Handleiding
Je bekijkt pagina 255 van 604

Security
Security ................................................................................................................................................................ 248
Setting the ID and PIN for the Administrator ................................................................................................. 249
Authenticating Users and Managing Groups .................................................................................................. 251
Authenticating Users and Managing Groups with Department ID (Department ID Management) ............... 252
Registering a Department ID and PIN ................................................................................................... 254
Enabling Department ID Management .................................................................................................. 256
Setting the Department ID and PIN on a Computer ............................................................................... 257
Conrming Usage by Department ID ..................................................................................................... 259
Protecting the Network .................................................................................................................................... 260
Setting the Firewall ....................................................................................................................................... 261
Changing the Port Number .......................................................................................................................... 264
Using a Proxy ............................................................................................................................................... 265
Using TLS ...................................................................................................................................................... 267
Using IPSec ................................................................................................................................................... 269
Using IEEE 802.1X ......................................................................................................................................... 273
Managing and Verifying a Key and Certicate .............................................................................................. 275
Generating a Key and Certicate ........................................................................................................... 276
Generating a Key and Certicate Signing Request (CSR) and Obtaining and Registering a Certicate ... 278
Generating a Key and Obtaining and Registering a Certicate from an SCEP Server ............................. 281
If an Error Is Displayed in the Certicate Issuance Request Status .................................................. 286
Registering a Key and Certicate or CA Certicate Obtained from an Issuing Authority ........................ 288
Verifying a Received Certicate with OCSP ............................................................................................. 290
Preventing Leaking Information ...................................................................................................................... 291
Restricting Use of Memory Media ................................................................................................................. 292
Restricting Use from a Mobile Device ........................................................................................................... 294
Restricting Printing ....................................................................................................................................... 295
Restricting Printing from a Computer to Secure Print ............................................................................ 296
Preventing Unauthorized Use .......................................................................................................................... 297
Restricting Use of Remote UI ........................................................................................................................ 298
Preventing Connection to Computer via USB Port ........................................................................................ 301
Conguring LPD, RAW, or WSD ..................................................................................................................... 302
Disabling HTTP Communication ................................................................................................................... 304
Restricting Use of the Control Panel (Black and White LCD Model) ............................................................... 305
Applying a Security Policy ................................................................................................................................. 306
Security Policy Items ..................................................................................................................................... 308
Security
247
Bekijk gratis de handleiding van Canon imageCLASS LBP246dw II, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
| Merk | Canon |
| Model | imageCLASS LBP246dw II |
| Categorie | Printer |
| Taal | Nederlands |
| Grootte | 55888 MB |







