Configuring the Network Security Settings
23FJ-033
Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing,
and tampering of data as it flows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
Firewall Settings
Unauthorized access by third parties, as well as network attacks and intrusions, can be blocked by limiting
communication only to devices that have a specific IP address or MAC address. Restricting Communication
Changing Port Numbers
A protocol that is used to exchange information with other devices is assigned port numbers that are
predetermined according to the type of protocol. The port number must be the same for all communication
devices; therefore, changing it to an arbitrary number is important to prevent hacking from outside.
Proxy Settings
When the client devices are connected to an external network, communication is established through the proxy
server. When the proxy server is used, websites can be browsed more safely, therefore, security can be
expected to be enhanced. Setting a Proxy(P. 157)
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI. Configuring the Key and Certificate for TLS(P. 159)
Managing the Machine
148
Содержание 2438C006
Страница 1: ...imageCLASS LBP162dw User s Guide USRMA 2767 01 2019 12 en Copyright CANON INC 2019 ...
Страница 46: ...LINKS Setting IPv6 Addresses P 42 Viewing Network Settings P 45 Setting Up 41 ...
Страница 61: ...Printing from a Computer P 117 Setting Up 56 ...
Страница 95: ...Basic Operations 90 ...
Страница 118: ...Exiting Quiet Mode Menu Adjustment Maintenance Special Processing Enable Quiet Mode Off Basic Operations 113 ...
Страница 190: ...LINKS Remote UI Screen P 179 Managing the Machine 185 ...
Страница 254: ...7 Close the toner cover LINKS Consumables P 256 Maintenance 249 ...
Страница 263: ... When replacing drum cartridge see Replacing the Drum Cartridge P 246 Maintenance 258 ...
Страница 266: ...Troubleshooting 261 ...
Страница 311: ...Third Party Software 23FJ 057 For information related to third party software click the following icon s Appendix 306 ...
Страница 321: ... 6When all of the front cover back cover and toner cover are opened Appendix 316 ...
Страница 330: ...WPA2 PSK AES CCMP Connection Method WPS Wi Fi Protected Setup Manual setup Appendix 325 ...
Страница 346: ...Menu Route Map 23FJ 061 For the settings on the machine s display see Menu Route Map PDF manual Appendix 341 ...
Страница 362: ... 12 JPEG this software is based in part on the work of the Independent JPEG Group ...