Handleiding
Je bekijkt pagina 203 van 542

Security
Security ................................................................................................................................................................ 196
Setting the ID and PIN for the Administrator ................................................................................................. 197
Authenticating Users and Managing Groups .................................................................................................. 199
Authenticating Users and Managing Groups with Department ID (Department ID Management) ............... 200
Registering a Department ID and PIN ................................................................................................... 202
Enabling Department ID Management .................................................................................................. 204
Setting the Department ID and PIN on a Computer ............................................................................... 205
Conrming Usage by Department ID ..................................................................................................... 208
Protecting the Network .................................................................................................................................... 209
Setting the Firewall ....................................................................................................................................... 210
Changing the Port Number .......................................................................................................................... 213
Using a Proxy ............................................................................................................................................... 214
Using TLS ...................................................................................................................................................... 216
Using IPSec ................................................................................................................................................... 218
Using IEEE 802.1X ......................................................................................................................................... 222
Managing and Verifying a Key and Certicate .............................................................................................. 224
Generating a Key and Certicate ........................................................................................................... 225
Generating a Key and Certicate Signing Request (CSR) and Obtaining and Registering a Certicate ... 227
Generating a Key and Obtaining and Registering a Certicate from an SCEP Server ............................. 230
If an Error Is Displayed in the Certicate Issuance Request Status .................................................. 235
Registering a Key and Certicate or CA Certicate Obtained from an Issuing Authority ........................ 237
Verifying a Received Certicate with OCSP ............................................................................................. 239
Preventing Leaking Information ...................................................................................................................... 240
Restricting Use of Memory Media ................................................................................................................. 241
Restricting Use from a Mobile Device ........................................................................................................... 243
Restricting Printing ....................................................................................................................................... 244
Restricting Printing from a Computer to Secure Print ............................................................................ 245
Preventing Unauthorized Use .......................................................................................................................... 246
Restricting Use of Remote UI ........................................................................................................................ 247
Preventing Connection to Computer via USB Port ........................................................................................ 249
Conguring LPD, RAW, or WSD ..................................................................................................................... 250
Disabling HTTP Communication ................................................................................................................... 252
Restricting Use of the Control Panel ............................................................................................................. 253
Applying a Security Policy ................................................................................................................................. 254
Security Policy Items ..................................................................................................................................... 256
Security
195
Bekijk gratis de handleiding van Canon imageCLASS LBP646Cdw, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
| Merk | Canon |
| Model | imageCLASS LBP646Cdw |
| Categorie | Printer |
| Taal | Nederlands |
| Grootte | 49330 MB |







