Multiple settings can be configured in the SA.
Settings 1-10
You can configure ten separate sets of SA details (such as different shared keys and IPsec
algorithms).
IPsec policies are searched through one by one, starting at [No.1].
Encryption Key Exchange Settings Configuration Flow
This section explains the procedure for specifying encryption key exchange settings.
Machine PC
1. Set the IPsec settings on Web Image Monitor.
1. Set the same IPsec settings as the machine on
PC.
2. Enable IPsec settings. 2. Enable IPsec settings.
3. Confirm IPsec transmission.
• After configuring IPsec, you can use "ping" command to check if the connection is established
correctly. Because the response is slow during initial key exchange, it may take some time to
confirm that transmission has been established.
• When using the touch panel model
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec
under [Administrator Tools] on the control panel, and then access Web Image Monitor.
• When using the four-line LCD panel model
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec
under [Admin. Tools] on the control panel, and then access Web Image Monitor.
• When using the touch panel model
• For details about disabling IPsec using the control panel, see page 271 "Administrator Tools
Settings (When Using the Touch Panel Model)".
• When using the four-line LCD panel model
• For details about disabling IPsec using the control panel, seepage 310 "Administrator Tools
Settings (When Using the Four-line LCD Panel Model)".
Transmission Using IPsec
459