Canon I Sensys Lbp6230dw User Guide
Here you can view all the pages of manual Canon I Sensys Lbp6230dw User Guide. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 111
Click [Edit]. Specify SNMPv1 settings. If you do not need to change SNMPv1 settings, proceed to the next step. [Use SNMPv1] Select the check box to enable SNMPv1. You can specify the rest of the SNMPv1 settings only when this check box is selected. [Community Name 1]/[Community Name 2] Enter up to 32 alphanumeric characters for the name of the community. [MIB Access Permission 1]/[MIB Access Permission 2] For each community, select [Read/Write] or [Read Only] for the...
Page 112
[Read Only] Allows the Dedicated Community to only view MIB objects. Specify SNMPv3 settings. If you do not need to change SNMPv3 settings, proceed to the next step. [Use SNMPv3] Select the check box to enable SNMPv3. You can specify the rest of the SNMPv3 settings only when this check box is selected. [Enable User] Select the check box to enable [User Settings 1]/[User Settings 2]/[User Settings 3]. To disable user settings, clear the corresponding check box. [User Name]...
Page 113
[Acquire Printer Management Information from Host] Select the check box to enable monitoring of the printer management information of the machine via SNMP. To disable monitoring of the printer management information, clear the check box. Click [OK]. Restart the machine. Turn OFF the machine, wait for at least 10 seconds, and turn it back ON. Disabling both SNMPv1 and SNMPv3 If both versions of SNMP are disabled, some of the functions of the machine become unavailable,...
Page 114
0JFC -029 Configuring SLP Communication with imageWARE You can use device management software such as imageWARE Enterprise Management Console to facilitate the collection and management of various information about networked devices. In an environment where such software is installed, information about device settings and errors is collected via a server on the network. If the machine is connected to an imageWARE network, image WARE searches the network for the machine by...
Page 115
Select the [Respond to Discovery] check box and enter the required information. [Respond to Discovery] Select the check box to set the machine to respond to imageWARE multicast discovery packets and enable management by imageWARE. If you do not want to respond, clear the check box. [Scope Name] To include the machine in a specific scope, enter up to 32 alphanumeric characters for the scope name. Click [OK]. Restart the machine. Turn OFF the machine, wait for at least 10...
Page 116
0JFC -02A Security Confidential information is handled by information devices everywhere, including computers and printers, and any of these devices may become a target for malicious third parties at any time. Attackers may directly gain unauthorized access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your confidential information is leaked. To counter these risks, this machine is equipped with a variety...
Page 117
0JFC -02C Protecting the Machine from Unauthorized Access To prevent unauthorized third parties from accessing and using the machine, you can implement multiple security measures, such as setting system manager passwords, using firewalls, and changing port numbers. >Ý>Ý>ã>Ì>Û>Ì>Þ>à>Ü
Page 118
0JFC -02E Setting System Manager Passwords Administrator access rights are required to change machine settings from the Remote UI. After logging in as an administrator, use the following procedure to set the PIN (system manager password). The system manager password is critical to the security of the machine. Make sure that only system managers know the system manager password. Start the Remote UI and log on in System Manager Mode. Starting the Remote UI Click...
Page 119
[System Manager Name] Enter up to 32 alphanumeric characters for the name of the system manager. [Contact Information] Enter up to 32 alphanumeric characters for the contact information of the system manager. [E- Mail Address] Enter up to 64 alphanumeric characters for the e-mail address of the system manager. [System Manager Comment] Enter up to 32 alphanumeric characters for a comment about the system manager. >Ý>Ý>å>Ì>Û>Ì>Þ>à>Ü
Page 120
0JFC -02F Restricting Communication by Using Firewalls Without proper security, unauthorized third parties can access computers and other communication devices that are connected to a network. To prevent these unauthorized accesses, specify the settings for packet filter, a feature that restricts communication to devices with specified IP addresses or MAC addresses. >Ý>Þ>Ü>Ì>Û>Ì>Þ>à>Ü