Canon Pixma Mg2924 User Guide
Here you can view all the pages of manual Canon Pixma Mg2924 User Guide. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 241
1. Skip Completes the setup without mapping a network drive to the card slot. 2. Retry Returns to Network Setup of the Card Slot screen and re-executes the network drive mapping. 3. Cancel Cancels the card slot setup. When IJ Network Tool is running over LAN, the Cancel button is displayed grayed out and cannot be clicked. 241
Page 242
Associate Port ScreenAllows you to associate a created port with a printer driver. Select the printer for which you want to change the association, then click OK. Note • You cannot print with the printer unless the printer driver is associated with the port. 1. Model: Displays the name of device specified as a destination port.It is blank if the name of device is not detected. 2. Printer: Displays the printer driver installed in the computer. Select the printer for which you want to change the...
Page 243
Network Information ScreenDisplay the network information that is set for the printers and the computers. To display the Network Information screen, select Network Information from the View menu.1. OK Returns to the Canon IJ Network Tool screen. 2. Copy All Information All network information displayed is copied to the clipboard. 243
Page 244
Appendix for Network Communication Using the Card Slot over a Network When the Printer Driver Is Not Associated with a Port About Technical Terms Restrictions About Firewall 244
Page 245
Using the Card Slot over a Network Note • This screen is not available depending on the printer you are using. Mounting the Card Slot as the Network Drive Restrictions on Card Slot Use over a NetworkMounting the Card Slot as the Network DriveThe card slot must be mounted to use it over a network.To mount the card slot as the network drive, follow the procedure below. 1. Insert a memory card into the card slot of the machine. 2. Start up IJ Network Tool. 3. Select the machine in Printers:. 4. Select...
Page 246
7.Make sure that the card slot is mounted. When the card slot is mounted, the following icon appears on Computer (or My Computer ). Restrictions on Card Slot Use over a Network • The card slot can be shared by multiple computers, if the machine is connected to a network. Multiple computers can read files from a memory card in the card slot at the same time. However, while one computer is writing a file into a memory card, other computers cannot access the same file. • If your computer joins a domain,...
Page 247
When the Printer Driver Is Not Associated with a PortIf No Driver is displayed for the printer's name on the Canon IJ Network Tool screen, the printer driver is not associated with a created port. To associate a port with a printer driver, follow the procedure below.1. Start up IJ Network Tool. 2. Select the printer displayed as No Driver on Name . 3. Select Associate Port... on the Settings menu. The Associate Port screen is displayed. 4. Select a printer to associate with a port. The list...
Page 248
About Technical TermsIn this section, technical terms used in the manual are explained. A B C D F I K L M O P R S T U W A • Access Point A wireless transceiver or base station that receives information from wireless clients/the machine and rebroadcasts it. Required in an infrastructure network. • Access point mode The machine is used as an access point to connect external wireless communication devices (e.g. computers, smartphones, or tablets) in an environment where no access point or wireless LAN...
Page 249
•Authentication Method The method that an access point uses to authenticate a printer through a wireless LAN. The methods are agreeable each other. When using WEP as an encryption method, the authentication method is able to fix to Open System or Shared Key . For WPA/WPA2, authentication method is PSK.◦ Auto The printer automatically changes its authentication method to match the access point. ◦ Open System In this authentication method, the communication partner is authenticated without using WEP key...
Page 250
F• Firewall It is a system that prevents an unlawful computer access in the network. To prevent, you can use the firewall function of a broadband router, the security software installed in the computer, or operation system for computer. I • IEEE 802.11b International standard for wireless LAN using the 2.4 GHz frequency range with a throughput of up to 11 Mbps. • IEEE 802.11g International standard for wireless LAN using the 2.4 GHz frequency range with a throughput of up to 54 Mbps. Compatible with...