Items Settings and Explanation
Service Name If you select Service Name for Method of Choosing Port, select an option.
Transport Protocol If you select Port Number for Method of Choosing Port, you need to configure
an encapsulation mode.
Any Protocol Select this to control all protocol types.
TCP Select this to control data for unicast.
UDP Select this to control data for broadcast and multicast.
ICMPv4 Select this to control ping command.
Local Port If you select Port Number for Method of Choosing Port and if you select TCP or
UDP for Transport Protocol, enter port numbers to control receiving packets,
separating them with commas. You can enter 10 port numbers at the maximum.
Example: 20,80,119,5220
If you do not enter a port number, all ports are controlled.
Remote Port If you select Port Number for Method of Choosing Port and if you select TCP or
UDP for Transport Protocol, enter port numbers to control sending packets, sep-
arating them with commas. You can enter 10 port numbers at the maximum.
Example: 25,80,143,5220
If you do not enter a port number, all ports are controlled.
IKE Version Displays the IKE version.
Authentication Method If you select IPsec for Access Control, select an option.
Pre-Shared Key Enter a pre-shared key between 1 and 127 characters.
Confirm Pre-Shared Key Enter the key you configured for confirmation.
Encapsulation If you select IPsec for Access Control, you need to configure an encapsulation
mode.
Transport Mode If you only use the printer on the same LAN, select
this. IP packets of layer 4 or later are encrypted.
Tunnel Mode If you use the printer on the Internet-capable network
such as IPsec-VPN, select this option. The header and
data of the IP packets are encrypted.
Remote Gateway(Tunnel Mode) If you select Tunnel Mode for Encapsulation, enter a gateway address between
1 and 39 characters.
Security Protocol If you select IPsec for Access Control, select an option.
ESP Select this to ensure the integrity of an authentication
and data, and encrypt data.
AH Select this to ensure the integrity of an authentication
and data. Even if encrypting data is prohibited, you
can use IPsec.
Network Guide
Security Settings
42