Canon printer imageCLASS MF249dw User Manual
Have a look at the manual Canon printer imageCLASS MF249dw User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
4Click[[email protected]therequiredsettingsandclick[OK@. [NetBIOSName@Enter up to 15 alphanumeric characters for the NetBIOS name of the machine. [WorkgroupName@Enter up to 15 alphanumeric characters for the name of the workgroup that the machine belongs to. Network 383
Con4gurLngSNTP 1469-077 Simple Network Time Protocol (SNTP) enables you to adjust the system clock by using the time server on the network. The protocol is typically used for synchronizingthe machine and a server. The time is adjusted based on Coordinated Universal Time (UTC), so specify the time zone setting before con4guring SNTP ( Date/Time Settings(P.490) ). SNTP settings can be speci4ed via the Remote UI. The SNTP of the machine supports both NTP (version 3) and SNTP (versions 3 and 4) servers. 1StarttheRemoteUIandlogoninSystemManagerMode.StartingRemote UI(P.450)2Click[Settings/[email protected][NetworkSettings@[TCP/IP[email protected] 384
4Click[Edit@in[SNTP[email protected]the[UseSNTP@checkboxandspecifytherequiredsettings. [UseSNTP@ Select the check box to use SNTP for synchronization. If you do not want to use SNTP, clear the check box. [NTPServerName@Enter the IP address of the NTP or the SNTP server. If DNS is available on the network, you can enter a host name (or FQDN) of up to 255 alphanumeric characters instead (example: ntp.example.com). [PollingInterval@ Specify the interval between one synchronization and the next. Specify an interval from 1 to 48 hours. 6Click[[email protected]communicationwiththeNTP/SNTPserver You can view communication status with the registered server by clicking [Settings/Registration] [Network Settings] [TCP/IP Settings] and then clicking [Check NTP Server] in [SNTP Settings] that appears. If a proper connection has been established, the result is displayed as shown below. Note that this operation does not adjust the system clock. Network 385
MonitoringandControllingtheMachinewithSNMP 1469-078 Simple Network Management Protocol (SNMP) is a protocol for monitoring and controlling communication devices in a network by using Management Information Base (MIB). The machine supports SNMPv1 and security-enhanced SNMPv3. You can check the status of the machine from a computer when you print documents or use the Remote UI. You can enable either SNMPv1 or SNMPv3, or both at the same time. Specify the settings for each version to suit your network environment and the purpose of use. SNMPv1 SNMPv1 uses information called "community" to de4ne the scope of SNMP communication. Because this information is exposed to the network in plain text, your network will be vulnerable to attacks. If you want to ensure network security, disable SNMPv1 and use SNMPv3. SNMPv3 With SNMPv3, you can implement network device management that is protected by robust security features.Note that TLS must be enabled for the Remote UI before con4guring SNMPv3 ( EnablingTLSEncrypted CommunicationfortheRemoteUI(P.426) ). The machine does not support the trap noti4cation feature of SNMP. To change the port number of SNMP, see ChangingPortNumbers(P.409) . SNMP management software, when installed on a computer on the network, enables you to con4gure, monitor, and control the machine remotely from the computer. For more information, see the instruction manuals for your management software.1StarttheRemoteUIandlogoninSystemManagermode.StartingRemote UI(P.450)2Click[Settings/[email protected] 386
3Click[NetworkSettings@[SNMP[email protected][[email protected]SNMPv1settings. If you do not need to change SNMPv1 settings, proceed to the next step. Network 387
[UseSNMPv1@Select the check box to enable SNMPv1. You can specify the rest of SNMPv1 settings only when this check box is selected. [UseCommunityName1@/[UseCommunityName2@ Select the check box to specify a community name. If you do not need to specify a community name, clear the check box. [CommunityName@ Enter up to 32 alphanumeric characters for the name of the community. [MIBAccessPermission@ For each community, select [Read/Write] or [Read Only] for the access privileges to MIB objects. [Read/Write]Permits both viewing and changing the values of MIB objects.[Read Only]Permits only viewing the values of MIB objects. [UseDedicatedCommunity@ Dedicated Community is a preset community, intended exclusively for Administrators using Canon software. Select the check box to use Dedicated Community. If you do not need to use Dedicated Community, clear the check box. 6SpecifySNMPv3settings. If you do not need to change SNMPv3 settings, proceed to the next step. Network 388
[UseSNMPv3@ Select the check box to enable SNMPv3. You can specify the rest of SNMPv3 settings only when this check box is selected. [EnableUser@ Select the check box to enable [User Settings 1]/[User Settings 2]/[User Settings 3]. To disable user settings, clear the corresponding check box. [UserName@ Enter up to 32 alphanumeric characters for the user name. [MIBAccessPermission@ Select [Read/Write] or [Read Only] for the access privileges to MIB objects. [Read/Write]Permits both viewing and changing the values of MIB objects.[Read Only]Permits only viewing the values of MIB objects. [SecuritySettings@ Select [Authentication On/Encryption On], [Authentication On/Encryption Off], or [Authentication Off/ Encryption Off] for the desired combination of authentication and encryption settings. [AuthenticationAlgorithm@ If you selected [Authentication On/Encryption On] or [Authentication On/Encryption Off] for [Security Settings], select the algorithm that corresponds to your environment. [EncryptionAlgorithm@ If you selected [Authentication On/Encryption On] for [Security Settings], select the algorithm that corresponds to your environment. [Set/ChangePassword@ To set or change the password, select the check box and enter between 6 and 16 alphanumeric characters for the password in the [Authentication Password] or [Encryption Password] text box. For con4rmation, enter the same password in the >Con4rm@ text box. Passwords can be set independently for authentication and encryption algorithms. [ContextName1@/[ContextName2@/[ContextName3@ Enter up to 32 alphanumeric characters for the context name. Up to three context names can be registered. 7SpecifyPrinterManagementInformationAcquisitionSettings.Network 389
