Canon printer imageCLASS MF249dw User Manual
Here you can view all the pages of manual Canon printer imageCLASS MF249dw User Manual. The Canon manuals for Printer are available online for free. You can easily download all the documents as PDF.
Page 391
4Click[[email protected]therequiredsettingsandclick[OK@. [NetBIOSName@Enter up to 15 alphanumeric characters for the NetBIOS name of the machine. [WorkgroupName@Enter up to 15 alphanumeric characters for the name of the workgroup that the machine belongs to. Network 383
Page 392
Con4gurLngSNTP 1469-077 Simple Network Time Protocol (SNTP) enables you to adjust the system clock by using the time server on the network. The protocol is typically used for synchronizingthe machine and a server. The time is adjusted based on Coordinated Universal Time (UTC), so specify the time zone setting before con4guring SNTP ( Date/Time Settings(P.490) ). SNTP settings can be speci4ed via the Remote UI. The SNTP of the machine supports both NTP (version 3) and SNTP (versions 3 and 4)...
Page 393
4Click[Edit@in[SNTP[email protected]the[UseSNTP@checkboxandspecifytherequiredsettings. [UseSNTP@ Select the check box to use SNTP for synchronization. If you do not want to use SNTP, clear the check box. [NTPServerName@Enter the IP address of the NTP or the SNTP server. If DNS is available on the network, you can enter a host name (or FQDN) of up to 255 alphanumeric characters instead (example: ntp.example.com). [PollingInterval@ Specify the interval between one synchronization and the...
Page 394
MonitoringandControllingtheMachinewithSNMP 1469-078 Simple Network Management Protocol (SNMP) is a protocol for monitoring and controlling communication devices in a network by using Management Information Base (MIB). The machine supports SNMPv1 and security-enhanced SNMPv3. You can check the status of the machine from a computer when you print documents or use the Remote UI. You can enable either SNMPv1 or SNMPv3, or both at the same time. Specify the settings for each version to suit your network...
Page 395
3Click[NetworkSettings@[SNMP[email protected][[email protected]SNMPv1settings. If you do not need to change SNMPv1 settings, proceed to the next step. Network 387
Page 396
[UseSNMPv1@Select the check box to enable SNMPv1. You can specify the rest of SNMPv1 settings only when this check box is selected. [UseCommunityName1@/[UseCommunityName2@ Select the check box to specify a community name. If you do not need to specify a community name, clear the check box. [CommunityName@ Enter up to 32 alphanumeric characters for the name of the community. [MIBAccessPermission@ For each community, select [Read/Write] or [Read Only] for the access privileges to MIB objects....
Page 397
[UseSNMPv3@ Select the check box to enable SNMPv3. You can specify the rest of SNMPv3 settings only when this check box is selected. [EnableUser@ Select the check box to enable [User Settings 1]/[User Settings 2]/[User Settings 3]. To disable user settings, clear the corresponding check box. [UserName@ Enter up to 32 alphanumeric characters for the user name. [MIBAccessPermission@ Select [Read/Write] or [Read Only] for the access privileges to MIB objects. [Read/Write]Permits both viewing and...
Page 398
With SNMP, the printer management information, such as printing protocols and printer ports, can be monitored and obtained regularly from a computer on the network. [AcquirePrinterManagementInformationfromHost@ Select the check box to enable monitoring of the printer management information of the machine via SNMP. To disable monitoring of the printer management information, clear the check box. 8Click[[email protected]SNMPv1 Some of the functions of the machine become unavailable, such as...
Page 399
Security Security................................................................................................................................................................ 392 ProtectingtheMachinefromUnauthorizedAccess ....................................................................................... 393 Preventing Unauthorized Access .................................................................................................................. 394 Setting Access Privileges...
Page 400
Security 1469-079 Con4dential information is handled by information devices everywhere, including computers and printers, and any of these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your con4dential information is leaked. To counter these risks, the machine is equipped with a variety of security...