beautypg.com

Protecting the network, D parties. protecting the network(p. 373), Protecting the network(p. 373) – Canon imageCLASS MF753Cdw Multifunction Wireless Color Laser Printer User Manual

Page 383

background image

Protecting the Network

84CU-018

Connecting the machine to a network allows you link it to computers and mobile devices for more convenient

operations. However, this also creates risks of unauthorized access and eavesdropping over the network.

By configuring the security settings according to your network environment, you can reduce these risks to ensure

safer use of the machine.

Filtering Using the Firewall Settings

Allows communications only with devices that have a specific IP address or MAC address to prevent

unauthorized access.

Setting the Firewall(P. 374)

Port Control

If the port number being used by a communicating device, such as a computer or server, is changed, change

the setting on the machine too. In addition, if it is clear that there is an unneeded protocol, use of the

protocol is prohibited on the machine and that port is closed to prevent intrusion from the outside.

Changing the Port Number(P. 377)

Using a Proxy Server

Using a proxy server to connect the machine to a network not only facilitates managing communication with

external networks but blocks unauthorized access and consolidates anti-virus protection for enhanced

security.

Using a Proxy(P. 378)

Encryption of Communication Using TLS

You can use TLS to encrypt communication when using Remote UI. This reduces the risks of data

eavesdropping and tampering during communication.

Using TLS(P. 380)

Encryption of Communication Using IPSec

Use Internet Protocol Security (IPSec) to encrypt data at the IP protocol level. This reduces the risk of data

eavesdropping and tampering during communication without relying on an application or network

configuration.

Using IPSec(P. 382)

Using the Machine in a Network with IEEE 802.1X Authentication

When connecting the machine to a network that uses IEEE 802.1X authentication, you must configure the

settings on the machine such as the authentication method managed by the authentication server.

Using IEEE 802.1X(P. 386)

Managing and Verifying the Key and Certificate

You can generate a key and certificate used to encrypt communication and register a key and certificate

obtained from a certification authority. By configuring the settings to check the revocation status of a

certificate (using OCSP), you can check to see if a certificate received from a certification authority has been

revoked.

Managing and Verifying a Key and Certificate(P. 388)

See Also

For the network settings at setup, see the following.

Configuring Your Machine for Your Network Environment(P. 69)

Security

373