Technical information
Network Security White Paper ver. G.1.2
Page 5 of 72
1-5-6 Recommended Precautions .....................................................................16
1-6 HTTPS ................................................................................................................16
1-6-1 Function Overview ...................................................................................16
1-6-2 Theft of Username and Password............................................................16
1-6-3 Theft of Print Data ....................................................................................17
1-6-4 Recommended Precautions .....................................................................17
1-7 SNMP v1/v2 ........................................................................................................17
1-7-1 Function Overview ...................................................................................17
1-7-2 Potential Threats and Recommended Precautions ..................................18
1-7-3 Recommended Precautions .....................................................................18
1-8 SNMP v3.............................................................................................................19
1-8-1 Function Overview ...................................................................................19
1-8-2 Potential Threats and Recommended Precautions ..................................19
1-8-3 Recommended precaution .......................................................................20
1-9 SHELL (RSH/RCP) .............................................................................................20
1-9-1 Function Overview ...................................................................................20
1-9-2 Potential Threats and Recommended Precautions ..................................20
1-9-3 Recommended Precautions .....................................................................21
1-10 LPD.....................................................................................................................21
1-10-1 Function Overview ...................................................................................21
1-10-2 Potential Threats and Recommended Precautions ..................................21
1-10-3 Recommended Precaution.......................................................................22
1-11 IPP ......................................................................................................................22
1-11-1 Function Overview ...................................................................................22
1-11-2 Potential Threats and Recommended Precautions ..................................22
1-11-3 Recommended Precaution.......................................................................23
1-12 DIPRINT (RAW Print)..........................................................................................23
1-12-1 Function Overview ...................................................................................23
1-12-2 Potential Threats and Recommended Precautions ..................................23
1-12-3 Recommended Precautions.....................................................................24
1-13 SMB ....................................................................................................................24