EasyManuals Logo
Home>Epson>Printer>TM-T70-i

Epson TM-T70-i Technical Reference Guide

Epson TM-T70-i
118 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #7 background imageLoading...
Page #7 background image
7
Notes on Security when Using Wireless LAN
(Important information on customer rights (maintaining privacy)
The advantage of using a wireless LAN over a LAN cable is that, because information is
exchanged using radio signals, you can easily connect to the network if you are within range of
the radio signals. A disadva
ntage of this is that within a certain range, the electromagnetic
signals can pass through barriers such as walls, so that if security countermeasures are not
implemented in some way, problems such as the following may occur.
•Communication data can be intercepted
A third party may be able t
o receive wireless transmissions without authorization, and they
could obtain personal information from these transmissions such as IDs, passwords, or credit
card numbers, or they could intercept the contents of personal e-mail messages.
•Unauthorized access to the network
A
third party could access an individual or intra-company network without permission and
carry out any of the following activities.
Retrieve personal data or other secret information (information leakage)
Pose as another user and send inappropriate data (impersonation)
Overwrite the contents of intercepted data and resend it (falsification)
Introduce a computer virus which could cause data loss or system crashes (damage)
Initially, the possibility that such problems could occur through settings concerning the
security of the wireless LAN produ ct and by using the product are decreased, because the
wireless LAN card and the access point have security measures to deal with these problems.
We recommend that you use this product
after making security settings using our own
judgement and assuming full responsibility, a nd with your full understanding of problems
that may occur if you do not make any security settings.
Notes on Setting SSID (Service Set Identifier)
For protection of security, note the following precautions when setting the SSID.
•Change the SSID from the default setting.
•Do not set texts by which the owner can be identified as the SSID.
Notes on Setting Cryptographic Key
For protection of security, note the following precautions when setting the cryptographic key.
•Avoid using words on a dictionary as practicably as possible.
•Combine meaningless alphanumeric characters and symbols.
•Use texts consisted of at least 13 characters or more or of 20 characters or more if possible.

Table of Contents

Other manuals for Epson TM-T70-i

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Epson TM-T70-i and is the answer not in the manual?

Epson TM-T70-i Specifications

General IconGeneral
TypePOS printer
Character size1.69 x 3.38 mm
Print technologyThermal
Wi-FiNo
Ethernet LANYes
Ethernet LAN data rates10, 100 Mbit/s
USB connectorMicro-USB, USB Type-A
Standard interfacesUSB 2.0
USB 2.0 ports quantity1
Connectivity technologyWired
Mean cycles between failures (MCBF)52000000
Internal memory256 MB
Autocutter durability1.5 million cuts
Mean time between failures (MTBF)360000 h
Voltage24 V
Product colorBlack
Weight and Dimensions IconWeight and Dimensions
Depth194 mm
Width125 mm
Height114 mm

Related product manuals