Configuring The Network Security Settings - Canon imagerunner advance C5550i User Manual

Hide thumbs Also See for imagerunner advance C5550i:
Table of Contents

Advertisement

Configuring the Network Security Settings

Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing,
and tampering of data as it flows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
Firewall Settings
Unauthorized access by third parties, as well as network attacks and breaches, can be blocked by only allowing
communication with devices that have a specific IP address.
Firewalls(P. 596)
Proxy Settings
You can provide greater security by using a proxy server for connections outside the network, such as when
browsing websites.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when accessing the machine in a
variety of situations, such as when using the Remote UI or distributing device information.
Key and Certificate for TLS(P. 604)
IPSec Communication
While TLS only encrypts data used on a specific application, such as a Web browser or an e-mail application,
IPSec encrypts the whole (or payloads of) IP packets. This enables IPSec to offer a more versatile security system
than TLS.
Configuring the IPSec Settings(P. 608)
Managing the Machine
Setting a Proxy(P. 602)
Restricting Communication by Using
594
13WK-0AW
Configuring the

Advertisement

Table of Contents
loading

Table of Contents