EasyManuals Logo

Ricoh MP 2014 Series User Manual

Ricoh MP 2014 Series
252 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #224 background imageLoading...
Page #224 background image
Transmission Using IPsec
For securer communications, this machine supports the IPsec protocol. When applied, IPsec encrypts
data packets at the network layer using shared key encryption. The machine uses encryption key
exchange to create a shared key for both sender and receiver. To achieve even higher security, you can
also renew the shared key on a validity period basis.
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
• IPsec compatible operating systems are Windows Vista/7, Windows Server 2003/2003
R2/2008/2008 R2, Red Hat Enterprise Linux WS 4.0, and Solaris 10. However, some setting
items are not supported depending on the operating system. Make sure the IPsec settings you
specify are consistent with the operating system's IPsec settings.
• If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec under
[Admin. Tools] on the control panel, and then access Web Image Monitor.
• For details about specifying the IPsec settings using Web Image Monitor, see page 159
"Configuring the Machine Using Web Image Monitor".
• For details about disabling IPsec using the control panel, see page 151 "Administrator Settings".
Encryption and Authentication by IPsec
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data,
and the authentication function, which verifies the sender of the data and the data's integrity. This
machine's IPsec function supports two security protocols: the ESP protocol, which enables both of the
IPsec functions at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. The encryption algorithm and encryption key are specified
automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. The authentication algorithm and authentication key are
specified automatically.
AH Protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
11. Appendix
222

Table of Contents

Other manuals for Ricoh MP 2014 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Ricoh MP 2014 Series and is the answer not in the manual?

Ricoh MP 2014 Series Specifications

General IconGeneral
FunctionsPrint, Copy, Scan
Print TechnologyLaser
Print Speed20 ppm
Print Resolution600 x 600 dpi
Copy Speed20 cpm
Copy Resolution600 x 600 dpi
Scan Resolution600 x 600 dpi
Supported Paper SizesA3, A4, A5, B4, B5
Multiple CopyUp to 99 copies
Duplex PrintingManual
InterfaceUSB 2.0
Dimensions587 x 581 x 461 mm
TypeAll in One Printer
Standard Paper Capacity250 sheets
Operating System CompatibilityWindows, Mac
First Print Out TimeLess than 10 seconds

Related product manuals