EasyManua.ls Logo

Canon imageCLASS MF735Cdw - Page 16

Canon imageCLASS MF735Cdw
779 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
access from the external networks. If you want to assign a global IP address to and use a printer/
multifunction machine, contact your network administrator.
Using Firewall to Restrict Transmission
A rewall is a system that prevents unauthorized access from the external networks and protects against attacks/
intrusions to a local area network. You can use a rewall on your network environment to block access from the
external network that appears to be dangerous, by restricting communication from specied IP address of the
external network. The function installed to a Canon printer/multifunction machine enables you to set up the IP
address lter. For information on how to set up an IP address lter, see
Specifying IP Addresses for Firewall
Settings(P. 371) .
Specifying the TLS Encrypted Communication
For information on the TLS Encrypted Communication, see Conguring the Network Security Settings(P. 368) ,
and on the procedures to specify, see Conguring the Key and Certicate for TLS(P. 380) .
Setting PIN to Manage Information Stored in the Multifunction Machine
If a malicious third party attempts to gain unauthorized access to a printer/multifunction machine, setting PIN to
information stored in the machine will reduce the risk of information leakage. Canon printer/multifunction machine
enables you to protect various type of information by setting PIN.
Setting PIN to Each Function
Setting PIN for Using Remote UI
For more information, see Setting a Remote UI PIN(P. 362) .
Setting PIN for the System Manager Settings
For more information, see Setting the System Manager ID and PIN(P. 354) .
Address Book PIN
For more information on setting a PIN, see
Restricting Use of the Address Book(P. 405) .
Listed above are some examples of security measures for preventing unauthorized access. For more information on
the other security measures, see Managing the Machine(P. 351) and take necessary security measures for
preventing unauthorized access to suit your environment.
Setting Up
8

Table of Contents

Related product manuals