ManualsContentsPreviousNext |
This can be specified by the administrator.
For communication security, this machine supports IPsec. IPsec transmits secure data packets at the IP protocol level using the shared key encryption method, where both the sender and receiver retain the same key. This machine has two methods that you can use to specify the shared encryption key for both parties: encryption key auto exchange and encryption key manual settings. Using the auto exchange setting, you can renew the shared key exchange settings within a specified validity period, and achieve higher transmission security.
When "Inactive" is specified for "Exclude HTTPS Transmission", access to Web Image Monitor can be lost if the key settings are improperly configured. In order to prevent this, you can specify IPsec to exclude HTTPS transmission by selecting "Active". When you want to include HTTPS transmission, we recommend that you select "Inactive" for "Exclude HTTPS Transmission" after confirming that IPsec is properly configured. When "Active" is selected for "Exclude HTTPS Transmission", even though HTTPS transmission is not targeted by IPsec, Web Image Monitor might become unusable when TCP is targeted by IPsec from the computer side. If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec on the control panel, and then access Web Image Monitor. For details about disabling IPsec using the control panel, see "Deactivating IPsec Using the Control Panel".
IPsec is not applied to data obtained through DHCP, DNS, or WINS.
IPsec compatible operating systems are Windows XP SP2, Windows Vista, Mac OSX 10.4 and later, RedHat Linux Enterprise WS 4.0, and Solaris 10. However, some setting items are not supported depending on the operating system. Make sure the IPsec settings you specify are consistent with the operating system's IPsec settings.
Related topics
Encryption and Authentication by IPsec