Home > Canon > Printer > Canon printer imageCLASS MF249dw User Manual

Canon printer imageCLASS MF249dw User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon printer imageCLASS MF249dw User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 714
    							4Click[[email protected]therequiredsettingsandclick[OK@.
    [NetBIOSName@Enter up to 15 alphanumeric characters for the NetBIOS name of the machine.
    [WorkgroupName@Enter up to 15 alphanumeric characters for the name of the workgroup that the machine belongs to.
    Network
    383 
    						
    							Con4gurLngSNTP
    1469-077
     Simple Network Time Protocol (SNTP) enables you to adjust the system clock by
    using the time server on the network. The protocol is typically used for synchronizingthe machine and a server. The time is adjusted based on Coordinated Universal Time
    (UTC), so specify the time zone setting before  con4guring SNTP ( 
    Date/Time
    Settings(P.490) ). SNTP settings can be  speci4ed via the Remote UI.
    	The SNTP of the machine supports both NTP (version 3) and SNTP (versions 3 and 4) servers.
    1StarttheRemoteUIandlogoninSystemManagerMode.StartingRemote
    UI(P.450)2Click[Settings/[email protected][NetworkSettings@[TCP/IP[email protected]
    384       
    						
    							4Click[Edit@in[SNTP[email protected]the[UseSNTP@checkboxandspecifytherequiredsettings.
    [UseSNTP@
    Select the check box to use SNTP for synchronization. If you do not want to use SNTP, clear the check box.
    [NTPServerName@Enter the IP address of the NTP or the SNTP server. If DNS is available on the network, you can enter a host name (or FQDN) of up to 255 alphanumeric characters instead (example: ntp.example.com).
    [PollingInterval@
    Specify the interval between one synchronization and the next. Specify an interval from 1 to 48 hours.
    6Click[[email protected]communicationwiththeNTP/SNTPserver
    	 You can view communication status with the registered server by clicking [Settings/Registration] 
     [Network
    Settings] 
     [TCP/IP Settings] and then clicking [Check NTP Server] in [SNTP Settings] that appears. If a
    proper connection has been established, the result is displayed as shown below. Note that this operation does not adjust the system clock.
    Network
    385 
    						
    							MonitoringandControllingtheMachinewithSNMP
    1469-078
    Simple Network Management Protocol (SNMP) is a protocol for monitoring and controlling communication devices in a
    network by using Management Information Base (MIB). The machine supports SNMPv1 and security-enhanced SNMPv3. You can check the status of the machine from a computer when you print documents or use the Remote UI.
    You can enable either SNMPv1 or SNMPv3, or both at the same time. Specify the settings for each version to suit your
    network environment and the purpose of use.
    SNMPv1
    SNMPv1 uses information called "community" to  de4ne the scope of SNMP communication. Because this
    information is exposed to the network in plain text, your network will be vulnerable to attacks. If you want to
    ensure network security, disable SNMPv1 and use SNMPv3.
    SNMPv3
    With SNMPv3, you can implement network device management that is protected by robust security features.Note that TLS must be enabled for the Remote UI before  con4guring SNMPv3 ( 
    EnablingTLSEncrypted
    CommunicationfortheRemoteUI(P.426) ).
    	The machine does not support the trap  noti4cation feature of SNMP.
    	 To change the port number of SNMP, see 
    ChangingPortNumbers(P.409) .
    	 SNMP management software, when installed on a computer on the network, enables you to  con4gure,
    monitor, and control the machine remotely from the computer. For more information, see the instruction manuals for your management software.1StarttheRemoteUIandlogoninSystemManagermode.StartingRemote
    UI(P.450)2Click[Settings/[email protected]
    386          
    						
    							3Click[NetworkSettings@[SNMP[email protected][[email protected]SNMPv1settings.
    	If you do not need to change SNMPv1 settings, proceed to the next step.
    Network
    387 
    						
    							[UseSNMPv1@Select the check box to enable SNMPv1. You can specify the rest of SNMPv1 settings only when this check box is selected.
    [UseCommunityName1@/[UseCommunityName2@
    Select the check box to specify a community name. If you do not need to specify a community name, clear the check box.
    [CommunityName@
    Enter up to 32 alphanumeric characters for the name of the community.
    [MIBAccessPermission@
    For each community, select [Read/Write] or [Read Only] for the access privileges to MIB objects.
    [Read/Write]Permits both viewing and changing the values of MIB objects.[Read Only]Permits only viewing the values of MIB objects.
    [UseDedicatedCommunity@ Dedicated Community is a preset community, intended exclusively for Administrators using Canon software. Select the check box to use Dedicated Community. If you do not need to use Dedicated Community, clear the check box.
    6SpecifySNMPv3settings.
    	 If you do not need to change SNMPv3 settings, proceed to the next step.
    Network
    388 
    						
