2. The device certificate and public key are sent from the machine to the user's computer.
3. Create a shared key from the user's computer, and then encrypt it using the public key.
4. The encrypted shared key is sent to the machine.
5. The encrypted shared key is decrypted in the machine using the private key.
6. Transmit the encrypted data using the shared key, and the data is then decrypted at the machine to
attain secure transmission.
Configuration flow (self-signed certificate)
1. Creating and installing the device certificate
Install the device certificate using Web Image Monitor.
2. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
Configuration flow (certificate issued by a certificate authority)
1. Creating the device certificate
Create the device certificate using Web Image Monitor.
The application procedure after creating the certificate depends on the certificate authority.
Follow the procedure specified by the certificate authority.
2. Installing the device certificate
Install the device certificate using Web Image Monitor.
3. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
• To confirm whether SSL configuration is enabled, enter "https://(the machine's IP address or host
name)/" in your Web browser's address bar to access this machine. If the "The page cannot be
displayed" message appears, check the configuration because the current SSL configuration is invalid.
Creating and Installing the Self-Signed Certificate
Create and install the device certificate using Web Image Monitor. For details about the displayed items
and selectable items, see Web Image Monitor Help.
This section explains the use of a self-signed certificate as the device certificate.
1.
Open a Web browser.
2.
Enter "http://(the machine's IP address or host name)/" in the address bar.
When entering an IPv4 address, do not begin segments with zeros. For example: If the address is
"192.168.001.010", you must enter it as "192.168.1.10" to connect to the machine.
The top page of Web Image Monitor appears.
5. Enhanced Network Security
114
5
Содержание Pro C550EX
Страница 9: ...INDEX 229 7...
Страница 18: ...1 Getting Started 16 1...
Страница 68: ...2 Authentication and its Application 66 2...
Страница 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Страница 96: ...3 Ensuring Information Security 94 3...
Страница 102: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user 4 Managing Access to the Machine 100 4...
Страница 104: ...4 Managing Access to the Machine 102 4...
Страница 148: ...5 Enhanced Network Security 146 5...
Страница 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Страница 162: ...6 Specifying the Extended Security Functions 160 6...
Страница 180: ...7 Troubleshooting 178 7...
Страница 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Страница 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Страница 233: ...MEMO 231...
Страница 234: ...MEMO 232 EN USA D0797508...
Страница 236: ...Operating Instructions Security Reference D079 7508 EN USA Type for Pro C550EX Type for Pro C700EX...