Home > Canon > Printer > Canon printer PIXMA MX492 User Manual

Canon printer PIXMA MX492 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Canon printer PIXMA MX492 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1004
    							When using WEP as an encryption method, the authentication method is able to fix to Open System
    or  Shared Key .
    For WPA/WPA2, authentication method is PSK.◦
    Auto
    The printer automatically changes its authentication method to match the wireless router.
    ◦
    Open System
    In this authentication method, the communication partner is authenticated without using WEP key even if  Use WEP  is selected.
    ◦
    Shared Key
    In this authentication method, the communication partner is authenticated using the WEP key that
    was set for encryption.
    B
    •
    Bonjour
    A service built into Mac OS X operating system to detect the connectable devices on a network automatically.
    C
    •
    Channel
    Frequency channel for wireless communication. In the infrastructure mode, the channel is
    automatically adjusted to match that set to the wireless router. This machine supports channels 1 to
    13. (Channels 12 and 13 are not supported depending on the country or region of purchase.) Note
    that the number of channels that can be used for your wireless LAN varies depending on the region or country.
    D
    •
    Default Gateway
    A relay device to connect to another network such as a router or a computer.
    •
    DHCP server functionality
    The router assigns an IP address automatically whenever the printer or the personal computer on a
    network starts up.
    •
    DNS server
    A server that converts device names into IP addresses. When specifying IP addresses manually, specify the addresses of both a primary and a secondary server.
    F
    •
    Firewall
    It is a system that prevents an unlawful computer access in the network. To prevent, you can use the firewall function of a broadband router, the security software installed in the computer, or operation
    system for computer.
    291 
    						
    							I•
    IEEE 802.11b
    International standard for wireless LAN using the 2.4 GHz frequency range with a throughput of up to 11 Mbps.
    •
    IEEE 802.11g
    International standard for wireless LAN using the 2.4 GHz frequency range with a throughput of up to 54 Mbps. Compatible with 802.11b.
    •
    IEEE 802.11n
    International standard for wireless LAN using the 2.4 GHz and 5 GHz frequency ranges. Even when
    using two or more antennas simultaneously or obtaining a bigger transfer rate than before by using
    multiple communication channels at the same time, the transmission speed may be influenced by the
    connected apparatus.
    At the maximum transfer rate of 600 Mbps, it is possible to communicate with multiple computer
    terminals within a dozen or so metre radius.
    Compatible with 802.11b and 802.11g.
    •
    Infrastructure
    Client computer and machine setup where all wireless communications pass through a wireless router.
    •
    IP Address
    A unique number with four parts separated by dots. Every network device that is connected to the Internet has an IP address. Example: 192.168.0.1
    An IP address is usually assigned by a wireless router or a DHCP server of the router automatically.
    •
    IPv4/IPv6
    They are internetwork-layer protocol used on the internet. IPv4 uses 32-bit addresses and IPv6 uses
    128-bit addresses.
    K
    •
    Key Format
    Select either  ASCII or Hex  as the WEP key format. The character that can be used for the WEP key
    differs depending on the selected key formats.
    ◦
    ASCII
    Specify with a 5 or 13-character string that can include alphanumeric and underscore "_" characters. It is case-sensitive.
    ◦
    Hex
    Specify a 10-digit or 26-digit string that can contain hexadecimal (0 to 9, A to F, and a to f).
    •
    Key Length
    Length of the WEP key. Select either 64 bits or 128 bits. Longer key length allows you to set a more complex WEP key.
    292 
    						
