EasyManua.ls Logo

Epson WF-C5890 Series

Epson WF-C5890 Series
491 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Algorithm Settings
It is recommended that you select Any for all settings or select an item other than Any for each setting. If you
select Any for some of the settings and select an item other than Any for the other settings, the device may not
communicate depending on the other device that you want to authenticate.
Items Settings and Explanation
IKE Encryption Select the encryption algorithm for IKE.
The items vary depending on the version of IKE.
Authentication Select the authentication algorithm for IKE.
Key Exchange Select the key exchange algorithm for IKE.
The items vary depending on the version of IKE.
ESP Encryption Select the encryption algorithm for ESP.
This is available when ESP is selected for Security Protocol.
Authentication Select the authentication algorithm for ESP.
This is available when ESP is selected for Security Protocol.
AH Authentication Select the encryption algorithm for AH.
This is available when AH is selected for Security Protocol.
Related Information
& Default Value of the Administrator Password on page 19
Conguring Group Policy
A group policy is one or more rules applied to a user or user group. e printer controls IP packets that match with
congured policies. IP packets are authenticated in the order of a group policy 1 to 10 then a default policy.
1. Enter the printer's IP address into a browser to access Web Cong.
Enter the printer's IP address from a computer that is connected to the same network as the printer.
You can check the IP address of the printer from the following menu.
Settings > General Settings > Network Settings > Network Status > Wired LAN/Wi-Fi Status
2. Enter the administrator password to log in as an administrator.
3. Select in the following order.
Network Security tab > IPsec/IP Filtering > Basic
4. Click a numbered tab you want to congure.
5. Enter a value for each item.
6. Click Next.
A conrmation message is displayed.
Administrator Information
>
Network Security Settings
>
Encrypted Communication Using IPsec/IP Filtering
465

Table of Contents

Related product manuals