User GuideIM 350/430 series

Configuring IPsec Settings

For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine uses automatic key exchange to configure the pre-shared key for both parties. Using the auto exchange setting, you can renew the shared key exchange settings within a specified validity period, and achieve higher transmission security.

Important

  • When "Inactive" is specified for "Exclude HTTPS Communication", access to Web Image Monitor controlled from networked computers can be lost if the key settings are improperly configured. (Web Image Monitor is a management tool installed on this machine to monitor this machine or configure settings for this machine by using a web browser.) In order to prevent this, you can specify IPsec to exclude HTTPS transmission by selecting "Active". When you want to include HTTPS transmission, we recommend that you select "Inactive" for "Exclude HTTPS Communication" after confirming that IPsec is properly configured. When "Active" is selected for "Exclude HTTPS Communication", even though HTTPS transmission is not targeted by IPsec, Web Image Monitor might become unusable when TCP is targeted by IPsec from the computer side.

  • If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec in System Settings on the control panel, and then access Web Image Monitor.

  • For details about enabling and disabling IPsec using the control panel, see "Interface Settings", Settings.

  • IPsec is not applied to data obtained through DHCP, DNS, or WINS.

Supported operating systems

Operating systems

Note

  • Windows 7/8.1/10

  • Windows Server 2008/2008 R2/2012/2012 R2/2016/2019

  • Mac OS X 10.11 or later

  • Red Hat Enterprise Linux WS 4.0

  • Solaris 10

IPsec over both IPv4 and IPv6 can be used.

Some setting items are not supported depending on the operating system. Make sure the IPsec settings you specify are consistent with the operating system's IPsec settings.