    							[UseSNMPv3@
    Select the check box to enable SNMPv3. You can specify the rest of SNMPv3 settings only when this check box is selected.
    [EnableUser@
    Select the check box to enable [User Settings 1]/[User Settings 2]/[User Settings 3]. To disable user settings, clear the corresponding check box.
    [UserName@
    Enter up to 32 alphanumeric characters for the user name.
    [MIBAccessPermission@ Select [Read/Write] or [Read Only] for the access privileges to MIB objects.
    [Read/Write]Permits both viewing and changing the values of MIB objects.[Read Only]Permits only viewing the values of MIB objects.
    [SecuritySettings@
    Select [Authentication On/Encryption On], [Authentication On/Encryption Off], or [Authentication Off/
    Encryption Off] for the desired combination of authentication and encryption settings.
    [AuthenticationAlgorithm@
    If you selected [Authentication On/Encryption On] or [Authentication On/Encryption Off] for [Security
    Settings], select the algorithm that corresponds to your environment.
    [EncryptionAlgorithm@
    If you selected [Authentication On/Encryption On] for [Security Settings], select the algorithm that corresponds to your environment.
    [Set/ChangePassword@
    To set or change the password, select the check box and enter between 6 and 16 alphanumeric characters
    for the password in the [Authentication Password] or [Encryption Password] text box. For  con4rmation, enter
    the same password in the  >Con4rm@ text box. Passwords can be set independently for authentication and
    encryption algorithms.
    [ContextName1@/[ContextName2@/[ContextName3@
    Enter up to 32 alphanumeric characters for the context name. Up to three context names can be registered.
    7SpecifyPrinterManagementInformationAcquisitionSettings.Network
    389 
    						
    								With SNMP, the printer management information, such as printing protocols and printer ports, can be
    monitored and obtained regularly from a computer on the network.
    [AcquirePrinterManagementInformationfromHost@
    Select the check box to enable monitoring of the printer management information of the machine via SNMP.
    To disable monitoring of the printer management information, clear the check box.
    8Click[[email protected]SNMPv1
    	 Some of the functions of the machine become unavailable, such as obtaining machine information via the
    printer driver.
    Usingtheoperationpanel 	 You can also specify SNMPv1 settings and enable/disable SNMPv3 settings from the  in the 
    screen. 
    SNMPSettings(P.480)
    EnablingBothSNMPv1andSNMPv3	 If both versions of SNMP are enabled, it is recommended that MIB access permission in SNMPv1 be set to
    [Read Only]. MIB access permission can be set independently in SNMPv1 and SNMPv3 (and for each user in SNMPv3). Selecting [Read/Write] (full access permission) in SNMPv1 negates the robust security featuresthat characterize SNMPv3 because most of the machine settings can then be controlled with SNMPv1.
    LINKS
    EnablingTLSEncryptedCommunicationfortheRemoteUI(P.426)
    Network
    390       
    						
    							Security
    Security................................................................................................................................................................  392
    ProtectingtheMachinefromUnauthorizedAccess .......................................................................................  393
    Preventing Unauthorized Access  ..................................................................................................................  394
    Setting Access Privileges  ..............................................................................................................................  396
    Setting the System Manager PIN  ...........................................................................................................  397
    Setting a Remote UI PIN  ........................................................................................................................  399
    Restricting Communication by Using Firewalls  .............................................................................................  401
    Specifying IP Addresses for Firewall Rules  .............................................................................................  402
    Specifying MAC Addresses for Firewall Rules  .........................................................................................  406
    Changing Port Numbers  ............................................................................................................................... 409
    Setting a Proxy  .............................................................................................................................................  411
    RestrictingtheMachine'sFunctions ................................................................................................................  413
    Restricting Access to Address Book and Sending Functions  .........................................................................  414
    Setting a PIN for Address Book  ..............................................................................................................  415
    Limiting Available Destinations  ..............................................................................................................  417
    Prohibiting PC Faxing  ............................................................................................................................  418
    Disabling Use of Previously Used Destinations  ......................................................................................  419
    Checking Destinations before Sending Documents  ...............................................................................  420
    Prohibiting Sequential Broadcasting  ...................................................................................................... 422
    Disabling HTTP Communication  ...................................................................................................................  423
    Disabling Remote UI  .....................................................................................................................................  424
    ImplementingRobustSecurityFeatures .........................................................................................................  425
    Enabling TLS Encrypted Communication for the Remote UI  .........................................................................  426
    Con4guring  IEEE 802.1X Authentication  .......................................................................................................  429
    Con4guring  Settings for Key Pairs and Digital  Certi4cates ...........................................................................  434
    Generating Key Pairs  .............................................................................................................................  436
    Using CA-issued Key Pairs and Digital  Certi4cates .................................................................................  443
    Verifying Key Pairs and Digital  Certi4cates ............................................................................................. 446Security
    391 
    						
    							Security
    1469-079
    Con4dential  information is handled by information devices everywhere, including computers and printers, and any of
    these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized
    access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your  con4dential information is leaked. To counter these risks, the machine is equipped
    with a variety of security functions. Set the necessary  con4guration depending on your network environment.
    	You can  con4gure  the best security system by building an environment that inhibits access to printers on
    your in-house network via the Internet and using such environment together with the machine's security
    features. 
    PreventingUnauthorizedAccess(P.394)
    	C Establishing the Basics of Information Security
    ProtectingtheMachinefromUnauthorizedAccess(P.393)
    	C Preparing for Risks from Negligence or Misuse
    RestrictingtheMachine'sFunctions(P.413)
    	C Implementing Robust Security Features
    ImplementingRobustSecurityFeatures(P.425)
    Security
    392             
    						
    All Canon manuals Comments (0)

    Related Manuals for Canon printer imageCLASS MF249dw User Manual