Network, Security – Canon i-SENSYS MF244dw User Manual

Page 4

Advertising
background image

Network

............................................................................................................................................................ 164

Connecting to a Network

...................................................................................................................................... 165

Selecting Wired LAN or Wireless LAN

.................................................................................................................. 167

Connecting to a Wired LAN

................................................................................................................................ 168

Connecting to a Wireless LAN

............................................................................................................................. 169

Setting Up Connection Using WPS Push Button Mode

..................................................................................... 171

Setting Up Connection Using WPS PIN Code Mode

......................................................................................... 173

Setting Up Connection by Selecting a Wireless Router

..................................................................................... 176

Setting Up Connection by Specifying Detailed Settings

.................................................................................... 179

Checking the SSID and Network Key

............................................................................................................. 183

Setting IP Addresses

......................................................................................................................................... 186

Setting IPv4 Address

................................................................................................................................... 187

Setting IPv6 Addresses

................................................................................................................................ 190

Viewing Network Settings

..................................................................................................................................... 193

Configuring the Machine for Printing from a Computer

.......................................................................................... 196

Configuring Printing Protocols and WSD Functions

............................................................................................... 197

Configuring Printer Ports

................................................................................................................................... 200

Setting Up Print Server

...................................................................................................................................... 203

Configuring the Machine for Your Network Environment

....................................................................................... 206

Configuring Ethernet Settings

............................................................................................................................ 207

Changing the Maximum Transmission Unit

.......................................................................................................... 209

Setting a Wait Time for Connecting to a Network

.................................................................................................. 210

Configuring DNS

.............................................................................................................................................. 211

Configuring SNTP

............................................................................................................................................. 215

Monitoring and Controlling the Machine with SNMP

............................................................................................. 217

Security

.............................................................................................................................................................. 223

Protecting the Machine from Unauthorized Access

................................................................................................ 224

Preventing Unauthorized Access

........................................................................................................................ 225

Setting Access Privileges

.................................................................................................................................... 227

Setting the System Manager PIN

.................................................................................................................. 228

Setting a Remote UI PIN

.............................................................................................................................. 230

Restricting Communication by Using Firewalls

...................................................................................................... 232

Specifying IP Addresses for Firewall Rules

...................................................................................................... 233

Specifying MAC Addresses for Firewall Rules

.................................................................................................. 237

Changing Port Numbers

.................................................................................................................................... 240

Setting a Proxy

................................................................................................................................................. 242

Restricting the Machine's Functions

....................................................................................................................... 244

Disabling HTTP Communication

......................................................................................................................... 245

Disabling Remote UI

......................................................................................................................................... 246

Implementing Robust Security Features

................................................................................................................ 247

Enabling TLS Encrypted Communication for the Remote UI

................................................................................... 248

Configuring IEEE 802.1X Authentication

............................................................................................................... 251

Configuring Settings for Key Pairs and Digital Certificates

...................................................................................... 256

III

Advertising
This manual is related to the following products: