Group Policy Setting Items

Items

Settings and Explanation

Enable this Group Policy

You can enable or disable a group policy.

Access Control

Configure a control method for traffic of IP packets.

Items

Settings and Explanation

Permit Access

Select this to permit configured IP packets to pass through.

Refuse Access

Select this to refuse configured IP packets to pass through.

IPsec

Select this to permit configured IPsec packets to pass through.

Local Address (Scanner)

Select an IPv4 address or IPv6 address that matches your network environment. If an IP address is assigned automatically, you can select Use auto-obtained IPv4 address.

Note:

If an IPv6 address is assigned automatically, the connection may be unavailable. Configure a static IPv6 address.

Remote Address(Host)

Enter a device's IP address to control access. The IP address must be 43 characters or less. If you do not enter an IP address, all addresses are controlled.

Note:

If an IP address is assigned automatically (e.g. assigned by DHCP), the connection may be unavailable. Configure a static IP address.

Method of Choosing Port

Select a method to specify ports.

  • Service Name

    If you select Service Name for Method of Choosing Port, select an option.

  • Transport Protocol

    If you select Port Number for Method of Choosing Port, you need to configure an encapsulation mode.

    Items

    Settings and Explanation

    Any Protocol

    Select this to control all protocol types.

    TCP

    Select this to control data for unicast.

    UDP

    Select this to control data for broadcast and multicast.

    ICMPv4

    Select this to control ping command.

  • Local Port

    If you select Port Number for Method of Choosing Port and if you select TCP or UDP for Transport Protocol, enter port numbers to control receiving packets, separating them with commas. You can enter 10 port numbers at the maximum.

    Example: 20,80,119,5220

    If you do not enter a port number, all ports are controlled.

  • Remote Port

    If you select Port Number for Method of Choosing Port and if you select TCP or UDP for Transport Protocol, enter port numbers to control sending packets, separating them with commas. You can enter 10 port numbers at the maximum.

    Example: 25,80,143,5220

    If you do not enter a port number, all ports are controlled.

IKE Version

Select IKEv1 or IKEv2 for IKE Version. Select one of them according to the device that the scanner is connected to.

  • IKEv1

    The following items are displayed when you select IKEv1 for IKE Version.

    Items

    Settings and Explanation

    Authentication Method

    If you select IPsec for Access Control, select an option. Used certificate is common with a default policy.

    Pre-Shared Key

    If you select Pre-Shared Key for Authentication Method, enter a pre-shared key between 1 and 127 characters.

    Confirm Pre-Shared Key

    Enter the key you configured for confirmation.

  • IKEv2

    The following items are displayed when you select IKEv2 for IKE Version.

    Items

    Settings and Explanation

    Local

    Authentication Method

    If you select IPsec for Access Control, select an option. Used certificate is common with a default policy.

    ID Type

    If you select Pre-Shared Key for Authentication Method, select the type of ID for the scanner.

    ID

    Enter the scanner's ID that matches the type of ID.

    You cannot use "@", "#", and "=" for the first character.

    Distinguished Name : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "=".

    IP Address : Enter IPv4 or IPv6 format.

    FQDN : Enter a combination of between 1 and 255 characters using A-Z, a-z, 0-9, "-", and period (.).

    Email Address : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "@".

    Key ID : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters.

    Pre-Shared Key

    If you select Pre-Shared Key for Authentication Method, enter a pre-shared key between 1 and 127 characters.

    Confirm Pre-Shared Key

    Enter the key you configured for confirmation.

    Remote

    Authentication Method

    If you select IPsec for Access Control, select an option. Used certificate is common with a default policy.

    ID Type

    If you select Pre-Shared Key for Authentication Method, select the type of ID for the device that you want to authenticate.

    ID

    Enter the scanner's ID that matches to the type of ID.

    You cannot use "@", "#", and "=" for the first character.

    Distinguished Name : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "=".

    IP Address : Enter IPv4 or IPv6 format.

    FQDN : Enter a combination of between 1 and 255 characters using A-Z, a-z, 0-9, "-", and period (.).

    Email Address : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "@".

    Key ID : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters.

    Pre-Shared Key

    If you select Pre-Shared Key for Authentication Method, enter a pre-shared key between 1 and 127 characters.

    Confirm Pre-Shared Key

    Enter the key you configured for confirmation.

Encapsulation

If you select IPsec for Access Control, you need to configure an encapsulation mode.

Items

Settings and Explanation

Transport Mode

If you only use the scanner on the same LAN, select this. IP packets of layer 4 or later are encrypted.

Tunnel Mode

If you use the scanner on the Internet-capable network such as IPsec-VPN, select this option. The header and data of the IP packets are encrypted.

Remote Gateway(Tunnel Mode): If you select Tunnel Mode for Encapsulation, enter a gateway address between 1 and 39 characters.

Security Protocol

If you select IPsec for Access Control, select an option.

Items

Settings and Explanation

ESP

Select this to ensure the integrity of an authentication and data, and encrypt data.

AH

Select this to ensure the integrity of an authentication and data. Even if encrypting data is prohibited, you can use IPsec.

Algorithm Settings

It is recommended that you select Any for all settings or select an item other than Any for each setting. If you select Any for some of the settings and select an item other than Any for the other settings, the device may not communicate depending on the other device that you want to authenticate.

Items

Settings and Explanation

IKE

Encryption

Select the encryption algorithm for IKE.

The items vary depending on the version of IKE.

Authentication

Select the authentication algorithm for IKE.

Key Exchange

Select the key exchange algorithm for IKE.

The items vary depending on the version of IKE.

ESP

Encryption

Select the encryption algorithm for ESP.

This is available when ESP is selected for Security Protocol.

Authentication

Select the authentication algorithm for ESP.

This is available when ESP is selected for Security Protocol.

AH

Authentication

Select the encryption algorithm for AH.

This is available when AH is selected for Security Protocol.