[. . . ] 5250-000 The content described in this chapter is for the prevention of damage to property and injury to users of the machine and others. Before using this machine, read this chapter and follow the instructions to properly use this machine. Canon will not be responsible for any damages resulting from use not described in this manual, improper use, or repair/changes not performed by Canon or a third party authorized by Canon. 5250-001 To use this machine safely and comfortably, carefully read the following precautions and install the machine in an appropriate location. [. . . ] To enhance security, your Network Administrator may change the port numbers. When a port number has been changed, the new number must be shared with the communicating devices, such as computers and servers. Specify the port number settings depending on the network environment. Learning more about the protocols <LPD>/<RAW>/<WSD Multicast Discovery> Configuring Printing Protocols and WSD Functions(P. 187) <SNMP> Monitoring and Controlling the Machine with SNMP(P. 74) <Multicast Discovery> Monitoring the Machine from the Device Management Systems(P. 5250-04C A proxy (or HTTP proxy server) refers to a computer or software that carries out HTTP communication for other devices, especially when communicating with resources outside the network, such as when browsing Web sites. The client devices connect to the outside network through the proxy server, and do not communicate directly to the resources outside. Setting a proxy not only facilitates management of traffic between in-house and outside networks but also blocks unauthorized access and consolidates anti-virus protection for enhanced security. When you use Google Cloud Print to print over the Internet, you can enhance security by setting a proxy. When setting a proxy, make sure that you have the necessary proxy information, including the IP address, port number, and a user name and password for authentication. For more information about the basic operations to be performed when setting the machine from the Remote UI, see Setting Up Menu Options from Remote UI(P. [Use Proxy] Select the check box to use the specified proxy server when communicating with an HTTP server. [Use Proxy within Same Domain] Select the check box to also use the specified proxy server for communication with devices in the same domain. [Use Proxy Authentication] To enable authentication by the proxy server, select the check box and enter alphanumeric characters for the user name in the [User Name] text box. [Set/Change Password] To set or change the password for the proxy authentication, when it is enabled, select the check box and enter alphanumeric characters for the new password in the [Password] text box. Configuring the Key and Certificate for TLS 5250-04E You can encrypt communication between the machine and a Web browser on the computer by using Transport Layer Security (TLS). TLS is a mechanism for encrypting data sent or received over the network. TLS must be enabled when the Remote UI is used for specifying settings for IPSec (Pre-Shared Key Method), IEEE 802. To use TLS encrypted communication for the Remote UI, you need to specify a "key and certificate" (server certificate) you want to use before enabling TLS. Generate or install the key and certificate for TLS before enabling TLS ( Management Functions(P. For more information about the basic operations to be performed when setting the machine from the Remote UI, see Setting Up Menu Options from Remote UI(P. [. . . ] Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of ScienceLogic, LLC nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. [. . . ]