User Manual - Page 15

For MF269dw. Also, The document are for others Canon models: MF267DW, MF264DW

Loading ...
Loading ...
Loading ...
access from the external networks. If you want to assign a global IP address to and use a printer/
multifunction machine, contact your network administr
ator.
Using Firewall to Restrict Transmission
A r
ewall is a system that prevents unauthorized access from the external networks and protects against attacks/
intrusions to a local area network. You can use a rewall on your network environment to block access from the
external network that appears to be dangerous, by restricting communication from specied IP address of the
external network. The function installed to a Canon printer/multifunction machine enables you to set up the IP
address lter. For information on how to set up an IP address lter, see
Specifying IP Addresses for Firewall
Settings(P
. 300) .
Specifying the TLS Encrypted Communication
For information on the TLS Encrypted Communication, see
Conguring the Network Security Settings
(P. 297) ,
and on the procedures to specify, see
Conguring the Ke
y and Certicate for TLS(P. 308) .
Setting PIN to Manage Information Stored in the Machine
If a malicious thir
d party attempts to gain unauthorized access to a printer/multifunction machine, setting PIN to
information stored in the machine will reduce the risk of information leakage. Canon printers/multifunction machines
enable you to protect various type of information by setting PIN.
Setting PIN to Each Function
Setting PIN for Using Remote UI
For mor
e information, see
Setting a Remote UI PIN(P. 295) .
Setting PIN for the System Manager Settings
For mor
e information, see
Setting the System Manager PIN(P. 293) .
Addr
ess Book PIN
For more information on setting a PIN, see
Restricting Use of the Address Book(P. 325) .
Listed abo
ve are some examples of security measures for preventing unauthorized access. For more information on
the other security measures, see
Managing the Machine(P. 290) and tak
e necessary security measures for
preventing unauthorized access to suit your environment.
Setting Up
8
Loading ...
Loading ...
Loading ...