Ikev1 settings for an ipsec template – Brother HLL9410CDN Enterprise Color Laser Printer User Manual

Page 144

Advertising
background image

Home >

Security

>

Use IPsec

>

Configure an IPsec Template Using Web Based Management

> IKEv1

Settings for an IPsec Template

IKEv1 Settings for an IPsec Template

Option

Description

Template Name

Type a name for the template (up to 16 characters).

Use Prefixed Template

Select

Custom

,

IKEv1 High Security

or

IKEv1 Medium Security

. The

setting items are different depending on the selected template.

Internet Key Exchange (IKE)

IKE is a communication protocol that is used to exchange encryption
keys in order to carry out encrypted communication using IPsec. To
carry out encrypted communication for that time only, the encryption
algorithm that is necessary for IPsec is determined and the encryption
keys are shared. For IKE, the encryption keys are exchanged using the
Diffie-Hellman key exchange method, and encrypted communication
that is limited to IKE is carried out.
If you selected

Custom

in

Use Prefixed Template

, select

IKEv1

.

Authentication Type

Diffie-Hellman Group

This key exchange method allows secret keys to be securely
exchanged over an unprotected network. The Diffie-Hellman key
exchange method uses a discrete logarithm problem, not the
secret key, to send and receive open information that was
generated using a random number and the secret key.
Select

Group1

,

Group2

,

Group5

, or

Group14

.

Encryption

Select

DES

,

3DES

,

AES-CBC 128

, or

AES-CBC 256

.

Hash

Select

MD5

,

SHA1

,

SHA256

,

SHA384

or

SHA512

.

SA Lifetime

Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).

Encapsulating Security

Protocol

Select

ESP

,

AH

, or

AH+ESP

.

-

ESP is a protocol for carrying out encrypted communication
using IPsec. ESP encrypts the payload (communicated
contents) and adds additional information. The IP packet
comprises the header and the encrypted payload, which
follows the header. In addition to the encrypted data, the IP
packet also includes information regarding the encryption
method and encryption key, the authentication data, and so
on.

-

AH is part of the IPsec protocol that authenticates the
sender and prevents manipulation (ensures the
completeness) of the data. In the IP packet, the data is
inserted immediately after the header. In addition, the
packets include hash values, which are calculated using an
equation from the communicated contents, secret key, and
so on, in order to prevent the falsification of the sender and
manipulation of the data. Unlike ESP, the communicated
contents are not encrypted, and the data is sent and
received as plain text.

Encryption

Select

DES

,

3DES

,

AES-CBC 128

, or

AES-CBC 256

.

Hash

Select

None

,

MD5

,

SHA1

,

SHA256

,

SHA384

or

SHA512

.

139

Advertising