    							L•
    Link Quality
    The status of the connection between the wireless router and the printer excluding noise (interference) is indicated with a value from 0 to 100%.
    •
    LPR
    A platform-independent printing protocol used in TCP/IP networks. It does not support bidirectional communication.
    M
    •
    MAC Address
    Also known as the physical address. A unique and permanent hardware identifier that is assigned to network devices by its manufacturer. MAC addresses are 48 bits long and are written as a
    hexadecimal number separated by colons, i.e., 11:22:33:44:55:66.
    O
    •
    Operation Status
    Indicates the status on whether the printer can be used.
    P
    •
    Proxy server
    A server that links a LAN-connected computer to the Internet. When using a proxy server, specify the
    address and the port number of the proxy server.
    •
    PSK
    An encryption method employed by WPA/WPA2.
    R
    •
    Router
    A relay device to connect to another network.
    S
    •
    Signal Strength
    The strength of the signal received by the printer from the wireless router is indicated with a value from 0 to 100%.
    •
    SSID
    Unique label for wireless LAN. It is often represented such as a network name or a wireless router
    name.
    SSID distinguishes one wireless LAN from another to prevent interference.
    293 
    						
    							The printer and all clients on a wireless LAN must use the same SSID in order to communicate witheach other. The SSID can be up to 32 characters long, and is made up of alphanumeric characters.
    The SSID may also be referred to by its network name.•
    Stealth
    In the stealth mode, a wireless router hides itself by not broadcasting its SSID. The client must specify the SSID set to the wireless router to detect it.
    •
    Subnet Mask
    IP address has two components, the network address and the host address. Subnet Mask used to calculate the Subnet Mask address from the IP address. A Subnet Mask is usually assigned by a
    wireless router or a DHCP server of the router automatically.
    Example:
    IP Address: 192.168.127.123
    Subnet Mask: 255.255.255.0
    Subnet Mask Address: 192.168.127.0
    T
    •
    TCP/IP
    Suite of communications protocols used to connect hosts on the Internet or the LAN. This protocol
    allows different terminals to communicate with each other.
    •
    TKIP
    An encryption protocol employed by WPA/WPA2.
    U
    •
    USB
    Serial interface designed to enable you to "hot-swap" devices, i.e., by plugging and unplugging them without turning off the power.
    W
    •
    WCN (Windows Connect Now)
    Users running Windows Vista or later can obtain the setting information directly via wireless network (WCN-NET).
    •
    WEP/WEP Key
    An encryption method employed by IEEE 802.11. Shared security key used to encrypt and decrypt
    data sent over wireless networks. This printer supports key length of 64 bits or 128 bits, key format of
    ASCII code or Hexadecimal, and key number of 1 to 4.
    •
    Wi-Fi
    International association that certifies interoperability of wireless LAN products based on the IEEE
    802.11 specification.
    This machine is a Wi-Fi authorized product.
    294 
    						
    							•Wireless LAN
    A network that, instead of being connected by physical wires, is connected by a wireless technology, such as Wi-Fi.•
    Wireless Router
    A wireless transceiver or base station that receives information from wireless clients/the machine and
    rebroadcasts it. Required in an infrastructure network.
    •
    WPA
    Security framework announced by the Wi-Fi Alliance in October 2002. The security has been strengthened more than WEP.
    ◦
    Authentication
    WPA defines the following authentication methods: PSK that can be used without an authentication server, plus WPA-802.1x that do require an authentication server.
    This machine supports WPA-PSK.
    ◦
    Passphrase
    This encrypted key is used to perform WPA-PSK authentication. The passphrase should be a string of 8 to 63 alphanumeric characters or a 64-digit hexadecimal
    value.
    •
    WPA2
    Security framework released by the Wi-Fi Alliance in September 2004 as a later version of WPA.
    Provides a stronger encryption mechanism through Advanced Encryption Standard (AES).
    ◦
    Authentication
    WPA2 defines the following authentication methods: PSK that can be used without an authentication server, plus WPA2-802.1x that do require an authentication server.
    This machine supports WPA2-PSK.
    ◦
    Passphrase
    This encrypted key is used to perform WPA2-PSK authentication. The passphrase should be a string of 8 to 63 alphanumeric characters or a 64-digit hexadecimal
    value.
    •
    WPS (Wi-Fi Protected Setup)
    WPS is a standard for easy and secure establishment of a wireless network.
    There are 2 primary methods used in the Wi-Fi Protected Setup:
    PIN entry: a mandatory method of setup for all WPS certified devices
    Push button configuration (PBC): an actual push button on the hardware or through a simulated push
    button in the software.
    295 
    						
