Items |
Settings and Explanation |
---|---|
Enable this Group Policy |
You can enable or disable a group policy. |
Access Control
Configure a control method for traffic of IP packets.
Items |
Settings and Explanation |
---|---|
Permit Access |
Select this to permit configured IP packets to pass through. |
Refuse Access |
Select this to refuse configured IP packets to pass through. |
IPsec |
Select this to permit configured IPsec packets to pass through. |
Local Address (Scanner)
Select an IPv4 address or IPv6 address that matches your network environment. If an IP address is assigned automatically, you can select Use auto-obtained IPv4 address.
If an IPv6 address is assigned automatically, the connection may be unavailable. Configure a static IPv6 address.
Remote Address(Host)
Enter a device's IP address to control access. The IP address must be 43 characters or less. If you do not enter an IP address, all addresses are controlled.
If an IP address is assigned automatically (e.g. assigned by DHCP), the connection may be unavailable. Configure a static IP address.
Method of Choosing Port
Select a method to specify ports.
Service Name
If you select Service Name for Method of Choosing Port, select an option.
Transport Protocol
If you select Port Number for Method of Choosing Port, you need to configure an encapsulation mode.
Items |
Settings and Explanation |
---|---|
Any Protocol |
Select this to control all protocol types. |
TCP |
Select this to control data for unicast. |
UDP |
Select this to control data for broadcast and multicast. |
ICMPv4 |
Select this to control ping command. |
Local Port
If you select Port Number for Method of Choosing Port and if you select TCP or UDP for Transport Protocol, enter port numbers to control receiving packets, separating them with commas. You can enter 10 port numbers at the maximum.
Example: 20,80,119,5220
If you do not enter a port number, all ports are controlled.
Remote Port
If you select Port Number for Method of Choosing Port and if you select TCP or UDP for Transport Protocol, enter port numbers to control sending packets, separating them with commas. You can enter 10 port numbers at the maximum.
Example: 25,80,143,5220
If you do not enter a port number, all ports are controlled.
IKE Version
Select IKEv1 or IKEv2 for IKE Version. Select one of them according to the device that the scanner is connected to.
IKEv1
The following items are displayed when you select IKEv1 for IKE Version.
Items |
Settings and Explanation |
---|---|
Authentication Method |
If you select IPsec for Access Control, select an option. Used certificate is common with a default policy. |
Pre-Shared Key |
If you select Pre-Shared Key for Authentication Method, enter a pre-shared key between 1 and 127 characters. |
Confirm Pre-Shared Key |
Enter the key you configured for confirmation. |
IKEv2
The following items are displayed when you select IKEv2 for IKE Version.
Items |
Settings and Explanation |
||
---|---|---|---|
Local |
Authentication Method |
If you select IPsec for Access Control, select an option. Used certificate is common with a default policy. |
|
ID Type |
If you select Pre-Shared Key for Authentication Method, select the type of ID for the scanner. |
||
ID |
Enter the scanner's ID that matches the type of ID. You cannot use "@", "#", and "=" for the first character. Distinguished Name : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "=". IP Address : Enter IPv4 or IPv6 format. FQDN : Enter a combination of between 1 and 255 characters using A-Z, a-z, 0-9, "-", and period (.). Email Address : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "@". Key ID : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. |
||
Pre-Shared Key |
If you select Pre-Shared Key for Authentication Method, enter a pre-shared key between 1 and 127 characters. |
||
Confirm Pre-Shared Key |
Enter the key you configured for confirmation. |
||
Remote |
Authentication Method |
If you select IPsec for Access Control, select an option. Used certificate is common with a default policy. |
|
ID Type |
If you select Pre-Shared Key for Authentication Method, select the type of ID for the device that you want to authenticate. |
||
ID |
Enter the scanner's ID that matches to the type of ID. You cannot use "@", "#", and "=" for the first character. Distinguished Name : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "=". IP Address : Enter IPv4 or IPv6 format. FQDN : Enter a combination of between 1 and 255 characters using A-Z, a-z, 0-9, "-", and period (.). Email Address : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. You need to include "@". Key ID : Enter 1 to 255 1-byte ASCII (0x20 to 0x7E) characters. |
||
Pre-Shared Key |
If you select Pre-Shared Key for Authentication Method, enter a pre-shared key between 1 and 127 characters. |
||
Confirm Pre-Shared Key |
Enter the key you configured for confirmation. |
Encapsulation
If you select IPsec for Access Control, you need to configure an encapsulation mode.
Items |
Settings and Explanation |
---|---|
Transport Mode |
If you only use the scanner on the same LAN, select this. IP packets of layer 4 or later are encrypted. |
Tunnel Mode |
If you use the scanner on the Internet-capable network such as IPsec-VPN, select this option. The header and data of the IP packets are encrypted. Remote Gateway(Tunnel Mode): If you select Tunnel Mode for Encapsulation, enter a gateway address between 1 and 39 characters. |
Security Protocol
If you select IPsec for Access Control, select an option.
Items |
Settings and Explanation |
---|---|
ESP |
Select this to ensure the integrity of an authentication and data, and encrypt data. |
AH |
Select this to ensure the integrity of an authentication and data. Even if encrypting data is prohibited, you can use IPsec. |
Algorithm Settings
It is recommended that you select Any for all settings or select an item other than Any for each setting. If you select Any for some of the settings and select an item other than Any for the other settings, the device may not communicate depending on the other device that you want to authenticate.
Items |
Settings and Explanation |
||
---|---|---|---|
IKE |
Encryption |
Select the encryption algorithm for IKE. The items vary depending on the version of IKE. |
|
Authentication |
Select the authentication algorithm for IKE. |
||
Key Exchange |
Select the key exchange algorithm for IKE. The items vary depending on the version of IKE. |
||
ESP |
Encryption |
Select the encryption algorithm for ESP. This is available when ESP is selected for Security Protocol. |
|
Authentication |
Select the authentication algorithm for ESP. This is available when ESP is selected for Security Protocol. |
||
AH |
Authentication |
Select the encryption algorithm for AH. This is available when AH is selected for Security Protocol. |