Canon imageRUNNER ADVANCE C7500 II Series Customer Expectation Document page 27

Table of Contents

Advertisement

• Encryption and Authentication – SSL (Secure Sockets Layer) protects data
transferred over the network by encrypting file names and formats. The System
Administrator can also add IPSec capabilities to secure Internet Protocol (IP)
communications from lower layer protocols, such as TCP (Transmission
Control Protocol) and UDP (User Datagram Protocol) by authenticating and
encrypting each IP packet of a data stream across the Internet.
Additionally, the imageRUNNER ADVANCE C7500 and C7500 II Series
support IEEE 802.1X, which provides port-based authentication. Authentication
involves
communications
authentication server. The supplicant is authentication software on a client
device. The client device (the imageRUNNER ADVANCE C7500 and C7500 II
Series) needs the supplicant to provide credentials, such
names/passwords or digital certificates, to the authenticator (a wireless access
point). The authenticator then forwards the credentials to the authentication
server (generally a RADIUS database) for verification. If the credentials are
valid in the authentication server database, the client device is allowed to
access resources located on the protected side of the network.
• Network Port and Application Access Control – Network Port and
Application Access Control enables system administrators to set up only the
necessary protocols, such as IPP, FTP, SNTP, SNMP, RAW, LPD, and others
for transferring data. These protocols can be switched ON and OFF. The
administrator can also disable unneeded services, protocols, ports, and the
potential paths of attack so that attacks on the machine can be minimized.
Version 8
imageRUNNER ADVANCE C7500 and C7500 II Series Customer Expectations Document
imageRUNNER ADVANCE C7500 and C7500 II Series Customer Expectations Document
between
a
supplicant,
authenticator,
and
as user
Page 27

Advertisement

Table of Contents
loading

Table of Contents