Transmission Using IPsec
This can be specified by the network administrator.
For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP
protocol level using the shared key encryption method, where both the sender and receiver retain the same
key. This machine has two methods that you can use to specify the shared encryption key for both parties:
encryption key auto exchange and encryption key manual settings. Using the auto exchange setting, you
can renew the shared key exchange settings within a specified validity period, and achieve higher
transmission security.
• When "Inactive" is specified for "Exclude HTTPS Transmission", access to Web Image Monitor can
be lost if the key settings are improperly configured. In order to prevent this, you can specify IPsec to
exclude HTTPS transmission by selecting "Active". When you want to include HTTPS transmission, we
recommend that you select "Inactive" for "Exclude HTTPS Transmission" after confirming that IPsec is
properly configured. When "Active" is selected for "Exclude HTTPS Transmission", even though HTTPS
transmission is not targeted by IPsec, Web Image Monitor might become unusable when TCP is
targeted by IPsec from the computer side. If you cannot access Web Image Monitor due to IPsec
configuration problems, disable IPsec in System Settings on the control panel, and then access Web
Image Monitor. For details about enabling and disabling IPsec using the control panel, see "System
Settings", General Settings Guide.
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
• IPsec compatible operating systems are Windows XP SP2, Windows Vista, Mac OSX 10.4 and later,
RedHat Linux Enterprise WS 4.0, and Solaris 10. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data, and
the authentication function, which verifies the sender of the data and the data's integrity. This machine's
IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec functions
at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
Performs secure transmission through both encryption and authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
Transmission Using IPsec
123
5
Содержание Pro C550EX
Страница 9: ...INDEX 229 7...
Страница 18: ...1 Getting Started 16 1...
Страница 68: ...2 Authentication and its Application 66 2...
Страница 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...
Страница 96: ...3 Ensuring Information Security 94 3...
Страница 102: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user 4 Managing Access to the Machine 100 4...
Страница 104: ...4 Managing Access to the Machine 102 4...
Страница 148: ...5 Enhanced Network Security 146 5...
Страница 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...
Страница 162: ...6 Specifying the Extended Security Functions 160 6...
Страница 180: ...7 Troubleshooting 178 7...
Страница 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...
Страница 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...
Страница 233: ...MEMO 231...
Страница 234: ...MEMO 232 EN USA D0797508...
Страница 236: ...Operating Instructions Security Reference D079 7508 EN USA Type for Pro C550EX Type for Pro C700EX...