Security Settings and Prevention of Danger
When a printer is connected to a network, you can access it from a remote location. In addition, many people can
share the printer, which is helpful in improving operational efficiency and convenience. However, risks such as
illegal access, illegal use, and tampering with data are increased. If you use the printer in an environment where
you can access the Internet, the risks are even higher.
For printers that do not have access protection from the outside, it will be possible to read the print job logs that
are stored in the printer from the Internet.
In order to avoid this risk, Epson printers have a variety of security technologies.
Set the printer as necessary according to the environmental conditions that have been built with the customer's
environment information.
Name
Feature type
What to set
What to prevent
Password encryption
Encrypts confidential
information stored in the
printer (all passwords, private
keys for the certificates, hard
disk authentication keys).
Configure the password
encryption and back up the
encryption key.
Because the encryption key is
not accessible from outside
the printer, encrypted
confidential information can
be protected.
SSL/TLS
communications
The communication content
is encrypted with SSL/TLS
communications when
accessing the Epson server
from the printer, such as
communicating to the
computer via web browser or
updating firmware.
Obtain a CA-signed
certificate, and then import it
to the printer.
Clearing an identification of
the printer by the CA-signed
certification prevents
impersonation and
unauthorized access. In
addition, communication
contents of SSL/TLS are
protected, and it prevents the
leakage of contents for
printing data and setup
information.
Control of protocol
Controls the protocols and
services to be used for
communication between
printers and computers, and
it enables and disables
features.
A protocol or service that is
applied to features allowed or
prohibited separately.
Reducing security risks that
may occur through
unintended use by
preventing users from using
unnecessary functions.
IPsec/IP filtering
You can set to allow severing
and cutting off of data that is
from a certain client or is a
particular type. Since IPsec
protects the data by IP packet
unit (encryption and
authentication), you can
safely communicate
unsecured protocol.
Create a basic policy and
individual policy to set the
client or type of data that can
access the printer.
Protect unauthorized access,
and tampering and
interception of
communication data to the
printer.
IEEE802.1X
Allows only a user who is
authenticated to Wi-Fi and
Ethernet to connect. Allows
only a permitted user to use
the printer.
Authentication setting to the
RADIUS server
(authentication sever).
Protect unauthorized access
and use to the printer.
Related Information
&
“Making Settings for Password Encryption” on page 78
Administrator's Guide
Advanced Security Settings for Enterprise
77