❏ Algorithm Settings
It is recommended that you select Any for all settings or select an item other than Any for each setting. If you
select Any for some of the settings and select an item other than Any for the other settings, the device may not
communicate depending on the other device that you want to authenticate.
Items Settings and Explanation
IKE Encryption Select the encryption algorithm for IKE.
The items vary depending on the version of IKE.
Authentication Select the authentication algorithm for IKE.
Key Exchange Select the key exchange algorithm for IKE.
The items vary depending on the version of IKE.
ESP Encryption Select the encryption algorithm for ESP.
This is available when ESP is selected for Security Protocol.
Authentication Select the authentication algorithm for ESP.
This is available when ESP is selected for Security Protocol.
AH Authentication Select the encryption algorithm for AH.
This is available when AH is selected for Security Protocol.
Conguring Group Policy
A group policy is one or more rules applied to a user or user group. e scanner controls IP packets that match
with
congured
policies. IP packets are authenticated in the order of a group policy 1 to 10 then a default policy.
1.
Access Web Cong and then select the Network Security tab > IPsec/IP Filtering > Basic.
2.
Click a numbered tab you want to congure.
3.
Enter a value for each item.
4.
Click Next.
A
conrmation
message is displayed.
5.
Click OK.
e
scanner is updated.
Group Policy Setting Items
Items Settings and Explanation
Enable this Group Policy You can enable or disable a group policy.
Access Control
Congure a control method for trac of IP packets.
Advanced Security Settings
>
Encrypted Communication Using IPsec/IP Filtering
>
Conguring Group Policy
104