EasyManua.ls Logo

Canon LBP710Cx - Page 256

Canon LBP710Cx
894 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security
Security ................................................................................................................................................................ 251
Protecting the Machine from Unauthorized Access ....................................................................................... 252
Preventing Unauthorized Access .................................................................................................................. 253
Setting Access Privileges .............................................................................................................................. 255
Setting the System Manager Password .................................................................................................. 256
Setting the Department ID Management .............................................................................................. 259
Setting a Remote UI PIN ........................................................................................................................ 266
Restricting Communication by Using Firewalls ............................................................................................. 267
Specifying IP Addresses for Firewall Rules ............................................................................................. 268
Specifying MAC Addresses for Firewall Rules ......................................................................................... 274
Setting a Proxy ............................................................................................................................................. 277
Restricting the Machine's Functions ................................................................................................................ 280
Restricting the Printing Operations .............................................................................................................. 281
Restricting USB Functions ............................................................................................................................. 285
Restricting Operation Panel Functions ......................................................................................................... 288
Disabling HTTP Communication ................................................................................................................... 291
Disabling Remote UI ..................................................................................................................................... 292
Disabling the LAN Port ................................................................................................................................. 293
Hiding the Print Job History .......................................................................................................................... 294
Implementing Robust Security Features ......................................................................................................... 296
Using TLS for Encrypted Communications .................................................................................................... 297
Conguring IPSec Settings ........................................................................................................................... 301
Conguring IEEE 802.1X Authentication ....................................................................................................... 312
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 318
Generating Key Pairs ............................................................................................................................. 320
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 329
Verifying Key Pairs and Digital Certicates ............................................................................................. 332
Security
250

Table of Contents

Related product manuals