
9. Appendix
This chapter describes the machine specifications and consumables.
Transmission Using IPsec
For securer communications, this machine supports the IPsec protocol. When applied, IPsec encrypts
data packets at the network layer using shared key encryption. The machine uses encryption key
exchange to create a shared key for both sender and receiver. To achieve even higher security, you can
also renew the shared key on a validity period basis.
• IPsec is not applied to data obtained through DHCP or DNS.
• IPsec compatible operating systems are Windows 7 or later, Windows Server 2008 or later, OS X
10.10 or later, Red Hat Enterprise Linux 6.8, 6.9, 6.10, 7.4, 7.5, and 7.6. However, some setting
items are not supported depending on the operating system. Make sure the IPsec settings you
specify are consistent with the operating system's IPsec settings.
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec under
[Admin. Tools] on the control panel, and then access Web Image Monitor.
• For details about specifying the IPsec settings using Web Image Monitor, seepage 92 "Using Web
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data,
and the authentication function, which verifies the sender of the data and the data's integrity. This
machine's IPsec function supports two security protocols: the ESP protocol, which enables both of the
IPsec functions at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. The encryption algorithm and encryption key are specified
automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. The authentication algorithm and authentication key are
specified automatically.
187
Summary of Contents for P C300W
Page 2: ......
Page 10: ...5 Click the manual you want to refer to The PDF file manual opens 8...
Page 82: ...Default Normal Normal Curl Prevented 4 Configuring the Machine Using the Control Panel 80...
Page 92: ...4 Configuring the Machine Using the Control Panel 90...
Page 126: ...5 Configuring the Machine Using Utilities 124...
Page 150: ...6 Maintaining the Machine 148...
Page 157: ...Main unit 1 DUE319 3 2 1 DUE288 2 DUE289 Removing Paper Jams 155...
Page 158: ...3 DUE290 Waste toner bottle ECC168 Paper feed unit DUE320 1 7 Troubleshooting 156...
Page 188: ...8 Configuring Network Settings 186...
Page 199: ...Weight Less than 4 kg 8 9 lb Specifications of the Machine 197...
Page 212: ...9 Appendix 210...
Page 216: ...MEMO 214...
Page 217: ...MEMO 215...
Page 218: ...MEMO 216 EN GB EN US EN AU M0CW 8604A...
Page 219: ......
Page 220: ...EN GB EN US EN AU M0CW 8604A 2019...