Security Settings And Prevention Of Danger - Epson DS-790WN Administrator's Manual

Hide thumbs Also See for DS-790WN:
Table of Contents

Advertisement

Advanced Security Settings

Security Settings and Prevention of Danger

When a scanner is connected to a network, you can access it from a remote location. In addition, many people can
share the scanner, which is helpful in improving operational efficiency and convenience. However, risks such as
illegal access, illegal use, and tampering with data are increased. If you use the scanner in an environment where
you can access the Internet, the risks are even higher.
For scanners that do not have access protection from the outside, it will be possible to read the contacts that are
stored in the scanner from the Internet.
In order to avoid this risk, Epson scanners have a variety of security technologies.
Set the scanner as necessary according to the environmental conditions that have been built with the customer's
environment information.
Name
Control of protocol
SSL/TLS
communications
IPsec/IP filtering
IEEE802.1X
Related Information
"Controlling Using Protocols" on page 91
&
"SSL/TLS Communication with the Scanner" on page 99
&
"Encrypted Communication Using IPsec/IP Filtering" on page 101
&
"Connecting the Scanner to an IEEE802.1X Network" on page 111
&
>

Security Settings and Prevention of Danger

Feature type
Controls the protocols and
services to be used for
communication between
scanners and computers, and
it enables and disables
features.
The communication content
is encrypted with SSL/TLS
communications when
accessing to the Epson server
on the Internet from the
scanner, such as
communicating to the
computer via web browser,
using Epson Connect, and
updating firmware.
You can set to allow severing
and cutting off of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP packet
unit (encryption and
authentication), you can
safely communicate
unsecured protocol.
Only allows authenticated
users to connect to the
network. Allows only a
permitted user to use the
scanner.
What to set
A protocol or service that is
applied to features allowed or
prohibited separately.
Obtain a CA-signed
certificate, and then import it
to the scanner.
Create a basic policy and
individual policy to set the
client or type of data that can
access the scanner.
Authentication setting to the
RADIUS server
(authentication sever).
90
What to prevent
Reducing security risks that
may occur through
unintended use by
preventing users from using
unnecessary functions.
Clearing an identification of
the scanner by the CA-signed
certification prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents the
leakage of contents for
scanning data and setup
information.
Protect unauthorized access,
and tampering and
interception of
communication data to the
scanner.
Protect unauthorized access
and use to the scanner.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents