Controlling Using Protocols - Epson ES-C320W User Manual

Hide thumbs Also See for ES-C320W:
Table of Contents

Advertisement

Administrator Information
Name
SSL/TLS
communications
IPsec/IP filtering
IEEE802.1X
Security Feature Settings
When setting IPsec/IP filtering or IEEE802.1X, it is recommended that you access Web Config using SSL/TLS to
communicate settings information in order to reduce security risks such as tampering or interception.
Make sure you configure the administrator password before setting IPsec/IP filtering or IEEE802.1X.

Controlling Using Protocols

You can scan using a variety of pathways and protocols. Also, you can use network scanning from an unspecified
number of network computers.
You can lower unintended security risks by restricting scanning from specific pathways or by controlling the
available functions.
Controlling protocols
Configure the protocol settings supported by the scanner.
1. Access Web Config and then select the Network Security tab > Protocol.
2. Configure each item.
3. Click Next.
>
Advanced Security Settings
Feature type
The communication content
is encrypted with SSL/TLS
communications when
accessing to the Epson server
on the Internet from the
scanner, such as
communicating to the
computer via web browser
and updating firmware.
You can set to allow severing
and cutting off of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP packet
unit (encryption and
authentication), you can
safely communicate
unsecured protocol.
Only allows authenticated
users to connect to the
network. Allows only a
permitted user to use the
scanner.
>
Controlling Using Protocols
What to set
Obtain a CA-signed
certificate, and then import it
to the scanner.
Create a basic policy and
individual policy to set the
client or type of data that can
access the scanner.
Authentication setting to the
RADIUS server
(authentication sever).
178
What to prevent
Clearing an identification of
the scanner by the CA-signed
certification prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents the
leakage of contents for
scanning data and setup
information.
Protect unauthorized access,
and tampering and
interception of
communication data to the
scanner.
Protect unauthorized access
and use to the scanner.

Advertisement

Table of Contents
loading

Table of Contents