Configuring IPsec
For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP
protocol level using the shared key encryption method, where both the sender and receiver retain the
same key. This machine has two methods that you can use to specify the shared encryption key for both
parties: encryption key auto exchange and encryption key manual settings. Using the auto exchange
setting, you can renew the shared key exchange settings within a specified validity period, and achieve
higher transmission security.
• When "Inactive" is specified for "Exclude HTTPS Communication", access to Web Image Monitor
can be lost if the key settings are improperly configured. In order to prevent this, you can specify
IPsec to exclude HTTPS transmission by selecting "Active". When you want to include HTTPS
transmission, we recommend that you select "Inactive" for "Exclude HTTPS Communication" after
confirming that IPsec is properly configured. When "Active" is selected for "Exclude HTTPS
Communication", even though HTTPS transmission is not targeted by IPsec, Web Image Monitor
might become unusable when TCP is targeted by IPsec from the computer side. If you cannot
access Web Image Monitor due to IPsec configuration problems, disable IPsec in System Settings
on the control panel, and then access Web Image Monitor. For details about enabling and
disabling IPsec using the control panel, see "System Settings", Connecting the Machine/ System
Settings.
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
• IPsec for IPv4 is supported by Windows XP SP2 and Windows Server 2003/2003 R2. IPsec for
both IPv4 and IPv6 is supported by Windows Vista/7, Windows Server 2008/2008 R2, Mac OS
X 10.4.8 and later, Red Hat Enterprise Linux WS 4.0 and Solaris 10. However, some setting items
are not supported depending on the operating system. Make sure the IPsec settings you specify are
consistent with the operating system's IPsec settings.
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data,
and the authentication function, which verifies the sender of the data and the data's integrity. This
machine's IPsec function supports two security protocols: the ESP protocol, which enables both of the
IPsec functions at the same time, and the AH protocol, which enables only the authentication function.
ESP protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
Configuring IPsec
149
Содержание Aficio MP C3002
Страница 7: ...6 ...
Страница 15: ...1 Manuals Provided with This Machine 14 ...
Страница 39: ...2 Safety Information 38 ...
Страница 51: ...3 Information for This Machine 50 ...
Страница 54: ...Cover Paper Thickness 0 10 Body Paper Thickness 0 08 Pages in Book 0 Spine Width 0 2011 ...
Страница 60: ......
Страница 65: ...INDEX 235 5 ...
Страница 86: ...1 What You Can Do with This Machine 26 ...
Страница 126: ...2 Getting Started 66 ...
Страница 128: ...7 When the copy job is finished press the Reset key to clear the settings 3 Copy 68 ...
Страница 197: ...Storing the Scanned Documents to a USB Flash Memory or SC Card 6 126D ...
Страница 201: ...7 Document Server 130 ...
Страница 205: ...8 Web Image Monitor 134 ...
Страница 235: ...9 Adding Paper and Toner 164 ...
Страница 303: ...10 Troubleshooting 232 ...
Страница 309: ...MEMO 238 ...
Страница 310: ...MEMO 239 ...
Страница 311: ...MEMO 240 EN GB EN US EN AU D143 ...
Страница 312: ... 2011 ...
Страница 313: ...GB EN D143 7003 US EN AU EN ...
Страница 320: ......
Страница 360: ...3 Installing the Scanner Driver 40 ...
Страница 372: ...5 Troubleshooting 52 ...
Страница 378: ...6 Installing the Printer Driver Under Mac OS X 58 ...
Страница 382: ...3 Quit uninstaller 7 Appendix 62 ...
Страница 386: ...MEMO 66 ...
Страница 387: ...MEMO 67 ...
Страница 388: ...MEMO 68 EN GB EN US EN AU D143 7038 ...
Страница 389: ......
Страница 390: ...EN GB EN US EN AU D143 7038 2011 ...
Страница 392: ......
Страница 398: ...6 ...
Страница 440: ...MEMO 48 EN GB EN US EN AU D143 7042 ...
Страница 441: ......
Страница 442: ...EN GB EN US EN AU D143 7042 2011 ...
Страница 444: ......
Страница 454: ...10 ...
Страница 472: ...1 Getting Started 28 ...
Страница 540: ...3 Restricting Machine Usage 96 ...
Страница 560: ...4 Preventing Leakage of Information from Machines 116 ...
Страница 644: ...8 Set the stamp position 9 Press OK twice 10 Log out 6 Preventing the Leaking of Documents 200 ...
Страница 717: ...7 Press Yes 8 Log out Limiting Machine Operations to Customers Only 273 ...
Страница 724: ...7 Managing the Machine 280 ...
Страница 800: ...Settings User Mach N W File Lv 1 Lv 2 Send File Type R W R R 9 Checking Operation Privileges 356 ...
Страница 829: ......
Страница 830: ...EN GB EN US EN AU D143 7040 2011 ...