imageRUNNER ADVANCE C7500 III Series Customer Expectations Document
Version 3
imageRUNNER ADVANCE C7500 III Series Customer Expectations Document
Page 28
•
Encryption and Authentication
– SSL (Secure Sockets Layer) protects data
transferred over the network by encrypting file names and formats. The System
Administrator can also add IPSec capabilities to secure Internet Protocol (IP)
communications from lower layer protocols, such as TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol) by authenticating and
encrypting each IP packet of a data stream across the Internet.
Additionally, the imageRUNNER ADVANCE C7500 III Series supports IEEE
802.1X, which provides port-based authentication. Authentication involves
communications between a supplicant, authenticator, and authentication server.
The supplicant is authentication software on a client device. The client device
(the imageRUNNER ADVANCE C7500 III Series) needs the supplicant to
provide credentials, such as user names/passwords or digital certificates, to the
authenticator (a wireless access point). The authenticator then forwards the
credentials to the authentication server (generally a RADIUS database) for
verification. If the credentials are valid in the authentication server database,
the client device is allowed to access resources located on the protected side of
the network.
•
Network Port and Application Access Control
– Network Port and
Application Access Control enables system administrators to set up only the
necessary protocols, such as IPP, FTP, SNTP, SNMP, RAW, LPD, and others
for transferring data. These protocols can be switched ON and OFF. The
administrator can also disable unneeded services, protocols, ports, and the
potential paths of attack so that attacks on the machine can be minimized.