Using firewall to restrict transmission, Specifying the tls encrypted communication – Canon imageCLASS D1650 All-in-One Monochrome Laser Printer User Manual
Page 17

access from the external networks. If you want to assign a global IP address to and use a printer/
multifunction machine, contact your network administrator.
Using Firewall to Restrict Transmission
A firewall is a system that prevents unauthorized access from the external networks and protects against attacks/
intrusions to a local area network. You can use a firewall on your network environment to block access from the
external network that appears to be dangerous, by restricting communication from specified IP address of the
external network. The function installed to a Canon printer/multifunction machine enables you to set up the IP
address filter. For information on how to set up an IP address filter, see Specifying IP Addresses for Firewall
Specifying the TLS Encrypted Communication
For information on the TLS Encrypted Communication, see Configuring the Network Security Settings(P. 365) ,
and on the procedures to specify, see Configuring the Key and Certificate for TLS(P. 378) .
Setting PIN to Manage Information Stored in the Multifunction Machine
If a malicious third party attempts to gain unauthorized access to a printer/multifunction machine, setting PIN to
information stored in the machine will reduce the risk of information leakage. Canon printers/multifunction machines
enable you to protect various type of information by setting PIN.
Setting PIN to Each Function
●
Setting PIN for Using Remote UI
For more information, see Setting a Remote UI PIN(P. 359) .
●
Setting PIN for the System Manager Settings
For more information, see Setting the System Manager ID and PIN(P. 351) .
●
Address Book PIN
For more information on setting a PIN, see Restricting Use of the Address Book(P. 403) .
Listed above are some examples of security measures for preventing unauthorized access. For more information on
the other security measures, see Managing the Machine(P. 348) and take necessary security measures for
preventing unauthorized access to suit your environment.
Setting Up
9