Canon imageRUNNER C3025i User Manual page 745

Hide thumbs Also See for imageRUNNER C3025i:
Table of Contents

Advertisement

Definition of "Weak Encryption"
When <Prohibit Use of Weak Encrypt.> is set to <On>, the use of the following algorithms are prohibited.
Hash:
HMAC:
Common key
cryptosystem:
Public key
cryptosystem:
Even when <Prohibit Weak Encryp. Key/Cert.> is set to <On>, the hash algorithm SHA-1, which is used for
signing a root certificate, can be used.
Log Management
The following types of logs can be managed on the machine. Collected logs can be exported in the CSV file format.
Log Type
Job Log
Transmission Log
Import/Export of the Setting Data
See
Setting Menu List(P. 449) .
Appendix
MD4, MD5, SHA-1
HMAC-MD5
RC2, RC4, DES
RSA encryption (512 bits/1024 bits), RSA signature (512 bits/1024 bits), DSA (512 bits/1024
bits), DH (512 bits/1024 bits)
Number Indicated as "Log
Type" in the CSV File
128
128
736
Description
This log contains information related to the completion of
copy/fax/scan/send/print jobs.
The log contains information related to transmissions.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Imagerunner c3025

Table of Contents