When a scanner is connected to a network, you can access it from a remote location. In addition, many people can share the scanner, which is helpful in improving operational efficiency and convenience. However, risks such as illegal access, illegal use, and tampering with data are increased. If you use the scanner in an environment where you can access the Internet, the risks are even higher.
For scanners that do not have access protection from the outside, it will be possible to read the contacts that are stored in the scanner from the Internet.
In order to avoid this risk, Epson scanners have a variety of security technologies.
Set the scanner as necessary according to the environmental conditions that have been built with the customer's environment information.
Name |
Feature type |
What to set |
What to prevent |
---|---|---|---|
Control of protocol |
Controls the protocols and services to be used for communication between scanners and computers, and it enables and disables features. |
A protocol or service that is applied to features allowed or prohibited separately. |
Reducing security risks that may occur through unintended use by preventing users from using unnecessary functions. |
SSL/TLS communications |
The communication content is encrypted with SSL/TLS communications when accessing to the Epson server on the Internet from the scanner, such as communicating to the computer via web browser, using Epson Connect, and updating firmware. |
Obtain a CA-signed certificate, and then import it to the scanner. |
Clearing an identification of the scanner by the CA-signed certification prevents impersonation and unauthorized access. In addition, communication contents of SSL/TLS are protected, and it prevents the leakage of contents for scanning data and setup information. |
IPsec/IP filtering |
You can set to allow severing and cutting off of data that is from a certain client or is a particular type. Since IPsec protects the data by IP packet unit (encryption and authentication), you can safely communicate unsecured protocol. |
Create a basic policy and individual policy to set the client or type of data that can access the scanner. |
Protect unauthorized access, and tampering and interception of communication data to the scanner. |
IEEE802.1X |
Only allows authenticated users to connect to the network. Allows only a permitted user to use the scanner. |
Authentication setting to the RADIUS server (authentication sever). |
Protect unauthorized access and use to the scanner. |