Handleiding
Je bekijkt pagina 102 van 133

Security Settings
98 Embedded Web Server
that you want to use from TLS1.0, TLS1.1, TLS1.2 and TLS1.3. You can use more
than one algorithm at a time.
2. Effective Encryption: Select an algorithm that you want to use from ARCFOUR,
DES, 3DES, AES, AES-GCM and CHACHA20/POLY1305. You can use more
than one algorithm at a time.
3. Hash: Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use
more than one algorithm at a time.
4. HTTP Security: Specifies the security level for HTTP.
Secure Only (HTTPS): Encrypts all HTTP protocol communications. Only the
URLs that begin with https://. are accessible. If a URL beginning with http:// is
specified, it will be automatically redirected to "https://."
Not Secure (HTTPS & HTTP): Enables access for both encrypted and unen-
crypted HTTP protocol communication. URLs beginning with either “https://” or
“http://” are accessible. The former URL establishes encrypted communication and
the latter establishes unencrypted communication.
5. IPP Security: Specifies the security level for IPP.
Secure Only (IPPS): Encrypts all HTTP protocol communications.
Not Secure (IPPS & IPP): Enables access for both encrypted and unencrypted
IPP protocol communications.
6. Enhanced WSD Security: Specifies the security level for Enhanced WSD.
Secure Only (Enhanced WSD over TLS): Encrypts all Enhanced WSD over TLS
protocol communications.
Not Secure (Enhanced WSD over TLS & Enhanced WSD): Enables access for
both Enhanced WSD over TLS and Enhanced WSD protocol communications.
7. eSCL Security: Specifies the security level for eSCL.
Secure Only (eSCL over TLS): Encrypts all eSCL over TLS protocol communica-
tions.
Not Secure (eSCL over TLS & eSCL): Enables access for both eSCL over TLS
and eSCL protocol communications.
8. REST Security: Specifies the security level for REST.
Secure Only (REST over TLS): Encrypts all REST over TLS protocol communica-
tions.
Not Secure (REST over TLS & eSCL): Enables access for both REST over TLS
and REST protocol communications.
Clientside Settings
Configures security settings on the client (PC) side. This section includes the follow-
ing items for configuration:
1. TLS Version: TLS, as well as TLS, is a cryptographic protocol that provides
communication security between a PC and the machine. Select the version of TLS
that you want to use from TLS1.0, TLS1.1, TLS1.2, and TLS1.3. You can use
more than one algorithm at a time.
2. Ef
fective Encryption: Select a
n algorithm that you want to use from ARCFOUR,
DES, 3DES, AES, AES-GCM and CHACHA20/POLY1305. You can use more
than one algorithm at a time.
3. Hash: Select a Hash algorithm of either SHA1 or SHA2(256/384). You can use
more than one algorithm at a time.
When more than one algorithm are selected, the machine selects one algorithm to
automatically connect to the server.
Note: When the TLS is set to On and HTTP Security is set to Secure Only
(HTTPS), the document boxes cannot be accessed by the TWAIN driver.
3. Click Submit button.
Bekijk gratis de handleiding van UTAX 5009ci, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
| Merk | UTAX |
| Model | 5009ci |
| Categorie | Printer |
| Taal | Nederlands |
| Grootte | 11339 MB |







