Canon I Sensys Mf8230cn User Guide
Here you can view all the pages of manual Canon I Sensys Mf8230cn User Guide. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 441
0ALJ-0A6 Configuring IEEE 802.1X Authentication The machine can connect to an 802.1X network as a client device. A typical 802.1X network consists of a RADIUS server (authentication server), LAN switch (authenticator), and client devices with authentication software (supplicants). If a device tries to connect to the 802.1X network, the device must go through user authentication in order to prove that the connection is made by an authorized u ser. Authentication information is sent...
Page 442
Click [Edit...]. Select the [Use IEEE 802.1X] check box, enter the login name in the [Login Name] text box, and specify the required settings. [Use IEEE 802.1X] Select the check box to enable IEEE 802.1X authentication. [Login Name] Enter up to 24 alphanumeric characters for a name (EAP identity) that is used for identifying the user. Setting TLS 1Select the [Use TLS] check box and click [Key and Certificate...]. 2Click [Register Default Key] on the right of the key pair you...
Page 443
NOTE: Viewing details of a key pair or certificate You can check the details of the certificate or verify the certificate by clicking the corresponding text link under [Key Name], or the certificate icon. Verifying Key Pairs and Digital Certificates Setting TTLS/PEAP 1Select the [Use TTLS] or [Use PEAP] check box. NOTE: Internal protocol for TTLS You can select MSCHAPv2 or PAP. If you want to use PAP, click the [PAP] radio button. 2Click [Change User Name/Password].To specify a...
Page 444
[ User Name ] Enter up to 24 alphanumeric characters for the user name. [ Change Password] To set or change the password, select the check box and enter up to 24 alphanumeric characters for the new password both in the [Password] and [Confirm] text boxes. Click [OK]. Restart the machine. Turn OFF the machine, wait for at least 10 seconds, and turn it back ON. NOTE You can enable or disable the IEEE 802.1X authentication from .IEEE 802.1X Settings LINKS Configuring...
Page 445
0ALJ-0A7 Configuring Settings for Key Pairs and Digital Certificates In order to encrypt communication with a remote device, an encryption key must be sent and received over an unsecured network beforehand. This problem is solved by public -key cryptography. Public -key cryptography ensures secure communication by protecting important and valuable information from attacks, such as sniffing, spoofing, and tampering of data as it flows over a network. Key Pair A key pair consists of a...
Page 446
0ALJ-0A8 Generating Key Pairs A key pair can be generated with the machine when it is required for encrypted communication via Secure Sockets Layer (SSL). You can use SSL when accessing the machine via the Remote UI. Up to five key pairs can be registered to the machine. Start the Remote UI and log on in System Manager Mode. Starting Remote UI Click [Settings/Registration]. Click [Security Settings] [Key and Certificate Settings]. Click [Generate Key...]. NOTE: Deleting a...
Page 447
[Key Settings][Key Name] Enter up to 24 alphanumeric characters for naming the key pair. Set a name that will be easy for you to find later in a list. [Signature Algorithm] Select the signature algorithm from the drop-down list. [Key Algorithm] RSA is used for generating a key pair. Select the key length from the drop-down list. The larger the number for the key length, the slower the communication. However, the security is tighter. NOTE: [512bit] cannot be selected...
Page 448
0ALJ-0A9 Using CA-issued Key Pairs and Digital Certificates Key pairs and digital certificates can be obtained from a certification authority (CA) for use with the machine. You can store and then register these files by using the Remote UI. Make sure that the key pair and the certificate satisfy the requirements of the machine ( Key and Certificate Requirements ). Up to five key pairs and 10 CA certificates (including the five preinstalled certificates) can be...
Page 449
Disabling or enabling the preinstalled CA certificates Click [Disable] on the right of the preinstalled CA certificate you want to disable. To enable the certificate again, click [Enable] on the right of the certificate. Click [Install...]. NOTE: Deleting a key pair or CA certificate Click [Delete] on the right of the file you want to delete, and then click [OK]. Click [Browse...], specify the file to install, and click [Start Installation]. The key pair or CA certificate is...
Page 450
LINKS Generating Key Pairs Verifying Key Pairs and Digital Certificates Enabling SSL Encrypted Communication for the Remote UI Configuring IPSec Settings Configuring IEEE 802.1X Authentication >à>á>Ü>Ì>Û>Ì>â>ã>â