EasyManuals Logo

Canon imageRUNNER ADVANCE C350iF User Manual

Canon imageRUNNER ADVANCE C350iF
102 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #33 background imageLoading...
Page #33 background image
imageRUNNER ADVANCE C350iF/C250iF/C350P Series Service Guide
imageRUNNER ADVANCE C350iF/C250iF/C350P Series Service Guide July 2015
Revision 2 Page 26
D. Network Security
The imageRUNNER ADVANCE C350iF/C250iF/C350P Series machines
secure network communications by using IPSec (IP Security), filtering by port
number, wireless security, and network port and application control.
1. IPSec
The IPSec protocol is standard on the imageRUNNER ADVANCE
C350iF/C250iF/C350P Series machines. It ensures that information and
communications over the network remain private by encrypting all
inbound and outbound network traffic.
2. Filtering by Port Number
Port number filtering permits or rejects data packets from entering
specific port numbers or a range of port numbers. Also, IP address
filters to outbound connections can be applied. For example, if functions,
such as Remote Copy and Universal Send are used, System
Administrators can block or restrict users from sending files to specific IP
addresses. This minimizes the risk of data from being sent out of the
company to systems that are not trusted.
3. Wireless Security and Authentication
The imageRUNNER ADVANCE C350iF/C250iF/C350P Series machines
support IEEE 802.1x and IEEE 2600.1 (optional), which provide port-
based authentication and security to Wireless Local Area Networks.
Authentication involves communications between a supplicant,
authenticator, and authentication server. The supplicant is
authentication software on a client device. The client device (the
imageRUNNER ADVANCE C350iF/C250iF/C350P Series machine)
needs the supplicant to provide credentials, such as user
names/passwords or digital certificates, to the authenticator (a wireless
access point). The authenticator then forwards the credentials to the
authentication server (generally a RADIUS database) for verification. If
the credentials are valid in the authentication server database, the client
device is allowed to access resources located on the protected side of
the network.
4. Network Port and Application Access Control
Network Port and Application Access Control enables System
Administrators to set up only the necessary protocols, such as IPP, FTP,
SNTP, SNMP, RAW, LPD, and others for transferring data. These
protocols can be enabled or disabled. The System Administrator can
also disable unneeded services, protocols, ports, and the potential paths
of attack so that attacks on the machine can be minimized.

Table of Contents

Other manuals for Canon imageRUNNER ADVANCE C350iF

Questions and Answers:

Canon imageRUNNER ADVANCE C350iF Specifications

General IconGeneral
FunctionsPrint, Copy, Scan, Fax
Print ResolutionUp to 1200 x 1200 dpi
Copy Resolution600 x 600 dpi
Scan Resolution600 x 600 dpi
Fax Resolution400 x 400 dpi
Duplex PrintingYes
Operating System CompatibilityWindows, macOS, Linux
Scan Speed (Color)30 ipm
Paper Capacity (Standard)550 sheets
Paper Capacity (Maximum)2300 sheets
Paper Sizes SupportedLetter, Legal
Max Paper SizeA3
ConnectivityUSB, Ethernet
Control Panel10.1-inch color touchscreen

Related product manuals