Canon I Sensys Lbp6030b User Guide
Here you can view all the pages of manual Canon I Sensys Lbp6030b User Guide. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 101
0HWJ-02R Security Confidential information is handled by information devices everywhere, including computers and printers, and any of these devices may become a target for malicious third parties at any time. Attackers may directly gain unauthorized access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your confidential information is leaked. To counter these risks, this machine is equipped with a variety...
Page 102
0HWJ-02S Protecting the Machine from Unauthorized Access To prevent unauthorized third parties from accessing and using the machine, you can implement multiple security measures, such as setting system manager passwords, using firewalls, and changing port numbers. >Ý>Ü>Þ>Ì>Û>Ì>Þ>Ý>å
Page 103
0HWJ-02U Setting System Manager Passwords Administrator access rights are required to change machine settings from the Remote UI. After logging in as an administrator, use the following procedure to set the PIN (system manager password). The system manager password is critical to the security of the machine. Make sure that only system managers know the system manager password. Start the Remote UI and log on in System Manager Mode. Starting the Remote UI Click...
Page 104
[System Manager Name] Enter up to 32 alphanumeric characters for the name of the system manager. [Contact Information] Enter up to 32 alphanumeric characters for the contact information of the system manager. [E- Mail Address] Enter up to 64 alphanumeric characters for the e-mail address of the system manager. [System Manager Comment] Enter up to 32 alphanumeric characters for a comment about the system manager. >Ý>Ü>à>Ì>Û>Ì>Þ>Ý>å
Page 105
0HWJ-02W Restricting Communication by Using Firewalls Without proper security, unauthorized third parties can access computers and other communication devices that are connected to a network. To lower the risk of unauthorized access, you can allow communication with devices having specified IP addresses and r eject communication with other devices. Conversely, you can also reject communication with devices having specified IP addresses and allow communication with other devices. You can...
Page 106
[IPv4 Address: Outbound Filter] Restrict data sent from the machine to a computer by specifying an IPv4 address. [IPv4 Address: Inbound Filter] Restrict data received by the machine from a computer by specifying an IPv4 address. [IPv6 Address: Outbound Filter] Restrict data sent from the machine to a computer by specifying an IPv6 address. [IPv6 Address: Inbound Filter] Restrict data received by the machine from a computer by specifying an IPv6 address. Specify the settings...
Page 107
Enter hexadecimal numbers delimited by ":" (colons) (Example: "fe80::10"). To specify a range of addresses Insert a hyphen ("-") between the addresses (Examples: "192.168.0.10-192.168.0.20" "fe80::10 -fe80::20"). To specify a range of addresses with a prefix Enter an address, followed by a slash ("/") and a number indicating the prefix length (Examples: "192.168.0.32/27" "fe80::1234/64"). When [Reject] is selected for an...
Page 108
0HWJ-02X Changing Port Numbers Ports serve as endpoints for communicating with other devices. Typically, standard port numbers are used for major protocols, but devices that use these port numbers are vulnerable to attacks because these port numbers are well-known. To enhance security, some network administrators prefer to change the port numbers. When a port number has been changed, the new number must be shared between communicating devices, such as computers and servers. If a...
Page 109
[LPD]/[RAW] Change the port used for LPD printing or RAW printing. For details about each protocol, see Configuring Printing Protocols and Web Services . [HTTP] Change the port used by HTTP. HTTP is used for communications over the network, such as when you access the machine via the Remote UI. [SNMP] Change the port used by SNMP. For details about SNMP, see Monitoring and Controlling the Machine with SNMP . [WSD Multicast Discovery] Change the port used for WSD multicast...
Page 110
0HWJ-02Y Enabling SSL Encrypted Communication for the Remote UI Authorized users may incur unanticipated losses from attacks by malicious third parties, such as sniffing, spoofing, and tampering of data as it flows over a network. To protect your valuable data, you can encrypt Remote UI communication between the machine and a Web browser on the computer by using Secure Sockets Layer (SSL). SSL is a mechanism for encrypting data sent or received over the network. SSL must be enabled...