beautypg.com

Linking with mobile devices, Security – Canon imageCLASS MF753Cdw Multifunction Wireless Color Laser Printer User Manual

Page 6

background image

Linking with Mobile Devices

............................................................................................................ 333

Preparations for Linking with Mobile Devices

......................................................................................................... 335

Preparations for Direct Connection

..................................................................................................................... 336

Preparations for Using AirPrint

........................................................................................................................... 338

Connecting a Mobile Device to the Machine

........................................................................................................... 341

Connecting a Mobile Device via Wireless LAN Router (LAN Connection)

................................................................... 342

Connecting a Mobile Device Directly to the Machine (Direct Connection)

................................................................. 343

Using a Dedicated Application to Print and Scan (Canon PRINT Business)

................................................................ 346

Using AirPrint Application to Print and Scan Data and Send Faxes

........................................................................... 347

Printing from an Android Device

............................................................................................................................ 351

Printing from Chromebook or Other Device with Chrome OS

.................................................................................. 353

Security

.............................................................................................................................................................. 356

Setting the Department ID and PIN for the Administrator

...................................................................................... 357

Authenticating Users and Managing Groups

.......................................................................................................... 359

Authenticating Users and Managing Groups with Department ID (Department ID Management)

............................... 360

Registering a Department ID and PIN

........................................................................................................... 362

Enabling Department ID Management

.......................................................................................................... 364

Setting the Department ID and PIN on a Computer

........................................................................................ 366

Confirming Usage by Department ID

............................................................................................................ 369

Performing User Authentication with an LDAP Server When Sending or Saving Data

................................................. 370

Protecting the Network

........................................................................................................................................ 373

Setting the Firewall

........................................................................................................................................... 374

Changing the Port Number

................................................................................................................................ 377

Using a Proxy

................................................................................................................................................... 378

Using TLS

........................................................................................................................................................ 380

Using IPSec

...................................................................................................................................................... 382

Using IEEE 802.1X

............................................................................................................................................. 386

Managing and Verifying a Key and Certificate

...................................................................................................... 388

Generating a Key and Certificate

.................................................................................................................. 389

Generating a Key and Certificate Signing Request (CSR) and Obtaining and Registering a Certificate

.................... 391

Generating a Key and Obtaining and Registering a Certificate from an SCEP Server

............................................ 394

If an Error Is Displayed in the Certificate Issuance Request Status

.............................................................. 399

Registering a Key and Certificate or CA Certificate Obtained from an Issuing Authority

....................................... 401

Verifying a Received Certificate with OCSP

..................................................................................................... 403

Preventing Sending Data by Mistake and Leaking Information

............................................................................... 404

Limiting Available Destinations

........................................................................................................................... 405

Confirming the Destination before Sending

......................................................................................................... 407

Restricting Fax Sending

..................................................................................................................................... 409

Restricting Use of Memory Media

....................................................................................................................... 411

Restricting Use from a Mobile Device

.................................................................................................................. 413

Restricting Printing

........................................................................................................................................... 414

Restricting Printing from a Computer to Secure Print

...................................................................................... 415

Saving Received Documents in the Machine (Memory Lock)

............................................................................. 416

V