EasyManua.ls Logo

Oki C831n - Page 136

Oki C831n
150 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
- 136 -
Changing Network Settings From the Web Page
5
5. Network Settings
Conguring Your Computer
Memo
Be sure to congure the printer before conguring your
computer.
1 Click [Start] and select [Control
Panel]>[Administrative Tools].
2 Double-click [Local Security Policy].
3 On the [Local Security Policy] window,
click [IP Security Policies on Local
Computer].
4 From the [Action] menu, select [Create
IP Security Policy].
5 On the [IP Security Policy Wizard],
click [Next].
6 Enter a [Name] and a [Description]
and then click [Next].
7 Deselect the [Activate the default
response rule (earlier versions of
Windows only)] check box and then
click [Next].
8 Select [Edit Properties] and then click
[Finish].
9 On the IP security policy properties
window, select the [General] tab.
10 Click [Settings].
11 On the [Key Exchange Settings]
window, enter a value (minutes) for
[Authenticate and generate a new
key after every].
Note
Specify the same value as [Lifetime] specied in the
conguration for "Phase1 Proposal" in “Conguring
Your Printer” P.135. Although [Lifetime] is specied
in seconds, enter a value in minutes for this step.
12 Click [Methods].
13 On the [Key Exchange Security
Methods] window, click [Add].
14 Specify [Integrity algorithm],
[Encryption algorithm] and
[Dife-Hellman group].
Note
Select the same value that was specied
in [IKE Encryption Algorithm],
[IKE Hush Algorithm], and
[Dife-Hellman group] at the time of conguration
for "Phase1 Proposal" in “Conguring Your Printer”
P.135.
15 Click [OK].
16 On the [Key Exchange Security
Methods] window, click [OK].
17 On the [Key Exchange Settings]
window, click [OK].
18 On the IP security policy properties
window, select the [Rules] tab.
19 Click [Add].
20 On the [Security Rule Wizard], click
[Next].
21 On the [Tunnel Endpoint] screen,
select [This rule does not specify a
tunnel] and then click [Next].
22 On the [Network Type] screen, select
[All Network Connections] and then
click [Next].
23 On the [IP Filter List] screen, click
[Add].
24 On the [IP Filter List] window, click
[Add].
25 On the [IP Filter Wizard], click [Next].
26 On the [IP Filter Description and
Mirrored Property] screen, click
[Next].
27 On the [IP Trafc Source] screen, click
[Next].
28 On the [IP Trafc Destination] screen,
click [Next].
29 On the [IP Protocol Type] screen, click
[Next].
30 Click [Finish].
31 On the [IP Filter List] window, click
[OK].
32 On the [Security Rule Wizard], select
the new IP lter from the list and then
click [Next].

Table of Contents

Related product manuals