EasyManua.ls Logo

Aficio MP 2352 - Page 2041

Aficio MP 2352
2331 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
PSK character string setting
msh> ipsec ike {1|2|3|4|default} psk PSK character string
If you select PSK as the authentication method, enter the separate setting number [1-4] or
[default] and specify the PSK character string.
Specify the character string in ASCII characters. There can be no abbreviations.
ISAKMP SA (phase 1) hash algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 hash {md5|sha1}
Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
hash algorithm.
To use MD5, enter [md5]. To use SHA1, enter [sha1].
Not specifying the hash algorithm displays the current setting.
ISAKMP SA (phase 1) encryption algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des}
Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
encryption algorithm.
To use DES, enter [des]. To use 3DES, enter [3des].
Not specifying an encryption algorithm displays the current setting.
ISAKMP SA (phase 1) Diffie-Hellman group setting
msh> ipsec ike {1|2|3|4|default} ph1 dhgroup {1|2|14}
Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
Diffie-Hellman group number.
Specify the group number to be used.
Not specifying a group number displays the current setting.
ISAKMP SA (phase 1) validity period setting
msh> ipsec ike {1|2|3|4|default} ph1 lifetime validity period
Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
validity period.
Enter the validity period (in seconds) from 300 to 172800.
Not specifying a validity period displays the current setting.
IPsec SA (phase 2) authentication algorithm setting
msh> ipsec ike {1|2|3|4|default} ph2 auth {hmac-md5|hmac-sha1}
Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2)
authentication algorithm.
Separate multiple encryption algorithm entries with a comma (,). The current setting values are
displayed in order of highest priority.
7. Enhanced Network Security
252
7

Table of Contents

Related product manuals