User GuideM 2700/2701

Transmission Using IPsec

For securer communications, this machine supports the IPsec protocol. When applied, IPsec encrypts data packets at the network layer using shared key encryption. The machine uses encryption key exchange to create a shared key for both sender and receiver. To achieve even higher security, you can also renew the shared key on a validity period basis.

Important

  • IPsec is not applied to data obtained through DHCP or DNS.

  • IPsec compatible operating systems are Windows 7 or later, Windows Server 2008 or later, Red Hat Enterprise Linux 6 or later. However, some setting items are not supported depending on the operating system. Make sure the IPsec settings you specify are consistent with the operating system's IPsec settings.

  • If you cannot access Web Image Monitor due to IPsec configuration problems, disable IPsec under [Admin. Tools] on the control panel, and then access Web Image Monitor.

  • For details about enabling and disabling IPsec using the control panel, see Administrator Tools Settings.