Home > Canon > Printer > Canon I Sensys Lbp6030 User Guide

Canon I Sensys Lbp6030 User Guide

Here you can view all the pages of manual Canon I Sensys Lbp6030 User Guide. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.

Page 101

0HWJ-02R
Security
Confidential information  is  handled by information  devices everywhere,  including computers and  printers, and  any of these devices may
become a target for  malicious third parties at any time. Attackers may  directly  gain unauthorized access to  your devices,  or indirectly
take advantage of negligence or improper  use. Either way, you may  incur unanticipated losses when your confidential  information  is
leaked. To counter these risks,  this machine is  equipped with a variety...

Page 102

0HWJ-02S
Protecting the Machine from Unauthorized Access
To prevent  unauthorized third parties from accessing and  using the  machine, you can implement multiple security measures, such as
setting system manager passwords,  using firewalls, and  changing  port numbers.
>Ý>Ü>Þ>Ì>Û>Ì>Þ>Ý>å
 

Page 103

0HWJ-02U
Setting System Manager Passwords
Administrator access rights  are  required to  change machine settings from the  Remote  UI. After logging in as an  administrator, use the
following  procedure to  set the  PIN  (system manager password).  The system manager password is  critical to  the  security of the  machine.
Make  sure  that  only system managers know the  system manager password.
Start  the Remote UI  and  log  on in System Manager Mode.  Starting the Remote UI
Click...

Page 104

[System Manager  Name]
Enter up  to  32 alphanumeric  characters  for  the  name of the  system manager.
[Contact Information]
Enter up  to  32 alphanumeric  characters  for  the  contact information  of the  system manager.
[E- Mail Address]
Enter up  to  64 alphanumeric  characters  for  the  e-mail address of the  system manager.
[System Manager  Comment]
Enter up  to  32 alphanumeric  characters  for  a comment  about  the  system manager.
>Ý>Ü>à>Ì>Û>Ì>Þ>Ý>å
 

Page 105

0HWJ-02W
Restricting Communication by Using Firewalls
Without  proper security,  unauthorized third parties can access computers and  other communication devices that  are  connected to  a
network. To lower the  risk of unauthorized access, you can allow communication with devices having specified IP  addresses and  r eject
communication with other devices.  Conversely, you can also  reject communication with devices having specified IP  addresses and   allow
communication with other devices.  You  can...

Page 106

[IPv4 Address:  Outbound Filter]
Restrict data sent from the  machine to  a computer  by specifying  an  IPv4  address.
[IPv4 Address:  Inbound Filter]
Restrict data received by the  machine from a computer  by specifying  an  IPv4  address.
[IPv6 Address:  Outbound Filter]
Restrict data sent from the  machine to  a computer  by specifying  an  IPv6  address.
[IPv6 Address:  Inbound Filter]
Restrict data received by the  machine from a computer  by specifying  an  IPv6  address.
Specify  the settings...

Page 107

Enter hexadecimal numbers  delimited  by ":" (colons) (Example: "fe80::10").
To specify a range  of addresses
Insert a hyphen  ("-") between  the  addresses (Examples: "192.168.0.10-192.168.0.20" "fe80::10 -fe80::20").
To specify a range  of addresses with a prefix
Enter an  address, followed by a slash  ("/") and  a number indicating  the  prefix  length (Examples: "192.168.0.32/27"
"fe80::1234/64").
When [Reject] is  selected for an...

Page 108

0HWJ-02X
Changing Port Numbers
Ports  serve as endpoints for  communicating with other devices.  Typically, standard port numbers  are  used for  major protocols,  but
devices that  use these port numbers  are  vulnerable  to  attacks  because  these port numbers  are  well-known. To enhance security,  some
network administrators prefer  to  change the  port numbers. When  a port number has been changed, the  new number must be shared
between  communicating devices,  such as computers and  servers. If  a...

Page 109

[LPD]/[RAW]
Change  the  port used for  LPD  printing or RAW printing.  For details about  each protocol, see  Configuring  Printing Protocols
and  Web Services .
[HTTP]
Change  the  port used by HTTP. HTTP is  used for  communications  over the  network, such as when you access the  machine via  the
Remote  UI.
[SNMP]
Change  the  port used by SNMP.  For details about  SNMP,  see  
Monitoring  and  Controlling the Machine  with SNMP .
[WSD Multicast Discovery]
Change  the  port used for  WSD multicast...

Page 110

0HWJ-02Y
Enabling SSL Encrypted Communication for the Remote UI
Authorized  users  may  incur unanticipated losses from attacks  by malicious third parties, such as sniffing,  spoofing, and  tampering of data
as it flows over a network. To protect  your valuable data, you can encrypt  Remote  UI communication between  the  machine and  a Web
browser  on  the  computer  by using Secure Sockets Layer  (SSL). SSL  is  a mechanism for  encrypting  data sent or received over the
network. SSL  must be enabled...
Start reading Canon I Sensys Lbp6030 User Guide

Related Manuals for Canon I Sensys Lbp6030 User Guide

All Canon manuals