12.5 Encrypting Communication
(IPSec)
You can encrypt the communication between the device
and the computer.
The communication is encrypted with IPSec. When IPSec
is enabled, all application use IPSec for encryption.
50 hosts can be speciied with an IP address. Access to
the device from unregistered hosts is refused. Access to
unregistered hosts is also disabled. Conigure the computer
after coniguring the device.
Coniguring the device
Proceed as follows:
•
Open the Web Page of this device (see
•
Log in as the administrator (see
•
Select “Admin Setup”.
•
Select “Network” > “Security” > “SSL/TLS”.
•
Follow the on-screen instructions to configure the de-
tailed settings.
•
Click SUBMIT.
The new setting is enabled after the network function of the
device is restarted.
If IPSec cannot be set up because the specified parameter
is incorrect, the Web Page cannot be accessed. In this case,
disable IPSEC from the operation panel of the device or
initalize the network settings.
Coniguring the computer: creating an IP Security Policy
Proceed as follows:
•
Click START and select “Control Panel” > “System and
Security” > “Administrative Tools”.
•
Double-click LOYAL SECURITY POLICY.
•
Click IP SECURITY POLICIES ON LOCAL COMPUTER
in the “Local Security Policy” window.
•
Select “Create IP Security Policy” in the “Action” menu.
•
Click NEXT in “IP Security Policy Wizard”.
•
Enter “Name” and “Description” and click NEXT.
•
Deselect “Activate the default response rule” and click
NEXT.
•
Select “Edit Properties” and click COMPLETE.
Coniguring the computer: setting Key Exchange
Proceed as follows:
•
Select the “General” tab in the IP security policy proper-
ties window.
•
Click SETUP.
•
Enter a value in minutes in “Authenticate and generate
a new key after every” in the “Key Exchange Settings”
window.
•
Click METHODS.
•
Click ADD in the “Key Exchange Security Methods”
window.
•
Specify “Integrity Algorithm”, “Encryption Algorithm” and
“Difie-Hellman group”.
•
Click OK.
•
Click OK in the “Key Exchange Security Methods”
window.
•
Click OK in the “Key Exchange Settings” window.
Coniguring the computer: setting the IP Filter
Proceed as follows:
•
Select the “Rules” tab in the IP security policy proper-
ties window.
•
Click ADD.
•
Click NEXT in “Security Rules Wizard”.
•
On the “Tunnel Endpoint” screen, select “This rule does
not specify a tunnel” and click NEXT.
•
On the “Network Type” screen, select “All Network
Connections” and click NEXT.
192
Содержание TK306
Страница 1: ...USER MANUAL TK306...
Страница 2: ......
Страница 10: ...10...
Страница 12: ...12...
Страница 14: ...14...
Страница 17: ...3 3 Device components connectors view 1 Ethernet LAN 2 Host devices 3 USB 1 2 3 17...
Страница 28: ...28...
Страница 33: ...Insert the A end of the USB cable into the USB interface connector of the computer 4 33...
Страница 38: ...5 2 Opening device cover Lift the opening lever in the direction shown in figure Open the top cover 1 2 38...
Страница 40: ...Remove the cover toner Close the top cover 3 4 40...
Страница 42: ...Close the cover for the toner cartridge compartment 8 42...
Страница 50: ...Repeat the operation for the bottom sensor Close the feeder cover 6 5 50...
Страница 114: ...114...
Страница 118: ...The Storage Manager Plug in registers and edits the iles to download to the device TK306 TK306 118...
Страница 126: ...126...
Страница 147: ...Return the image drum unit to its original position in the machine Close the top cover 5 6 147...
Страница 151: ...Return the image drum unit to its original position in the machine Close the top cover 7 8 151...
Страница 153: ...Gently pull out the jammed paper Close the feeder cover until it clicks 3 4 153...
Страница 162: ...162...
Страница 184: ...184...
Страница 198: ...198...
Страница 210: ...210...
Страница 211: ...15 ACCESSORIES The following table shows the list of available accessories for device 976MG010000001 PRESENTER 211...
Страница 212: ...212...
Страница 214: ...214...
Страница 215: ......