Protecting the Network
95LW-03K
Connecting the machine to a network allows you link it to computers and mobile devices for more convenient
operations. However, this also creates risks of unauthorized access and eavesdropping over the network.
By configuring the security settings according to your network environment, you can reduce these risks to ensure
safer use of the machine.
Filtering Using the Firewall Settings
Allows communications only with devices that have a specific IP address or MAC address to prevent
unauthorized access.
Port Control
If the port number being used by a communicating device, such as a computer or server, is changed, change
the setting on the machine too. In addition, if it is clear that there is an unneeded protocol, use of the
protocol is prohibited on the machine and that port is closed to prevent intrusion from the outside.
Changing the Port Number(P. 150)
Using a Proxy Server
Using a proxy server to connect the machine to a network not only facilitates managing communication with
external networks but blocks unauthorized access and consolidates anti-virus protection for enhanced
security.
Encryption of Communication Using TLS
You can use TLS to encrypt communication when using Remote UI. This reduces the risks of data
eavesdropping and tampering during communication.
Using the Machine in a Network with IEEE 802.1X Authentication
When connecting the machine to a network that uses IEEE 802.1X authentication, you must configure the
settings on the machine such as the authentication method managed by the authentication server.
Managing and Verifying the Key and Certificate
You can generate a key and certificate used to encrypt communication and register a key and certificate
obtained from a certification authority. By configuring the settings to check the revocation status of a
certificate (using OCSP), you can check to see if a certificate received from a certification authority has been
revoked.
Managing and Verifying a Key and Certificate(P. 157)
◼
See Also
For the network settings at setup, see the following.
Configuring Your Machine for Your Network Environment(P. 54)
Security
146
Summary of Contents for imageCLASS LBP121dn
Page 1: ...imageCLASS LBP122dw LBP121dn User s Guide USRMA 7917 00 2023 02 en Copyright CANON INC 2023 ...
Page 7: ...Notice 358 Trademarks and Copyrights 359 Third party Software 361 VI ...
Page 47: ... Shared Key Encryption for WPA WPA2 TKIP AES CCMP IEEE 802 1X Authentication Setting Up 40 ...
Page 65: ... The settings are applied Setting Up 58 ...
Page 100: ...Paper with logo in landscape orientation Basic Operations 93 ...
Page 105: ... The custom paper is registered Basic Operations 98 ...
Page 138: ...6 Log out from Remote UI Linking with Mobile Devices 131 ...
Page 159: ...8 Log out from Remote UI Security 152 ...
Page 207: ... Off On Settings Menu Items 200 ...
Page 250: ... Off On Settings Menu Items 243 ...
Page 284: ... When you select On the printing speed may decrease Troubleshooting 277 ...
Page 353: ...Manual Display Settings 95LW 08H Appendix 346 ...