With SNMP, the printer management information, such as printing protocols and printer ports, can be monitored and obtained regularly from a computer on the network. [AcquirePrinterManagementInformationfromHost@ Select the check box to enable monitoring of the printer management information of the machine via SNMP. To disable monitoring of the printer management information, clear the check box. 8Click[[email protected]SNMPv1 Some of the functions of the machine become unavailable, such as obtaining machine information via the printer driver. Usingtheoperationpanel You can also specify SNMPv1 settings and enable/disable SNMPv3 settings from the in the screen. SNMPSettings(P.480) EnablingBothSNMPv1andSNMPv3 If both versions of SNMP are enabled, it is recommended that MIB access permission in SNMPv1 be set to [Read Only]. MIB access permission can be set independently in SNMPv1 and SNMPv3 (and for each user in SNMPv3). Selecting [Read/Write] (full access permission) in SNMPv1 negates the robust security featuresthat characterize SNMPv3 because most of the machine settings can then be controlled with SNMPv1. LINKS EnablingTLSEncryptedCommunicationfortheRemoteUI(P.426) Network 390
Security Security................................................................................................................................................................ 392 ProtectingtheMachinefromUnauthorizedAccess ....................................................................................... 393 Preventing Unauthorized Access .................................................................................................................. 394 Setting Access Privileges .............................................................................................................................. 396 Setting the System Manager PIN ........................................................................................................... 397 Setting a Remote UI PIN ........................................................................................................................ 399 Restricting Communication by Using Firewalls ............................................................................................. 401 Specifying IP Addresses for Firewall Rules ............................................................................................. 402 Specifying MAC Addresses for Firewall Rules ......................................................................................... 406 Changing Port Numbers ............................................................................................................................... 409 Setting a Proxy ............................................................................................................................................. 411 RestrictingtheMachine'sFunctions ................................................................................................................ 413 Restricting Access to Address Book and Sending Functions ......................................................................... 414 Setting a PIN for Address Book .............................................................................................................. 415 Limiting Available Destinations .............................................................................................................. 417 Prohibiting PC Faxing ............................................................................................................................ 418 Disabling Use of Previously Used Destinations ...................................................................................... 419 Checking Destinations before Sending Documents ............................................................................... 420 Prohibiting Sequential Broadcasting ...................................................................................................... 422 Disabling HTTP Communication ................................................................................................................... 423 Disabling Remote UI ..................................................................................................................................... 424 ImplementingRobustSecurityFeatures ......................................................................................................... 425 Enabling TLS Encrypted Communication for the Remote UI ......................................................................... 426 Con4guring IEEE 802.1X Authentication ....................................................................................................... 429 Con4guring Settings for Key Pairs and Digital Certi4cates ........................................................................... 434 Generating Key Pairs ............................................................................................................................. 436 Using CA-issued Key Pairs and Digital Certi4cates ................................................................................. 443 Verifying Key Pairs and Digital Certi4cates ............................................................................................. 446Security 391
Security 1469-079 Con4dential information is handled by information devices everywhere, including computers and printers, and any of these devices may become a target for malicious third parties at anytime. Attackers may directly gain unauthorized access to your devices, or indirectly take advantage of negligence or improper use. Either way, you may incur unanticipated losses when your con4dential information is leaked. To counter these risks, the machine is equipped with a variety of security functions. Set the necessary con4guration depending on your network environment. You can con4gure the best security system by building an environment that inhibits access to printers on your in-house network via the Internet and using such environment together with the machine's security features. PreventingUnauthorizedAccess(P.394) C Establishing the Basics of Information Security ProtectingtheMachinefromUnauthorizedAccess(P.393) C Preparing for Risks from Negligence or Misuse RestrictingtheMachine'sFunctions(P.413) C Implementing Robust Security Features ImplementingRobustSecurityFeatures(P.425) Security 392