EasyManua.ls Logo

HP Jet Fusion 4200 - Information about Networking and Security

HP Jet Fusion 4200
56 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Each organization can contain multiple sites, and each site can contain multiple devices. You may use an
organization to represent a company, and a site to represent a company oce. But you can choose what they
represent in your particular case.
Each organization can have multiple user accounts with dierent level of permissions (admin, dashboard,
operator, user).
During site preparation, you should create an organization and an admin user account. This admin account will
allow you to perform the following tasks:
Manage user accounts: Invite new users, with their dierent roles.
Manage sites and congure their physical locations.
Manage devices: Add devices to the sites, remove them, change names, and so on.
Manage the apps to which your organization has access.
How to get access to HP 3D Center
You will need to create your organization and rst user. If your HP representative has not provided you with an
invitation to create them, you can do it manually by navigating to http://www.hp3dcenter.com and using the
option "Create organization." Please, ensure that you save the information about your organization and
username, since you will have to use them for the procedures on this guide and for the installation. We
encourage you to avoid creating more than one organization.
Information about networking and security
Network protocols and information ows
Device data are accessed through HTTPS from Command Center Server using the devices’ Web Services.
Data connections to the HP Cloud are always initiated by Command Center Server. No incoming network
ports need to be opened.
Neither the Command Center nor any devices connected to it are accessed from the Internet.
HP 3D Printing Solution status and health monitoring require frequent uploads of small data payloads.
Outgoing connections are opened and immediately closed for each payload, which reduces any potential
security risks.
38 Chapter 4 Plan your computer and network environment ENWW