES, or None) then type the following: • Encryption Key: IN (24 characters) • Encryption Key: OUT (24 characters) 10. Click Save. Internet Key Exchange Settings IKE is a keying protocol that allows automatic negotiation and authentication, anti-replay services, CA support, and the ability to change encryption keys during an IPSec session. IKE is generally used as part of virtual private networking. IKE Phase 1 authenticates the IPSec peers and sets up a secure channel between the peers to enable IKE exchanges. IKE Phase 2 negotiates IPSec SAs to set up the IPSec tunnel. 1. Under IKE Phase 1, in the Key Lifetime field, type length of time this key will live in Seconds, Minutes, or Hours. When a key reaches its lifetime, the SA is renegotiated and the key is regenerated or refreshed. WorkCentre 6400 Multifunction Printer 67 System Administrator Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Security
WorkCentre 6400 Multifunction Printer
System Administrator Guide
67
7.
If you selected
IKE
, under
Pre-shared Key Passphrase
, type the passphrase, then click
Next
.
8.
Configure selected settings below.
Manual Keying Settings
Manual Keying is used when client systems either do not support IKE or are not configured for IKE.
1.
Under
IPsec Mode
, select
Transport Mode
or
Tunnel Mode
.
Note:
Transport mode only encrypts the IP payload whereas Tunnel mode encrypts the IP header
and the IP payload. Tunnel mode provides protection for an entire IP packet by treating it as an
Authentication Header (AH), or Encapsulating Security Payload (ESP).
2.
If you select
Tunnel Mode
, under
Enable Security End Point Address
, select the address type.
Options are
Disabled
,
IPv4 Address
, or
IPv6 Address
.
3.
Under
IPsec Security
, select
ESP
,
AH
, or
BOTH
.
4.
In the
Security Parameter Index
:
IN
field.
5.
In the
Security Parameter Index
:
OUT
field, type a 32-bit number larger than 256 that identifies
the outbound Security Association (SA).
6.
Under
Hash
, select an option:
Secure Hash Algorithm 1 (
SHA1
): SHA1 is a one-way hashing algorithm that produces a 128-
bit hash. It is considered stronger than MD5 for security, but slower for encryption speed.
Method Digest 5 (
MD5
): MD5 is a one-way hashing algorithm that produces a 128-bit hash.
It is considered weaker than MD5 for security, but faster for encryption speed.
None
7.
Under
Enter Keys as
, select ASCII format or Hexadecimal number.
8.
Type the following keys:
Hash Key: IN (20 characters)
Hash Key: OUT (20 characters)
9.
If
ESP
or
BOTH
were selected as the IP Security type, select the Encryption Method (
3DES
,
AES
, or
None
) then type the following:
Encryption Key: IN (24 characters)
Encryption Key: OUT (24 characters)
10.
Click
Save
.
Internet Key Exchange Settings
IKE is a keying protocol that allows automatic negotiation and authentication, anti-replay services, CA
support, and the ability to change encryption keys during an IPSec session. IKE is generally used as part
of virtual private networking.
IKE Phase 1 authenticates the IPSec peers and sets up a secure channel between the peers to enable
IKE exchanges. IKE Phase 2 negotiates IPSec SAs to set up the IPSec tunnel.
1.
Under
IKE Phase 1
, in the Key Lifetime field, type length of time this key will live in
Seconds
,
Minutes
, or
Hours
. When a key reaches its lifetime, the SA is renegotiated and the key is
regenerated or refreshed.