Security – Canon imageCLASS LBP674Cdw Wireless Color Laser Printer User Manual

Page 213

Advertising
background image

Security

Security

................................................................................................................................................................ 206

Setting the Department ID and PIN for the Administrator

............................................................................ 207

Authenticating Users and Managing Groups

.................................................................................................. 209

Authenticating Users and Managing Groups with Department ID (Department ID Management)

............... 210

Registering a Department ID and PIN

................................................................................................... 212

Enabling Department ID Management

.................................................................................................. 214

Setting the Department ID and PIN on a Computer

............................................................................... 215

Confirming Usage by Department ID

..................................................................................................... 218

Protecting the Network

.................................................................................................................................... 219

Setting the Firewall

....................................................................................................................................... 220

Changing the Port Number

.......................................................................................................................... 223

Using a Proxy

............................................................................................................................................... 224

Using TLS

...................................................................................................................................................... 226

Using IPSec

................................................................................................................................................... 228

Using IEEE 802.1X

......................................................................................................................................... 232

Managing and Verifying a Key and Certificate

.............................................................................................. 234

Generating a Key and Certificate

........................................................................................................... 235

Generating a Key and Certificate Signing Request (CSR) and Obtaining and Registering a Certificate

... 237

Generating a Key and Obtaining and Registering a Certificate from an SCEP Server

............................. 240

If an Error Is Displayed in the Certificate Issuance Request Status

.................................................. 245

Registering a Key and Certificate or CA Certificate Obtained from an Issuing Authority

........................ 247

Verifying a Received Certificate with OCSP

............................................................................................. 249

Preventing Leaking Information

...................................................................................................................... 250

Restricting Use of Memory Media

................................................................................................................. 251

Restricting Use from a Mobile Device

........................................................................................................... 253

Restricting Printing

....................................................................................................................................... 254

Restricting Printing from a Computer to Secure Print

............................................................................ 255

Preventing Unauthorized Use

.......................................................................................................................... 256

Restricting Use of Remote UI

........................................................................................................................ 257

Preventing Connection to Computer via USB Port

........................................................................................ 259

Configuring LPD, RAW, or WSD

..................................................................................................................... 260

Disabling HTTP Communication

................................................................................................................... 262

Applying a Security Policy

................................................................................................................................. 263

Security Policy Items

..................................................................................................................................... 265

Security

205

Advertising