* Enter the name of the utility key. You can search descriptions of utility keys.

IPsec Settings

To display: [Utility][Administrator Settings][Network Settings][TCP/IP Settings][IPsec Settings]

Configure settings to enable use of IPsec on this machine.

The IPsec technology prevents the falsification or leakage of data on the IP packet basis by using encryption technology. As IPsec encrypts data in the network layer, secure communication is ensured even if you use protocols in an upper layer or applications that do not support encryption.

Settings

Description

[IPsec Settings]

Specify parameters required for IPsec communication.

You can configure IKE (Internet Key Exchange), SA (Security Association), IPsec peer, or IPsec protocol settings.

[IKE Settings]

Configure settings required to create a common key for IPsec.

For details, refer to [IKE Settings] .

[IPsec SA Settings]

Configure SA (Security Association) required for encrypted communication.

For details, refer to [IPsec SA Settings] .

[Peer]

Register the peer of this machine to use IPsec.

For details, refer to [Peer] .

[Protocol Setting]

Specify a protocol used for IPsec communication.

For details, refer to [Protocol Setting] .

[Enable IPsec]

Configure settings to enable use of IPsec on this machine. Also, specify the policy for IPsec communication. For details, refer to [Enable IPsec] .

[Communication Check]

Select this option to confirm IPsec communication error logs.

For details, refer to [Communication Check] .

Enable IPsec

Communication Check