Using firewall to restrict transmission, Specifying the tls encrypted communication – Canon imageCLASS D1650 All-in-One Monochrome Laser Printer User Manual

Page 17

Advertising
background image

access from the external networks. If you want to assign a global IP address to and use a printer/
multifunction machine, contact your network administrator.

Using Firewall to Restrict Transmission

A firewall is a system that prevents unauthorized access from the external networks and protects against attacks/

intrusions to a local area network. You can use a firewall on your network environment to block access from the

external network that appears to be dangerous, by restricting communication from specified IP address of the

external network. The function installed to a Canon printer/multifunction machine enables you to set up the IP

address filter. For information on how to set up an IP address filter, see Specifying IP Addresses for Firewall

Settings(P. 368) .

Specifying the TLS Encrypted Communication

For information on the TLS Encrypted Communication, see Configuring the Network Security Settings(P. 365) ,

and on the procedures to specify, see Configuring the Key and Certificate for TLS(P. 378) .

Setting PIN to Manage Information Stored in the Multifunction Machine

If a malicious third party attempts to gain unauthorized access to a printer/multifunction machine, setting PIN to

information stored in the machine will reduce the risk of information leakage. Canon printers/multifunction machines

enable you to protect various type of information by setting PIN.

Setting PIN to Each Function

Setting PIN for Using Remote UI
For more information, see Setting a Remote UI PIN(P. 359) .

Setting PIN for the System Manager Settings
For more information, see Setting the System Manager ID and PIN(P. 351) .

Address Book PIN
For more information on setting a PIN, see Restricting Use of the Address Book(P. 403) .

Listed above are some examples of security measures for preventing unauthorized access. For more information on

the other security measures, see Managing the Machine(P. 348) and take necessary security measures for

preventing unauthorized access to suit your environment.

Setting Up

9

Advertising