Implementing Robust Security Features
19Y4-04X
Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing,
and tampering of data as it flows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI. Enabling TLS Encrypted Communication for the Remote UI(P. 242)
IEEE 802.1X Authentication
IEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectively
managing user authentication information. If a device tries to connect to the 802.1X network, the device must
go through user authentication in order to prove that the connection is made by an authorized user.
Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication
to the network depending on the authentication result. If authentication fails, a LAN switch (or an access point)
blocks access from the outside of the network. The machine can connect to an 802.1X network as a client
device. Configuring IEEE 802.1X Authentication(P. 245)
LINKS
Configuring Settings for Key Pairs and Digital Certificates(P. 250)
Security
241
Содержание 1418C025
Страница 1: ...imageCLASS D570 User s Guide USRMA 1576 00 2017 01 en Copyright CANON INC 2017 ...
Страница 31: ... key Press to switch the type of text that is entered LINKS Using the Operation Panel P 29 Basic Operations 25 ...
Страница 60: ...Exiting Sleep Mode Press You can also press any key other than to exit sleep mode Basic Operations 54 ...
Страница 73: ...LINKS Basic Copy Operations P 58 Adjusting Density P 65 Copying 67 ...
Страница 77: ...LINKS Basic Copy Operations P 58 2 Sided Copying P 68 Using the Paper Save Copy Key P 72 Copying 71 ...
Страница 89: ...Managing Documents and Checking the Machine Status P 271 Using the Machine as a Printer 83 ...
Страница 110: ...LINKS Printing a Document P 80 Printing Borders P 102 Printing Watermarks P 105 Using the Machine as a Printer 104 ...
Страница 125: ...LINKS Printing a Document P 80 Various Print Settings P 88 Using the Machine as a Printer 119 ...
Страница 191: ...4 Click Edit in IPv6 Settings 5 Select the Use IPv6 check box and configure the required settings Use IPv6 Network 185 ...
Страница 241: ...Configuring Printer Ports P 194 Security 235 ...
Страница 257: ... The machine does not support use of a certificate revocation list CRL Security 251 ...
Страница 280: ...LINKS Remote UI Screens P 268 Using Remote UI 274 ...
Страница 307: ... Timer Settings Auto Offline Time Set the time period Setting Menu List 301 ...
Страница 339: ...Troubleshooting 333 ...
Страница 398: ...Third Party Software 19Y4 072 For information related to third party software click the following icon Appendix 392 ...
Страница 427: ...Manual Display Settings 19Y4 07X Appendix 421 ...
Страница 437: ...Appendix 431 ...
Страница 438: ...Menu Route Map 19Y4 081 For the settings on the machine s display see Menu Route Map PDF manual Appendix 432 ...
Страница 455: ... 12 JPEG this software is based in part on the work of the Independent JPEG Group ...