Name Feature type What to set What to prevent
SSL/TLS
communications
The communication content
is encrypted with SSL/TLS
communications when
accessing to the Epson server
on the Internet from the
scanner, such as
communicating to the
computer via web browser,
using Epson Connect, and
updating rmware.
Obtain a CA-signed
certicate, and then import it
to the scanner.
Clearing an identication of
the scanner by the CA-signed
certication prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents the
leakage of contents for
scanning data and setup
information.
IPsec/IP ltering You can set to allow severing
and cutting o of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP packet
unit (encryption and
authentication), you can
safely communicate
unsecured protocol.
Create a basic policy and
individual policy to set the
client or type of data that can
access the scanner.
Protect unauthorized access,
and tampering and
interception of
communication data to the
scanner.
IEEE802.1X Only allows authenticated
users to connect to the
network. Allows only a
permitted user to use the
scanner.
Authentication setting to the
RADIUS server
(authentication sever).
Protect unauthorized access
and use to the scanner.
Security Feature Settings
When setting IPsec/IP ltering or IEEE802.1X, it is recommended that you access Web Cong using SSL/TLS to
communicate settings information in order to reduce security risks such as tampering or interception.
Make sure you congure the administrator password before setting IPsec/IP ltering or IEEE802.1X.
Controlling Using Protocols
You can scan using a variety of pathways and protocols. Also, you can use network scanning from an unspecied
number of network computers.
You can lower unintended security risks by restricting scanning from specic pathways or by controlling the
available functions.
Controlling protocols
Congure the protocol settings supported by the scanner.
1. Access Web Cong and then select the Network Security tab > Protocol.
2. Congure each item.
3. Click Next.
Administrator Information
>
Advanced Security Settings
>
Controlling Using Protocols
250