Name Feature type What to set What to prevent
SSL/TLS
communications
The communication content
is encrypted with SSL/TLS
communications when
accessing to the Epson server
on the Internet from the
scanner, such as
communicating to the
computer via web browser
and updating rmware.
Obtain a CA-signed
certicate,
and then import it
to the scanner.
Clearing an identication of
the scanner by the CA-signed
certication prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents the
leakage of contents for
scanning data and setup
information.
IPsec/IP ltering You can set to allow severing
and cutting
o
of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP packet
unit (encryption and
authentication), you can
safely communicate
unsecured protocol.
Create a basic policy and
individual policy to set the
client or type of data that can
access the scanner.
Protect unauthorized access,
and tampering and
interception of
communication data to the
scanner.
IEEE802.1X Only allows authenticated
users to connect to the
network. Allows only a
permitted user to use the
scanner.
Authentication setting to the
RADIUS server
(authentication sever).
Protect unauthorized access
and use to the scanner.
Related Information
& “Controlling Using Protocols” on page 221
& “Using a Digital
Certicate
” on page 224
& “SSL/TLS Communication with the Scanner” on page 229
& “Encrypted Communication Using IPsec/IP Filtering” on page 231
& “Connecting the Scanner to an IEEE802.1X Network” on page 241
Security Feature Settings
When setting IPsec/IP ltering or IEEE802.1X, it is recommended that you access Web Cong using SSL/TLS to
communicate settings information in order to reduce security risks such as tampering or interception.
Make sure you
congure
the administrator password before setting IPsec/IP
ltering
or IEEE802.1X.
Controlling Using Protocols
You can scan using a variety of pathways and protocols.
You can lower unintended security risks by restricting scanning from specic pathways or by controlling the
available functions.
Administrator Information
>
Advanced Security Settings
>
Controlling Using Protocols
221