Epson LQ-780N Network Manual page 42

Hide thumbs Also See for LQ-780N:
Table of Contents

Advertisement

Network Guide
Items
Service Name
Transport Protocol
Local Port
Remote Port
IKE Version
Authentication Method
Pre-Shared Key
Confirm Pre-Shared Key
Encapsulation
Remote Gateway(Tunnel Mode)
Security Protocol
Security Settings
Settings and Explanation
If you select Service Name for Method of Choosing Port, select an option.
If you select Port Number for Method of Choosing Port, you need to configure
an encapsulation mode.
Any Protocol
Select this to control all protocol types.
TCP
Select this to control data for unicast.
UDP
Select this to control data for broadcast and multicast.
ICMPv4
Select this to control ping command.
If you select Port Number for Method of Choosing Port and if you select TCP or
UDP for Transport Protocol, enter port numbers to control receiving packets,
separating them with commas. You can enter 10 port numbers at the maximum.
Example: 20,80,119,5220
If you do not enter a port number, all ports are controlled.
If you select Port Number for Method of Choosing Port and if you select TCP or
UDP for Transport Protocol, enter port numbers to control sending packets, sep-
arating them with commas. You can enter 10 port numbers at the maximum.
Example: 25,80,143,5220
If you do not enter a port number, all ports are controlled.
Displays the IKE version.
If you select IPsec for Access Control, select an option.
Enter a pre-shared key between 1 and 127 characters.
Enter the key you configured for confirmation.
If you select IPsec for Access Control, you need to configure an encapsulation
mode.
Transport Mode
If you only use the printer on the same LAN, select
this. IP packets of layer 4 or later are encrypted.
Tunnel Mode
If you use the printer on the Internet-capable network
such as IPsec-VPN, select this option. The header and
data of the IP packets are encrypted.
If you select Tunnel Mode for Encapsulation, enter a gateway address between
1 and 39 characters.
If you select IPsec for Access Control, select an option.
ESP
Select this to ensure the integrity of an authentication
and data, and encrypt data.
AH
Select this to ensure the integrity of an authentication
and data. Even if encrypting data is prohibited, you
can use IPsec.
42

Advertisement

Table of Contents
loading

Table of Contents