Operation Manual

Table Of Contents
Before using IPSec for encrypted communication, you need to register security policies (SP). A security policy consists of the groups of
settings described below. Up to 10 policies can be registered. After registering policies, specify the order in which they are applied.
Selector
Selector defines conditions for IP packets to apply IPSec communication. Selectable conditions include IP addresses and port
numbers of the machine and the devices to communicate with.
IKE
IKE configures the IKEv1 that is used for key exchange protocol. Note that instructions vary depending on the authentication method
selected.
[Pre-Shared Key Method]
A key of up to 24 alphanumeric characters can be shared with the other devices. Enable SSL for the Remote UI before specifying this
authentication method (
Enabling SSL Encrypted Communication for the Remote UI).
[Digital Signature Method]
The machine and the other devices authenticate each other by mutually verifying their digital signatures. Generate or install the key
pair beforehand (
Configuring Settings for Key Pairs and Digital Certificates).
AH/ESP
Specify the settings for AH/ESP, which is added to packets during IPSec communication. AH and ESP can be used at the same time.
You can also select whether or not to enable PFS for tighter security.
Start the Remote UI and log on in System Manager Mode. Starting Remote UI
Click [Settings/Registration].
Click [Security Settings] [IPSec Settings].
Click [Edit...].
Configuring IPSec Settings
1
2
3
4
㻠㻟㻡㻌㻛㻌㻢㻣㻢