User Manual

Table Of Contents
Configure Your Machine for a Wireless Network Using the One Push Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 342
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 343
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 345
Configure Your Machine for an Enterprise Wireless Network .......................................................... 347
Use Wi-Fi Direct
®
............................................................................................................................. 349
Advanced Network Features...................................................................................................................... 358
Print the Network Configuration Report............................................................................................ 359
Fax Using the Internet (I-Fax) .......................................................................................................... 360
Configure and Operate LDAP Search .............................................................................................. 379
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 382
Technical Information for Advanced Users................................................................................................. 385
Reset the Network Settings to Factory Default ................................................................................ 386
Print the WLAN Report..................................................................................................................... 387
Security .............................................................................................................................................. 390
Before Using Network Security Features ................................................................................................... 391
Secure Function Lock 3.0 .......................................................................................................................... 392
Before Using Secure Function Lock 3.0........................................................................................... 393
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 394
Scan Using Secure Function Lock 3.0 ............................................................................................. 395
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 396
Additional Secure Function Lock 3.0 Features................................................................................. 397
Register a new IC Card Using Machine's Control Panel .................................................................. 398
Register an External IC Card Reader............................................................................................... 399
Use Active Directory Authentication........................................................................................................... 400
Introduction to Active Directory Authentication................................................................................. 401
Configure Active Directory Authentication Using Web Based Management .................................... 402
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication) ................................................................................................................................. 403
Use LDAP Authentication........................................................................................................................... 404
Introduction to LDAP Authentication ................................................................................................ 405
Configure LDAP Authentication Using Web Based Management.................................................... 406
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication) ................................................................................................................................. 407
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 408
Certificates and Web Based Management....................................................................................... 409
Manage Your Network Machine Securely Using IPsec .............................................................................. 431
Introduction to IPsec......................................................................................................................... 432
Configure IPsec Using Web Based Management ............................................................................ 433
Configure an IPsec Address Template Using Web Based Management ......................................... 434
Configure an IPsec Template Using Web Based Management ....................................................... 436
Send or Receive an Email Securely........................................................................................................... 445
Configure Email Sending or Receiving Using Web Based Management......................................... 446
Send an Email with User Authentication .......................................................................................... 447
Send or Receive an Email Securely Using SSL/TLS ....................................................................... 448
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ......................................................... 449
What Is IEEE 802.1x Authentication? .............................................................................................. 450
Home > Table of Contents
iv