EasyManua.ls Logo

Canon MF418x - Page 527

Canon MF418x
917 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security
Security ................................................................................................................................................................ 519
Protecting the Machine from Unauthorized Access ....................................................................................... 520
Preventing Unauthorized Access .................................................................................................................. 521
Setting Access Privileges .............................................................................................................................. 523
Setting the System Manager ID ............................................................................................................. 524
Setting the Department ID Management .............................................................................................. 526
Setting a Remote UI PIN ........................................................................................................................ 534
LDAP Server Authentication .......................................................................................................................... 536
Restricting Communication by Using Firewalls ............................................................................................. 541
Specifying IP Addresses for Firewall Rules ............................................................................................. 542
Specifying MAC Addresses for Firewall Rules ......................................................................................... 546
Changing Port Numbers ............................................................................................................................... 549
Setting a Proxy ............................................................................................................................................. 551
Restricting the Machine's Functions ................................................................................................................ 554
Restricting Access to Address Book and Sending Functions ......................................................................... 555
Setting a PIN for Address Book .............................................................................................................. 556
Limiting Available Destinations .............................................................................................................. 558
Prohibiting PC Faxing (MF419x / MF416dw) ........................................................................................... 559
Disabling Use of Previously Used Destinations ...................................................................................... 560
Checking Destinations before Sending Documents ............................................................................... 561
Prohibiting Sequential Broadcasting (MF419x / MF416dw) .................................................................... 563
Restricting USB Functions ............................................................................................................................. 564
Disabling HTTP Communication ................................................................................................................... 567
Disabling Remote UI ..................................................................................................................................... 568
Implementing Robust Security Features ......................................................................................................... 569
Enabling TLS Encrypted Communication for the Remote UI ......................................................................... 570
Conguring IPSec Settings ........................................................................................................................... 574
Conguring IEEE 802.1X Authentication ....................................................................................................... 583
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 588
Generating Key Pairs ............................................................................................................................. 590
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 598
Verifying Key Pairs and Digital Certicates ............................................................................................. 602
Security
518

Table of Contents

Related product manuals