Information About Networking And Security - HP Jet Fusion 340 Product Documentation Site Preparation Manual

Hide thumbs Also See for Jet Fusion 340:
Table of Contents

Advertisement

How to get access to HP 3D Center
You will need to create your organization and first user. If your HP representative has not provided you with an
invitation to create them, you can do it manually by navigating to
option "Create organization." Please, ensure that you save the information about your organization and
username, since you will have to use them for the procedures on this guide and for the installation. We
encourage you to avoid creating more than one organization.

Information about networking and security

Network protocols and information flows
Device data are accessed through HTTPS from Command Center Server using the devices' Web Services.
Data connections to the HP Cloud are always initiated by Command Center Server. No incoming network
ports need to be opened.
Neither the Command Center nor any devices connected to it are accessed from the Internet.
HP 3D Printing Solution status and health monitoring require frequent uploads of small data payloads.
Outgoing connections are opened and immediately closed for each payload, which reduces any potential
security risks.
Command Center Server uses the HTTPS Web protocol, but it is not a Web browser: it cannot be used to
access anything other than the HP Cloud, and it is not affected by Web browser vulnerabilities.
Communication between Command Center Client and Server is by HTTPS, and the port range is HTTPS
8443–8450 and HTTP 8080–8090.
Command Center MQTT broker and API Proxy port range are 1883–1891 and 8090–8099 respectively.
Encryption
The Command Center software transmits device data to HP Cloud servers using HTTPS. The identity of the
servers is verified, and the communication between the Command Center software and the HP Cloud
servers is encrypted using the Advanced Encryption Standard (AES) algorithm in Cipher Block Chaining (CBC)
mode, which ensures that the device data cannot be viewed or modified by any third party.
Device and software security
Full security audits and vulnerability scans are performed on the Command Center software before release.
Printers and supporting devices run on dedicated hardware and firmware that are not affected by typical
personal-computer vulnerabilities.
Full security audits and vulnerability scans are performed on all HP device firmware before release, and
firmware update files are digitally signed by HP and verified by the HP device before installation.
Data confidentiality
Device non-anonymous data are never shared with unauthorized third parties without the customer's
consent. The HP Cloud stores the device data in HP authorized data centers, which meet strict HP security
standards, and the system is periodically audited to help ensure the highest level of data security.
Proxy configuration
Command Center uses the system proxy configuration.
30
Chapter 5 Plan your computer and network environment
http://www.hp3dcenter.com
and using the
ENWW

Advertisement

Table of Contents
loading

This manual is also suitable for:

Jet fusion 540Jet fusion 580

Table of Contents