Configuring The Network Security Settings - Canon MF269dw User Manual

Hide thumbs Also See for MF269dw:
Table of Contents

Advertisement

Configuring the Network Security Settings

Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing,
and tampering of data as it flows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
Firewall Settings
Unauthorized access by third parties, as well as network attacks and intrusions, can be blocked by limiting
communication only to devices that have a specific IP address or MAC address.
by Using Firewalls(P. 298)
Changing Port Numbers
A protocol that is used to exchange information with other devices is assigned port numbers that are
predetermined according to the type of protocol. The port number must be the same for all communication
devices; therefore, changing it to an arbitrary number is important to prevent hacking from outside.
Changing Port Numbers(P. 304)
Proxy Settings
When the client devices are connected to an external network, communication is established through the proxy
server. When the proxy server is used, websites can be browsed more safely, therefore, security can be
expected to be enhanced.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
browser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI.
Managing the Machine
Setting a Proxy(P. 305)
Configuring the Key and Certificate for TLS(P. 307)
296
2KUS-064
Restricting Communication

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mf264dwMf267dw

Table of Contents