Basic Function; Security Restrictions; Ip Address Setting Order - Canon C1030 Service Manual

Color imagerunner
Hide thumbs Also See for C1030:
Table of Contents

Advertisement

2.1 Basic Function

2.1.1 Security restrictions

Following items are not supported.
Function
APOP
One of POP3 authentication exchange functions
APOP (Authenticated Post Office Protocol) is a function to encrypt password.
For the usage, a mail server should support this protocol.
This function is not supported.
IMAP-AUTH
One of POP3 authentication exchange functions
IMAP (Internet Message Access Protocol)-AUTH exchanges authenticated character strings of IMAP4 on POP3 using AUTH command and
protects user information, such as password, from network eavesdroppers.
For the usage, a mail server should support this protocol.
This function is not supported.
S/MIME
This performs security communication using S/MIME (Secure Multipurpose Internet Mail Extensions). It encrypts mail data with public key
and decodes them with secret key.
This function is not supported.
Digital ID:
Digital ID is a method to check if e-mail data sent is not falsified.
This function is not supported.
Firewall:
This is to set firewall in FTP transmission.
This function is not supported.

2.1.2 IP address setting order

Following is described on condition that each protocol is set to on.

IP address setting order

- At startup, if [DHCP/BOOTP] in user data is set to on, it enables a user to obtain IP Address.
- At startup, if [RARP] in user data is set to on, it enables a user to obtain IP Address.
- If automatic obtainment of IP Address fails, a network works with the IP Address specified at [IP Address] in user data.
- At startup, if [Automatic address obtainment] in user data is set to off, a network works with the data specified at [IP Address], [Subnet Mask], [Default Gateway],
or [DNS Server] in user data.
- If automatic obtainment of IP Address fails or if IP Address specified at [IP Address] in user data is 0.0.0.0, IP Address can be set by either ARP method or Canon
Configuration Protocol V3 method. If data of [Network setting] in user data are changed, the change becomes effective after the power is turned off and on.
List of available protocols
Hierarchy
Network layer
Transport layer
Protocol
Protocol
ARP
Address Resolution Protocol
RARP
Reverse Address Resolution Protocol
IP
Internet Protocol
ICMP
Internet Control Message Protocol
TCP
Transmission Control Protocol
UDP
User Datagram Protocol
T-2-1
Details
T-2-2
Outline
This is used to obtain MAC address of device from IP address
This is used to obtain IP address of device from MAC address.
This is a number (no overlaps) to identify own device or other device on the
network.
This is used to return error to the source when IP transmission trouble
occurs.
This is used to reply to ping command or others.
This is a connection type protocol on the IP.
A system to check transmitted data is incorporated.
This is a connection-less type protocol on the IP.
This is lower in credibility compared with TCP, but is used in DHCP or
SNMP, as the processing uses less memory.
Chapter 2
0025-9523
0025-9524
2-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

C1030if

Table of Contents