Transmission Using Ipsec; Encryption And Authentication By Ipsec - Ricoh Printer Quick Installation Manual

Printer
Hide thumbs Also See for Printer:
Table of Contents

Advertisement

8. Security Measures Provided by this Printer

Transmission Using IPsec

This can be specified by the administrator.
For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP
protocol level using the shared key encryption method, where both the sender and receiver retain the same
key. This machine has two methods that you can use to specify the shared encryption key for both parties:
encryption key auto exchange and encryption key manual settings. Using the auto exchange setting, you
can renew the shared key exchange settings within a specified validity period, and achieve higher
transmission security.
• When "Inactive" is specified for "Exclude HTTPS Transmission", access to Web Image Monitor can
be lost if the key settings are improperly configured. In order to prevent this, you can specify IPsec to
exclude HTTPS transmission by selecting "Active". When you want to include HTTPS transmission, we
recommend that you select "Inactive" for "Exclude HTTPS Transmission" after confirming that IPsec is
properly configured. When "Active" is selected for "Exclude HTTPS Transmission", even though
HTTPS transmission is not targeted by IPsec, Web Image Monitor might become unusable when TCP
is targeted by IPsec from the computer side. If you cannot access Web Image Monitor due to IPsec
configuration problems, disable IPsec on the control panel, and then access Web Image Monitor.
For details about disabling IPsec using the control panel, see "Deactivating IPsec Using the Control
Panel".
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
8
• IPsec compatible operating systems are Windows XP SP2, Windows Vista, Mac OSX 10.4 and later,
RedHat Linux Enterprise WS 4.0, and Solaris 10. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.
• p.372 " Deactivating IPsec Using the Control Panel"

Encryption and Authentication by IPsec

IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data, and
the authentication function, which verifies the sender of the data and the data's integrity. This machine's
IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec functions
at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
Performs secure transmission through both encryption and authentication.
350

Advertisement

Table of Contents
loading

Table of Contents