EasyManua.ls Logo

Canon LBP352 - Page 254

Canon LBP352
642 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security
Security ................................................................................................................................................................ 248
Protecting the Machine from Unauthorized Access ....................................................................................... 249
Preventing Unauthorized Access .................................................................................................................. 250
Setting Access Privileges .............................................................................................................................. 252
Setting the System Manager Password .................................................................................................. 253
Setting the Department ID Management .............................................................................................. 256
Setting a Remote UI PIN ........................................................................................................................ 263
Restricting Communication by Using Firewalls ............................................................................................. 264
Specifying IP Addresses for Firewall Rules ............................................................................................. 265
Specifying MAC Addresses for Firewall Rules ......................................................................................... 271
Setting a Proxy ............................................................................................................................................. 274
Restricting the Machine's Functions ................................................................................................................ 277
Restricting the Printing Operations .............................................................................................................. 278
Restricting USB Functions ............................................................................................................................. 282
Restricting Operation Panel Functions ......................................................................................................... 285
Disabling HTTP Communication ................................................................................................................... 288
Disabling Remote UI ..................................................................................................................................... 289
Disabling the LAN Port ................................................................................................................................. 290
Hiding the Print Job History .......................................................................................................................... 291
Implementing Robust Security Features ......................................................................................................... 293
Using TLS for Encrypted Communications .................................................................................................... 294
Conguring IPSec Settings ........................................................................................................................... 298
Conguring IEEE 802.1X Authentication ....................................................................................................... 309
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 315
Generating Key Pairs ............................................................................................................................. 317
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 326
Verifying Key Pairs and Digital Certicates ............................................................................................. 329
Security
247

Table of Contents

Related product manuals