EasyManua.ls Logo

Epson DS-790WN

Epson DS-790WN
164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security Settings and Prevention of Danger
When a scanner is connected to a network, you can access it from a remote location. In addition, many people can
share the scanner, which is helpful in improving operational eciency and convenience. However, risks such as
illegal access, illegal use, and tampering with data are increased. If you use the scanner in an environment where
you can access the Internet, the risks are even higher.
For scanners that do not have access protection from the outside, it will be possible to read the contacts that are
stored in the scanner from the Internet.
In order to avoid this risk, Epson scanners have a variety of security technologies.
Set the scanner as necessary according to the environmental conditions that have been built with the customer's
environment information.
Name Feature type What to set What to prevent
Control of protocol Controls the protocols and
services to be used for
communication between
scanners and computers, and
it enables and disables
features.
A protocol or service that is
applied to features allowed or
prohibited separately.
Reducing security risks that
may occur through
unintended use by
preventing users from using
unnecessary functions.
SSL/TLS
communications
The communication content
is encrypted with SSL/TLS
communications when
accessing to the Epson server
on the Internet from the
scanner, such as
communicating to the
computer via web browser,
using Epson Connect, and
updating
rmware.
Obtain a CA-signed
certicate, and then import it
to the scanner.
Clearing an identication of
the scanner by the CA-signed
certication prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents the
leakage of contents for
scanning data and setup
information.
IPsec/IP ltering You can set to allow severing
and cutting o of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP packet
unit (encryption and
authentication), you can
safely communicate
unsecured protocol.
Create a basic policy and
individual policy to set the
client or type of data that can
access the scanner.
Protect unauthorized access,
and tampering and
interception of
communication data to the
scanner.
IEEE802.1X Only allows authenticated
users to connect to the
network. Allows only a
permitted user to use the
scanner.
Authentication setting to the
RADIUS server
(authentication sever).
Protect unauthorized access
and use to the scanner.
Related Information
& Controlling Using Protocols” on page 91
& “SSL/TLS Communication with the Scanner” on page 99
& Encrypted Communication Using IPsec/IP Filtering” on page 101
& “Connecting the Scanner to an IEEE802.1X Network” on page 111
Advanced Security Settings
>
Security Settings and Prevention of Danger
90

Table of Contents

Other manuals for Epson DS-790WN

Related product manuals