User Manual

Table Of Contents
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 346
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 347
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 349
Configure Your Machine for an Enterprise Wireless Network .......................................................... 351
Use Wi-Fi Direct
®
............................................................................................................................. 353
Advanced Network Features...................................................................................................................... 362
Print the Network Configuration Report............................................................................................ 363
Fax Using the Internet (I-Fax) .......................................................................................................... 364
Configure and Operate LDAP Search .............................................................................................. 383
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 386
Technical Information for Advanced Users................................................................................................. 389
Reset the Network Settings to Factory Default ................................................................................ 390
Print the WLAN Report..................................................................................................................... 391
Security .............................................................................................................................................. 394
Before Using Network Security Features ................................................................................................... 395
Secure Function Lock 3.0 .......................................................................................................................... 396
Before Using Secure Function Lock 3.0........................................................................................... 397
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 398
Scan Using Secure Function Lock 3.0 ............................................................................................. 399
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 400
Additional Secure Function Lock 3.0 Features................................................................................. 401
Register a new IC Card Using Machine's Control Panel .................................................................. 402
Register an External IC Card Reader............................................................................................... 403
Use Active Directory Authentication........................................................................................................... 404
Introduction to Active Directory Authentication................................................................................. 405
Configure Active Directory Authentication Using Web Based Management .................................... 406
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication) ................................................................................................................................. 407
Use LDAP Authentication........................................................................................................................... 408
Introduction to LDAP Authentication ................................................................................................ 409
Configure LDAP Authentication Using Web Based Management.................................................... 410
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication) ................................................................................................................................. 411
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 412
Certificates and Web Based Management....................................................................................... 413
Manage Your Network Machine Securely Using IPsec .............................................................................. 435
Introduction to IPsec......................................................................................................................... 436
Configure IPsec Using Web Based Management ............................................................................ 437
Configure an IPsec Address Template Using Web Based Management ......................................... 438
Configure an IPsec Template Using Web Based Management ....................................................... 440
Send an Email Securely............................................................................................................................. 449
Configure Email Sending Using Web Based Management.............................................................. 450
Send an Email with User Authentication .......................................................................................... 451
Send an Email Securely Using SSL/TLS ......................................................................................... 452
Send or Receive an Email Securely........................................................................................................... 453
Configure Email Sending or Receiving Using Web Based Management......................................... 454
Home > Table of Contents
iv