EasyManuals Logo

Ricoh MP 6002 User Manual

Ricoh MP 6002
1208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #916 background imageLoading...
Page #916 background image
For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH protocol + ESP protocol
When combined, the ESP and AH protocols provide secure transmission through both encryption
and authentication. These protocols provide header authentication.
For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
Some operating systems use the term "Compliance" in place of "Authentication".
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings
This machine provides two key setting methods: manual and auto exchange. Using either of these
methods, agreements such as the IPsec algorithm and key must be specified for both sender and
receiver. Such agreements form what is known as an SA (Security Association). IPsec communication is
possible only if the receiver's and sender's SA settings are identical.
If you use the auto exchange method to specify the encryption key, the SA settings are auto configured
on both parties' machines. However, before setting the IPsec SA, the ISAKMP SA (Phase 1) settings are
auto configured. After this, the IPsec SA (Phase 2) settings, which allow actual IPsec transmission, are
auto configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time
limit) for its settings. This machine only supports IKEv1 for encryption key auto exchange.
If you specify the encryption key manually, the SA settings must be shared and specified identically by
both parties. To preserve the security of your SA settings, we recommend that they are not exchanged
over a network.
Note that for both the manual and auto method of encryption key specification, multiple settings can be
configured in the SA.
5. Enhanced Network Security
150

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Ricoh MP 6002 and is the answer not in the manual?

Ricoh MP 6002 Specifications

General IconGeneral
Print TechnologyLaser
FunctionsPrint, Copy, Scan, Fax
Max Paper SizeA3
Print Resolution1200 x 1200 dpi
Maximum Paper Capacity8, 300 sheets
Monthly Duty Cycle300, 000 pages
Fax Speed33.6 kbps
Fax Resolution200 x 200 dpi
Operating System CompatibilityWindows, Mac OS, Linux
Print Speed60 ppm
Scan Resolution600 x 600 dpi
Memory2 GB
Hard Drive160 GB
Network ConnectivityEthernet
Scanner TypeFlatbed, Automatic Document Feeder

Related product manuals