When a printer is connected to a network, you can access it from a remote location. In addition, many people can share the printer, which is helpful in improving operational efficiency and convenience. However, risks such as illegal access, illegal use, and tampering with data are increased. If you use the printer in an environment where you can access the Internet, the risks are even higher.
For printers that do not have external access protection, it is possible to read the contacts list that is stored in the printer from the Internet.
In order to avoid this risk, Epson printers have a variety of security technologies.
Set the printer as necessary according to the environmental conditions that have been built with the customer's environment information.
Name |
Feature type |
What to set |
What to prevent |
---|---|---|---|
Password encryption |
Encrypts confidential information stored in the printer (all passwords, private keys for the certificates, hard disk authentication keys). |
Configure the password encryption and back up the encryption key. |
Because the encryption key is not accessible from outside the printer, encrypted confidential information can be protected. |
Control of protocol |
Controls the protocols and services to be used for communication between printers and computers, and it enables and disables features. |
A protocol or service that is applied to features allowed or prohibited separately. |
Reducing security risks that may occur through unintended use by preventing users from using unnecessary functions. |
SSL/TLS communications |
The communication content is encrypted with SSL/TLS communications when accessing to the Epson server on the Internet from the printer, such as communicating to the computer via web browser, using Epson Connect, and updating firmware. |
Obtain a CA-signed certificate, and then import it to the printer. |
Clearing an identification of the printer by the CA-signed certification prevents impersonation and unauthorized access. In addition, communication contents of SSL/TLS are protected, and it prevents the leakage of contents for printing data and setup information. |
IPsec/IP filtering |
You can set to allow severing and cutting off of data that is from a certain client or is a particular type. Since IPsec protects the data by IP packet unit (encryption and authentication), you can safely communicate unsecured protocol. |
Create a basic policy and individual policy to set the client or type of data that can access the printer. |
Protect unauthorized access, and tampering and interception of communication data to the printer. |
IEEE802.1X |
Only allows authenticated users to connect to the network. Allows only a permitted user to use the printer. |
Authentication setting to the RADIUS server (authentication sever). |
Protect unauthorized access and use to the printer. |
S/MIME |
Encrypts emails sent from the printer or attaches digital signatures to the emails. This feature is available for Scan to Email, Box to Email, and Fax to Email. |
Import a CA-signed certificate, update a self-signed certificate, and configure a digital certificate for the mail destination. Also, make the S/MIME basic settings. |
Encryption prevents information from leaking when third parties attempt to view the content of the email. Also, detect sender impersonation and email tampering by attaching a digital signature to the email. |
Domain Restrictions |
Restricts emails sent from the printer. |
Select how to restrict email transmissions. |
By applying restriction rules to domain names, you can reduce the risk of information leaks due to accidental transmissions. |