Technical information

Network Security White Paper ver. G.1.2
Page 17 of 72
1-6-3 Theft of Print Data
Interception of network packets: Using HTTPS, all data sent over the connection is encrypted. Therefore,
even if data is intercepted, it will be extremely difficult to use.
1-6-4 Recommended Precautions
The following are suggested precautions against threats to the HTTPS service.
Scenario 1: Basic security settings
Change the user names and passwords from the default value to something difficult to guess and
change them regularly.
Scenario2: High security settings
Disable the web service.
If it is not needed, Web Image Monitor can be disabled using the mshell. When web is set to ‘Down’,
Web Image Monitor does not activate and the error “503 Service Unavailable” is displayed. Even when
not in use, TCP port 443 stays open and is therefore HTTPS is available for IPP printing.
1-7 SNMP v1/v2
1-7-1 Function Overview
The SNMP service is embedded in the products, to provide a method of managing them on the network.
This service is compliant with RFC 1157 for SNMP v1 and RFC 1902 for SNMP v2. UDP port 161 is
used for the SNMP service and UDP port 162 is used for SNMP-traps.
The following functions use SNMP:
Configuring the settings of the products.
Monitoring the status of the products.
Detecting errors affecting the products.
Communicating with the client PC for Scanning using the TWAIN driver.
Although the SNMP service is not protected by a password, it is protected using unique community
names and assigned access rights (read-only, read-write and trap) within those communities. Access
rights allow users to read or modify data in the MIB embedded in the products.
Default settings of SNMP community names are follows:
Read-only: public
Read-Write: admin