Brother DCP-8110DN Посібник - Сторінка 35

Переглянути онлайн або завантажити pdf Посібник для Принтер "Все в одному Brother DCP-8110DN. Brother DCP-8110DN 36 сторінок. Printer
Також для Brother DCP-8110DN: Розширений посібник користувача (50 сторінок), Посібник з експлуатації мережі (29 сторінок), Посібник (27 сторінок), Посібник з швидкого налаштування (23 сторінок), Посібник користувача (23 сторінок), Посібник з безпеки продукції (23 сторінок), Розширений посібник користувача (39 сторінок), Посібник з безпеки продукції (22 сторінок)

Brother DCP-8110DN Посібник
Troubleshooting

Network terms and concepts

SSL technical overview

Secure Socket Layer (SSL) is a method for protecting transport layer data sent over a local or wide area
network by using the Internet Printing Protocol (IPP), to prevent unauthorised users being able to read them.
It achieves this by using authentication protocols in the form of digital keys, of which there are 2:
A public key – known by everyone who is printing.
A private key – known only by the machine used to decrypt packets and make them readable again by the
machine.
The public key uses either 1024bit or 2048bit encryption and is contained inside a digital certificate. These
certificates can either be self signed or approved by a Certificate Authority (CA).
First, there are three different keys, Private, Public and Shared.
The Private key, know only to the machine, is associated with the Public key but not contained within the
clients (senders) digital certificate. When the user first establishes the connection, the machine will send the
Public key with the certificate. The client PC trusts that the Public key is from the machine with the certificate.
The client generates the Shared key, and encodes it with the Public key, then sends to the machine. The
machine encodes the Shared key with the Private key. Now the machine and client share the Shared key
safely, and establish the safe connection for print data transfers.
The print data is encoded and decoded with the Shared key.
SSL will not stop unauthorised users from accessing packets, however, it will make them unreadable without
the private key, which is not disclosed to anyone apart from the machine.
It can be configured on both wired and wireless networks and will work with other forms of security such as
WPA keys and firewalls, given the appropriate configuration.
6
6
6
31