    							RestrictionsIf you use a printer over the wireless LAN, the printer may recognize nearby wireless systems, you should
    set a network key (WEP or WPA/WPA2) to the wireless router to encrypt wireless transmission. Wireless
    communication with a product that does not comply with the Wi-Fi standard cannot be guaranteed.
    Connecting with too many computers may affect the printer performance, such as printing speed.
    296 
    						
    							About FirewallA firewall is a function of the security software installed in the computer or operation system for computer,
    and is a system that is designed to prevent unauthorized access to a network.
    Precautions When a Firewall Function is Enabled•
    A firewall function may limit communications between a printer and a computer. This may disableprinter setup and communications.
    •
    During the printer setup, you may be prompted to enable or disable communications, depending onthe firewall function of the security software or operation system. If so, choose to enable
    communications.
    •
    When using IJ Network Tool, you may be prompted to enable or disable communications, depending on the firewall function of the security software. If so, choose to enable communications.
    •
    If you cannot set up the printer, temporarily disable the firewall function of the security software oroperation system.
    Important
    •
    If you disabled the firewall function, disconnect your network from the Internet.
    •
    Some applications (like the network configuration software) override firewall settings. Check theapplication's settings beforehand.
    •
    If the printer you use is set to  Get IP address automatically , the IP address changes every time the
    printer connects to the network. This may disable printer setup and communications, depending on the firewall settings. In this case, either change the firewall settings or assign a fixed IP address to the
    printer. An IP address can be set using IJ Network Tool.
    Changing the Settings in the Wireless LAN Sheet
    Changing the Settings in the Wired LAN Sheet
    When assigning a fixed IP address to the printer, you will need to specify an IP address with which the computer can communicate.
    Note
    •
    For the operation system firewall settings or the security software firewall settings, refer to the
    instruction manual of the computer or software, or contact its manufacturer.
    297 
    						
    							Tips for Ensuring Optimal Printing Quality
    Useful Information about Ink
    Key Points to Successful Printing
    Be Sure to Check Paper Settings before Printing
    Be Sure to Set Cassette Paper Information after Loading Paper
    Canceling a Print Job
    Storing Printed Images
    Key to Enjoying Consistent Printing Quality
    Precautions for Safe Transport of the Machine
    298 
    						
    							Useful Information about InkHow is ink used for various purposes other than printing?Ink may be used for purposes other than printing. Ink is not only used for printing, but also for cleaning the
    print head to maintain the optimal printing quality.
    The machine has the function to automatically clean the ink jet nozzles to prevent clogging. In the
    cleaning procedure, used ink for nozzle cleaning is limited to a small amount.
    Does black-and-white printing use color ink? Black-and-white printing may use ink other than black ink depending on the type of printing paper or the
    settings of the printer driver. So, color ink is consumed even when printing in black-and-white.
    299 
    						
    							Key Points to Successful PrintingCheck the machine status before printing!•
    Is the print head OK?
    If a print head nozzle is clogged, print will be faint and papers will be wasted. Print the nozzle check
    pattern to check the print head.
    Maintenance Procedure
    •
    Is the inside of the machine smeared with ink?
    After printing large quantities of paper or performing borderless printing, the area where papers go through may get smeared with ink. Clean the inside of your machine with 
    Bottom Plate Cleaning .
    Check how to load the paper correctly!
    •
    Is the paper loaded in the correct orientation?
    To load paper in the cassette, load paper WITH THE PRINTING SIDE FACING DOWN.
    Loading Paper
    •
    Is the paper curled?
    The curled paper causes paper jam. Flatten the curled paper, then reload it.
    "Load the paper after correcting its curl." in Paper Is Smudged/Printed Surface Is Scratched
    300 
    						
    All Canon manuals Comments (1)

    Related Manuals for Canon printer PIXMA MX492 User Manual