Security Settings; Security Settings And Prevention Of Danger - Epson FX-890IIN Network Manual

Hide thumbs Also See for FX-890IIN:
Table of Contents

Advertisement

FX-890IIN/FX-2190IIN/FX-2175IIN Network Guide

Security Settings

This chapter explains the security settings.

Security Settings and Prevention of Danger

When a device is connected to a network, you can access it from a remote location. In addition, many people can share
the device, which is helpful in improving operational efficiency and convenience. However, risks such as illegal access,
illegal use, and tampering with data are increased.
In order to avoid this risk, Epson printers have a variety of security technologies. Set the device as necessary according
to the environmental conditions that have been built with the customer's environment information.
Feature name
Setup for the administrator
password
Protocol and control of
service
SSL/TLC communications
IPsec/IP filtering
Security Settings
Feature type
Locks the system settings,
such as connection setup for
network or USB.
Controls the protocols and
services to be used for
communication between
devices and computers, and
it enables and disables
feature such as print.
The communication path of
a computer and a printer is
encrypted using SSL/TLS
communication. The
content of the
communication is protected
by printer settings and by
IPPS protocol printings via a
browser.
You can set to allow severing
and cutting off of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP
packet unit (encryption and
authentication), you can
safely communicate
unsecured printing protocol
and scanning protocol.
What to set
An administrator sets a
password to the device.
Configuration or update are
available anywhere from
Web Config and Epson
Device Admin.
A protocol or service that is
applied to features allowed
or prohibited separately.
Obtain a CA-signed
certificate, and then import it
to the printer.
Create a basic policy and
individual policy to set the
client or type of data that can
access the device.
28
What to prevent
Prevent from illegally
reading and changing the
formation stored in the
device such as ID, password,
network settings, and
contacts. Also, reduce a wide
range of security risks such as
leakage of information for
the network environment or
security policy.
Reducing security risks that
may occur through
unintended use by
preventing users from using
unnecessary functions.
Clearing an identification of
the device by the CA-signed
certification prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents
the leakage of contents for
printing data and setup
information.
Protect unauthorized access,
and tampering and
interception of
communication data to the
device.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fx-2175iinFx-2190iin

Table of Contents