
12. Appendix
This chapter describes the machine specifications and consumables.
Transmission Using IPsec
For securer communications, this machine supports the IPsec protocol. When applied, IPsec encrypts
data packets at the network layer using shared key encryption. The machine uses encryption key
exchange to create a shared key for both sender and receiver. To achieve even higher security, you can
also renew the shared key on a validity period basis.
• IPsec is not applied to data obtained through DHCP or DNS.
• IPsec compatible operating systems are Windows 7 or later, Windows Server 2008 or later, OS X
10.9 or later, Red Hat Enterprise Linux 6 or later. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec under
[Administrator Tools] on the control panel, and then access Web Image Monitor.
• For details about specifying the IPsec settings using Web Image Monitor, see page 305
"Configuring the IPsec Settings".
• For details about enabling and disabling IPsec using the control panel, see page 255
"Administrator Tools Settings".
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data,
and the authentication function, which verifies the sender of the data and the data's integrity. This
machine's IPsec function supports two security protocols: the ESP protocol, which enables both of the
IPsec functions at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. The encryption algorithm and encryption key are specified
automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. The authentication algorithm and authentication key are
specified automatically.
401
Содержание SP C260SFNw
Страница 2: ......
Страница 14: ...5 Click the manual you want to refer to The PDF file manual opens 12...
Страница 23: ...DUE207 2 1 3 Interior 1 2 3 4 5 DUE212 Guide to Components 21...
Страница 46: ...Deleting characters 1 Press or C to delete characters 1 Guide to the Machine 44...
Страница 126: ...4 Copying Originals 124...
Страница 176: ...5 Scanning Originals 174...
Страница 294: ...9 Close the Web browser 8 Configuring the Machine Using Utilities 292...
Страница 340: ...5 Clean the parts indicated below DUE322 6 Close the ADF cover 9 Maintaining the Machine 338...
Страница 354: ...Main unit DUE292 1 3 2 1 DUE288 2 DUE289 10 Troubleshooting 352...
Страница 355: ...3 DUE290 Paper feed unit DUE320 1 1 DUE291 Removing Paper Jams 353...
Страница 363: ...DUE253 5 Close the ADF Removing Paper Jams 361...
Страница 397: ...26 Turn off the machine and then turn it back on Setup is completed Connecting the Machine to a Wired Network 395...
Страница 419: ...Weight Less than 4 kg 8 9 lb Specifications of the Machine 417...
Страница 436: ...12 Appendix 434...
Страница 441: ...MEMO 439...
Страница 442: ...MEMO 440 EN GB EN US EN AU M0AX 8604C...
Страница 443: ...2017 2020...
Страница 444: ...M0AX 8604C AU EN US EN GB EN...