Fuji Xerox C2265 Manual page 128

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Fuji Xerox C2265/C2263
session and lost at the time of ending the session or powering off the MFD main unit.
Cryptographic key generated as TLSv1.0/TLSv1.1/TLSv1.2 upon every session
Specifically, one of the cryptographic suites below is adopted:
Cryptographic Suites of SSL/TLS
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
Protection from the alteration is realized by HMAC (Hashed Message Authentication Code -
IETF RFC 2104) of SSL/TLS.
When SSL/TLS communication is enabled on the Web client, requests from the client must
be received via HTTPS. The SSL/TLS communication needs to be enabled before IPSec, or
S/MIME is enabled or before security audit log data are downloaded by a system
administrator.
b)
IPSec
According to the IPSec communication which is configured by a system administrator using
the system administrator mode, IPSec ensuring secure data transmission is supported. This
protects the security of document data, security audit log data, and the TOE setting data on
the internal network.
IPSec establishes the security association to determine the parameters (e.g. private key and
cryptographic algorithm) to be used in the IPSec communication between the TOE and the
remote. After the association is established, all transmission data among the specified IP
addresses are encrypted by the transport mode of IPSec until the TOE is powered off or reset.
A cryptographic key is generated at the time of starting a session and lost at the time of
ending the session or powering off the MFD main unit.
Cryptographic key generated as IPSec (ESP: Encapsulating Security Payload) at every
session
Specifically, one of the following combinations between secret-key cryptographic method
and hash method is adopted:
Cryptographic Method and Size
of Secret Key
AES / 128 bits
3-Key Triple-DES /168 bits
Security Target
Cryptographic Method and
Size of Secret Key
AES/128 bits
AES/256 bits
AES/128 bits
AES/256 bits
Hash Method
SHA-1
SHA-1
- 123 -
Copyright
Hash
Method
SHA1
SHA1
SHA256
SHA256
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents