Security – Canon i-SENSYS MF244dw User Manual

Page 228

Advertising
background image

Security

Security

................................................................................................................................................................ 223

Protecting the Machine from Unauthorized Access

....................................................................................... 224

Preventing Unauthorized Access

.................................................................................................................. 225

Setting Access Privileges

.............................................................................................................................. 227

Setting the System Manager PIN

........................................................................................................... 228

Setting a Remote UI PIN

........................................................................................................................ 230

Restricting Communication by Using Firewalls

............................................................................................. 232

Specifying IP Addresses for Firewall Rules

............................................................................................. 233

Specifying MAC Addresses for Firewall Rules

......................................................................................... 237

Changing Port Numbers

............................................................................................................................... 240

Setting a Proxy

............................................................................................................................................. 242

Restricting the Machine's Functions

................................................................................................................ 244

Disabling HTTP Communication

................................................................................................................... 245

Disabling Remote UI

..................................................................................................................................... 246

Implementing Robust Security Features

......................................................................................................... 247

Enabling TLS Encrypted Communication for the Remote UI

......................................................................... 248

Configuring IEEE 802.1X Authentication

....................................................................................................... 251

Configuring Settings for Key Pairs and Digital Certificates

........................................................................... 256

Generating Key Pairs

............................................................................................................................. 258

Using CA-issued Key Pairs and Digital Certificates

................................................................................. 265

Verifying Key Pairs and Digital Certificates

............................................................................................. 268

Security

222

Advertising
This manual is related to the following products: