Specify exactly the same settings for IPsec SA settings on your computer as are specified for the IPsec Settings on the printer. Setting methods differ according to the computer's operating system. The following procedure is based on Windows 7 in an IPv4 environment as an example.
On the [Start] menu, click [Control Panel], [System and Security], and then click [Administrative Tools].
Double-click [Local Security Policy], and then click [IP Security Policies on Local Computer].
In the "Action" menu, click [Create IP Security Policy...].
The IP Security Policy Wizard appears.
Click [Next].
Enter a security policy name in "Name", and then click [Next].
Clear the "Activate the default response rule (earlier versions of Windows only)." check box, and then click [Next].
Select "Edit properties", and then click [Finish].
In the "General" tab, click [Settings...].
In "Authenticate and generate a new key after every", enter the same validity period (in minutes) that is specified on the printer in [IKE Life Time], and then click [Methods...].
Confirm that the Encryption Algorithm ("Encryption"), Hash Algorithm ("Integrity"), and IKE Diffie-Hellman Group ("Diffie-Hellman Group") settings in "Security method preference order" all match those specified on the printer in [IKE Settings].
If the settings are not displayed, click [Add...].
Click [OK] twice.
Click [Add...] in the "Rules" tab.
The Security Rule Wizard appears.
Click [Next].
Select "This rule does not specify a tunnel", and then click [Next].
Select the type of network for IPsec, and then click [Next].
Click [Add...] in the IP Filter List.
In [Name], enter an IP Filter name, and then click [Add...].
The IP Filter Wizard appears.
Click [Next].
In [Description:], enter a name or a detailed explanation of the IP filter, and then click [Next].
You may click [Next] and proceed to the next step without entering any information in this field.
Select "My IP Address" in "Source address", and then click [Next].
Select "A specific IP Address or Subnet" in "Destination address", enter the printer's IP address, and then click [Next].
For the IPsec protocol type, select "Any", and then click [Next].
Click [Finish], and then click [OK].
Select the IP filter that you have just created, and then click [Next].
Click [Add...] in the Filter Action.
The Filter Action Wizard appears.
Click [Next].
In [Name], enter a Filter Action name, and then click [Next].
Select "Negotiate security", and then click [Next].
Select one of options for computers allowed to communicate with, and then click [Next].
Select "Custom" and click [Settings...].
When [ESP] is selected for the printer in [Security Protocol] under [IPsec Settings], select [Data integrity and encryption (ESP)], and configure the following settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for ESP] specified on the printer.
Set the value of [Encryption algorithm] to the same value as the [Encryption Algorithm for ESP] specified on the printer.
When [AH] is selected for the printer in [Security Protocol] under [IPsec Settings], select [Data and address integrity without encryption (AH)], and configure the following settings:
Set the value of [Integrity algorithm] to the same value as the [Authentication Algorithm for AH] specified on the printer.
Clear the [Data integrity and encryption (ESP)] check box.
When [ESP&AH] is selected for the printer in [Security Protocol] under [IPsec Settings], select [Data and address integrity without encryption (AH)], and configure the following settings:
Set the value of [Integrity algorithm] under [Data and address integrity without encryption (AH)] to the same value as [Authentication Algorithm for AH] specified on the printer.
Set the value of [Encryption algorithm] under [Data integrity and encryption (ESP)] to the same value as [Encryption Algorithm for ESP] specified on the printer.
In the Session key settings, select "Generate a new key every", and enter the same validity period (in seconds or Kbytes) as that specified for [Life Time] on the printer.
Click [OK], and then click [Next]
Click [Finish].
If you are using IPv6 under Windows Vista or a newer version of Windows, you must repeat this procedure from step 12 and specify ICMPv6 as an exception. When you reach step 22, select [58] as the protocol number for the "Other" target protocol type, and then set [Negotiate security] to [Permit].
Select the filter action that you have just created, and then click [Next].
Select one of options for an authentication method, and then click [Next].
Click [Finish], and then click [OK] twice.
The new IP security policy (IPsec settings) is specified.
Select the security policy that you have just created, right click on it, and then click [Assign].
IPsec settings on the computer are enabled.
To disable the computer's IPsec settings, select the security policy, right click, and then click [Un-assign].