Conguration Examples of IPsec/IP Filtering
Receiving IPsec packets only
is example is to congure a default policy only.
Default Policy:
❏ IPsec/IP Filtering: Enable
❏ Access Control: IPsec
❏ Authentication Method: Pre-Shared Key
❏ Pre-Shared Key: Enter up to 127 characters.
Group Policy: Do not congure.
Receiving scanning data and scanner settings
is example allows communications of scanning data and scanner conguration from specied services.
Default Policy:
❏ IPsec/IP Filtering: Enable
❏ Access Control: Refuse Access
Group Policy:
❏ Enable this Group Policy: Check the box.
❏ Access Control: Permit Access
❏ Remote Address(Host): IP address of a client
❏ Method of Choosing Port: Service Name
❏ Service Name: Check the box of ENPC, SNMP, HTTP (Local), HTTPS (Local) and Network Scan.
Receiving access from a specied IP address only
is
example allows a
specied
IP address to access the scanner.
Default Policy:
❏ IPsec/IP Filtering: Enable
❏ Access Control:Refuse Access
Group Policy:
❏ Enable this Group Policy: Check the box.
❏ Access Control: Permit Access
❏ Remote Address(Host): IP address of an administrator’s client
Note:
Regardless of policy conguration, the client will be able to access and congure the scanner.
Administrator Information
>
Advanced Security Settings
>
Encrypted Communication Using IPsec/IP Filtering
240