Using IPSec

Use IP Security Protocol (IPSec) to prevent eavesdropping and tampering of IP packets sent and received over an IP network. This performs encryption at the IP protocol level to ensure security without relying on an application or network configuration.

IPSec Applicable Conditions and Supported Modes

Packets to Which IPSec Is Not Applied
Packets specifying a loopback, multicast, or broadcast address
IKE packets sent from UDP port 500
ICMPv6 Neighbor Solicitation and Neighbor Advertisement packets
Operation Mode of Key Exchange Protocol (IKE Modes)
The IKE modes supported by the machine are the main mode that is used to encrypt packets and aggressive mode without encryption.
IPSec Communication Mode
The communication mode supported by the machine is only the transport mode, which encrypts only the part excluding the IP header. Tunnel mode, which encrypts the entire IP packet, is not supported.
Conforming to FIPS 140-2
During IPSec communication, regardless of the [Format Encryption Method to FIPS 140-2] setting, an encryption module that has obtained FIPS 140-2 authentication is always used. [Format Encryption Method to FIPS 140-2]
To ensure that IPSec communication conforms to FIPS 140-2, you need to set the key length of both the DH and RSA keys for IPSec communication to 2048 bits or longer in the network environment to which the machine belongs.
* You can specify the key length only for the DH key on the machine. There is no setting for the RSA key on the machine, so take this into consideration when building the environment.
Using IPSec Together with IP Address Filtering
When packets are sent, the IP address filter settings are applied first. Setting Up a Firewall
When packets are received, the IPSec settings are applied first.

IPSec Policy Configuration

To perform IPSec communication on the machine, you must create an IPSec policy that includes the applicable range and algorithms for authentication and encryption. The policy is mainly made up of the following items:
Selector
Specify to which IP packets to apply IPSec communication. In addition to specifying the IP address of the machine and communicating devices, you can also specify their port numbers.
Operation Mode of Key Exchange Protocol (IKE Mode)
The key exchange protocol supports Internet Key Exchange version 1 (IKEv1). For the authentication method, select the Pre-Shared Key Method or Digital Signature Method.
Pre-Shared Key Method
This authentication method uses a common keyword called a shared key for communication between the machine and other devices.
Digital Signature Method
The machine and other devices authenticate each other by mutually verifying their digital signatures.
* You need to configure the settings to enable the use of SNTP.
ESP/AH
Configure the settings for the ESP or AH protocols to be used for IPSec communication. Use Perfect Forward Secrecy (PFS) for even greater security.

Configuring IPSec

Enable the use of IPSec, and then create and register an IPSec policy. If multiple policies have been created, specify the order in which they are applied. You can create up to 10 policies.
 
This section describes how to configure the settings using Remote UI from a computer.
On the control panel, select [ Settings/Registration] in the [Home] screen or other screen, and then select [Preferences] to configure the settings. [IPSec Settings]
Administrator or NetworkAdmin privileges are required.
Required Preparations
Connect the machine directly to a computer on the same virtual private network (VPN) as the machine. Confirm the operation conditions, and finish the settings on the computer in advance. IPSec
Prepare the following according to the IKE authentication method:
When using the Pre-Shared Key Method, enable TLS for Remote UI communication. Using TLS
When using the Digital Signature Method, prepare the key and certificate to use, and configure the settings to enable the use of SNTP.
When using PFS, check that PFS is enabled on the communicating device.
1
Log in to Remote UI as an administrator. Starting Remote UI
2
On the Portal page of Remote UI, click [Settings/Registration]. Remote UI Portal Page
3
Click [Network Settings].
The network settings screen is displayed.
4
Click [IPSec Settings].
The [IPSec Settings] screen is displayed.
5
Select the [Use IPSec] checkbox.
To receive only packets that meet the policy, select [Reject] in [Receive Non-Policy Packets].
6
Click [OK].
The network settings screen is displayed again.
7
Click [IPSec Policy List].
The [IPSec Policy List] screen is displayed.
8
Click [Register New IPSec Policy].
The [Register Policy] screen is displayed.
9
Specify the policy name, and select [On] in [Policy On/Off].
For the policy name, enter a name to identify the policy using alphanumeric characters.
10
Restrict the AES key length, as needed.
To restrict the AES key length to 256 bits, such as when you want to meet CC authentication standards, select the [Only Allow 256-bit for AES Key Length] checkbox.
* Canon multifunction machines support two key lengths for the AES encryption method: 128-bit and 256-bit.
11
Set the selector.
1
Click [Selector Settings].
The [Selector] screen is displayed.
2
Set the selector.
3
Click [OK].
The [Register Policy] screen is displayed.
12
Configure the IKE settings.
1
Click [IKE Settings].
The [IKE] screen is displayed.
2
Configure the IKE settings.
3
Click [OK].
The [Register Policy] screen is displayed again.
13
Configure the IPSec network settings.
1
Click [IPSec Network Settings].
The [IPSec Network] screen is displayed.
2
Configure the IPSec network settings.
3
Click [OK].
The [Register Policy] screen is displayed again.
14
Click [OK].
The created policy is added to the [IPSec Policy List] screen.
When Multiple Policies Are Registered
15
Click [Apply Setting Changes] [OK].
The settings are applied.
16
Log out from Remote UI.
NOTE
Editing Registered Policies
To edit the registered information, click the policy name you want to edit on the [IPSec Policy List] screen.
A0YC-1RW