beautypg.com

Security – Canon imageCLASS MF753Cdw Multifunction Wireless Color Laser Printer User Manual

Page 364

background image

Security

Security

................................................................................................................................................................ 356

Setting the Department ID and PIN for the Administrator

............................................................................ 357

Authenticating Users and Managing Groups

.................................................................................................. 359

Authenticating Users and Managing Groups with Department ID (Department ID Management)

............... 360

Registering a Department ID and PIN

................................................................................................... 362

Enabling Department ID Management

.................................................................................................. 364

Setting the Department ID and PIN on a Computer

............................................................................... 366

Confirming Usage by Department ID

..................................................................................................... 369

Performing User Authentication with an LDAP Server When Sending or Saving Data

.................................. 370

Protecting the Network

.................................................................................................................................... 373

Setting the Firewall

....................................................................................................................................... 374

Changing the Port Number

.......................................................................................................................... 377

Using a Proxy

............................................................................................................................................... 378

Using TLS

...................................................................................................................................................... 380

Using IPSec

................................................................................................................................................... 382

Using IEEE 802.1X

......................................................................................................................................... 386

Managing and Verifying a Key and Certificate

.............................................................................................. 388

Generating a Key and Certificate

........................................................................................................... 389

Generating a Key and Certificate Signing Request (CSR) and Obtaining and Registering a Certificate

... 391

Generating a Key and Obtaining and Registering a Certificate from an SCEP Server

............................. 394

If an Error Is Displayed in the Certificate Issuance Request Status

.................................................. 399

Registering a Key and Certificate or CA Certificate Obtained from an Issuing Authority

........................ 401

Verifying a Received Certificate with OCSP

............................................................................................. 403

Preventing Sending Data by Mistake and Leaking Information

.................................................................... 404

Limiting Available Destinations

.................................................................................................................... 405

Confirming the Destination before Sending

................................................................................................. 407

Restricting Fax Sending

................................................................................................................................ 409

Restricting Use of Memory Media

................................................................................................................. 411

Restricting Use from a Mobile Device

........................................................................................................... 413

Restricting Printing

....................................................................................................................................... 414

Restricting Printing from a Computer to Secure Print

............................................................................ 415

Saving Received Documents in the Machine (Memory Lock)

.................................................................. 416

Preventing Unauthorized Use

.......................................................................................................................... 419

Restricting Address Book Registration and Editing

....................................................................................... 420

Restricting Use of Remote UI

........................................................................................................................ 422

Security

354