2.2.13.1. Basic Settings of IPsecΒΆ
By default neither the device access to nor its policy have been set up. Before utilizing the Security function, you need to configure the required settings according to your environment.
Below is a procedure on how to set up the basic settings of Security.
For additional information on the individual setting procedure on respective items, please refer to each appropriate procedure for each of the settings.
The flow diagram at the time of IPsec setting (Add / Delete) and the relation diagram of each object are as follows.
The flow diagram at the time of adding IPsec setting and the relation diagram of each object are as follows.
The flow diagram at the time of deleting IPsec setting and the relation diagram of each object are as follows.