Handleiding
Je bekijkt pagina 6 van 704

Using a Dedicated Application to Print and Scan (Canon PRINT Business) ................................................................ 316
Using AirPrint Application to Print and Scan Data and Send Faxes ........................................................................... 317
Printing from an Andr
oid Device ............................................................................................................................ 321
Printing from Chromebook or Other Device with Chrome OS .................................................................................. 323
Security .............................................................................................................................................................. 326
Setting the Department ID and PIN for the Administrator ...................................................................................... 327
Authenticating Users and Managing Groups .......................................................................................................... 329
Authenticating Users and Managing Groups with Department ID (Department ID Management) ............................... 330
Registering a Department ID and PIN ........................................................................................................... 332
Enabling Department ID Management .......................................................................................................... 334
Setting the Department ID and PIN on a Computer ........................................................................................ 335
Conrming Usage by Department ID ............................................................................................................ 338
Performing User Authentication with an LDAP Server When Sending or Saving Data ................................................. 339
Protecting the Network ........................................................................................................................................ 342
Setting the Firewall ........................................................................................................................................... 343
Changing the Port Number ................................................................................................................................ 346
Using a Proxy ................................................................................................................................................... 347
Using TLS ........................................................................................................................................................ 349
Using IPSec ...................................................................................................................................................... 351
Using IEEE 802.1X ............................................................................................................................................. 355
Managing and Verifying a Key and Certicate ...................................................................................................... 357
Generating a Key and Certicate .................................................................................................................. 358
Generating a Key and Certicate Signing Request (CSR) and Obtaining and Registering a Certicate .................... 360
Generating a Key and Obtaining and Registering a Certicate from an SCEP Server ............................................ 363
If an Error Is Displayed in the Certicate Issuance Request Status .............................................................. 368
Registering a Key and Certicate or CA Certicate Obtained from an Issuing Authority ....................................... 370
Verifying a Received Certicate with OCSP ..................................................................................................... 372
Preventing Sending Data by Mistake and Leaking Information ............................................................................... 373
Limiting Available Destinations ........................................................................................................................... 374
Conrming the Destination before Sending ......................................................................................................... 376
Restricting Fax Sending ..................................................................................................................................... 378
Restricting Use from a Mobile Device .................................................................................................................. 380
Restricting Printing ........................................................................................................................................... 381
Restricting Printing from a Computer to Secure Print ...................................................................................... 382
Saving Received Documents in the Machine (Memory Lock) ............................................................................. 383
Preventing Unauthorized Use ................................................................................................................................ 386
Restricting Address Book Registration and Editing ................................................................................................ 387
Restricting Use of Remote UI ............................................................................................................................. 389
Preventing Connection to Computer via USB Port ................................................................................................. 391
Conguring LPD, RAW, or WSD ........................................................................................................................... 392
Disabling HTTP Communication ......................................................................................................................... 394
Applying a Security Policy ...................................................................................................................................... 395
Security Policy Items ......................................................................................................................................... 397
V
Bekijk gratis de handleiding van Canon imageRUNNER 2224N, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
| Merk | Canon |
| Model | imageRUNNER 2224N |
| Categorie | Printer |
| Taal | Nederlands |
| Grootte | 68244 MB |







