User Manual

Table Of Contents
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 348
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 349
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 351
Configure Your Machine for an Enterprise Wireless Network .......................................................... 353
Use Wi-Fi Direct
®
............................................................................................................................. 355
Advanced Network Features...................................................................................................................... 364
Print the Network Configuration Report............................................................................................ 365
Fax Using the Internet (I-Fax) .......................................................................................................... 366
Configure and Operate LDAP Search .............................................................................................. 385
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 388
Technical Information for Advanced Users................................................................................................. 391
Reset the Network Settings to Factory Default ................................................................................ 392
Print the WLAN Report..................................................................................................................... 393
Security .............................................................................................................................................. 396
Before Using Network Security Features ................................................................................................... 397
Secure Function Lock 3.0 .......................................................................................................................... 398
Before Using Secure Function Lock 3.0........................................................................................... 399
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 400
Scan Using Secure Function Lock 3.0 ............................................................................................. 401
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 402
Additional Secure Function Lock 3.0 Features................................................................................. 403
Register a new IC Card Using Machine's Control Panel .................................................................. 404
Register an External IC Card Reader............................................................................................... 405
Use Active Directory Authentication........................................................................................................... 406
Introduction to Active Directory Authentication................................................................................. 407
Configure Active Directory Authentication Using Web Based Management .................................... 408
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication) ................................................................................................................................. 409
Use LDAP Authentication........................................................................................................................... 410
Introduction to LDAP Authentication ................................................................................................ 411
Configure LDAP Authentication Using Web Based Management.................................................... 412
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication) ................................................................................................................................. 413
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 414
Certificates and Web Based Management....................................................................................... 415
Manage Your Network Machine Securely Using IPsec .............................................................................. 437
Introduction to IPsec......................................................................................................................... 438
Configure IPsec Using Web Based Management ............................................................................ 439
Configure an IPsec Address Template Using Web Based Management ......................................... 440
Configure an IPsec Template Using Web Based Management ....................................................... 442
Send an Email Securely............................................................................................................................. 451
Configure Email Sending Using Web Based Management.............................................................. 452
Send an Email with User Authentication .......................................................................................... 453
Send an Email Securely Using SSL/TLS ......................................................................................... 454
Send or Receive an Email Securely........................................................................................................... 455
Configure Email Sending or Receiving Using Web Based Management......................................... 456
Home > Table of Contents
iv