3 Using a TCP/IP NetworkRegistering a Security Policy 3-67Press [Digital sig. Method] → [Key and Certificate] for Method>, select the key pair you want to use → press [Set as the Default Key]to register the key pair to use for IPSec.You cannot set to use "Device Signature Key" or "AMS" (key pair for access restrictions).The key pair used for SSL can also be used as the key for IPSec.The key pair used for this product and the root CA certificate used in the device to communicate with mustbe issued from the same root certificate authority.It is necessary to use the Remote UI to delete a key pair registered for IPSec.(See the Remote UI Guide)You can check the content of a certificate by selecting a key pair on the Key and Certificate screen, andpressing [Certificate Details]. On the Certificate Details screen, you can press [Certificate Verification] toverify the certificate.You can check what a key pair is being used for by selecting a key pair with 'Using' displayed for on the Key and Certificate screen, and pressing [Display Use Location].9. On the IKE Settings screen, select the algorithm for the authenticationand encryption to use for IKE phase 1.● Specifying the Authentication and Encryption Algorithm:● Automatically Setting the Authentication and Encryption Algorithm:Specifying the Authentication and Encryption Algorithm: PreviousNext |