12. Appendix
This chapter describes the machine specifications and consumables.
Transmission Using IPsec
For securer communications, this machine supports the IPsec protocol. When applied, IPsec encrypts
data packets at the network layer using shared key encryption. The machine uses encryption key
exchange to create a shared key for both sender and receiver. To achieve even higher security, you can
also renew the shared key on a validity period basis.
• IPsec is not applied to data obtained through DHCP or DNS.
• IPsec compatible operating systems are Windows 7 or later, Windows Server 2008 or later, OS X
10.9 or later, Red Hat Enterprise Linux 6 or later. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.
• When using the touch panel model
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec
under [Administrator Tools] on the control panel, and then access Web Image Monitor.
• When using the four-line LCD panel model
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec
under [Admin. Tools] on the control panel, and then access Web Image Monitor.
• For details about specifying the IPsec settings using Web Image Monitor, see page 358
"Configuring the IPsec Settings".
• When using the touch panel model
• For details about enabling and disabling IPsec using the control panel, see page 271
"Administrator Tools Settings (When Using the Touch Panel Model)".
• When using the four-line LCD panel model
• For details about enabling and disabling IPsec using the control panel, see page 310
"Administrator Tools Settings (When Using the Four-line LCD Panel Model)".
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data,
and the authentication function, which verifies the sender of the data and the data's integrity. This
machine's IPsec function supports two security protocols: the ESP protocol, which enables both of the
IPsec functions at the same time, and the AH protocol, which enables only the authentication function.
457