User Guide
Table Of Contents
- Contents
- Important Safety Instructions
- Basic Operations
- Copying
- Faxing
- Configuring Initial Settings for Fax Functions
- Sending Faxes
- Receiving Faxes
- Sending and Receiving Faxes According to Your Purposes
- Checking Status and Log for Sent and Received Documents
- Importing/Exporting Address Book Data with the Supplied Software
- Sending Faxes from Your Computer (PC Fax)
- Using the Machine as a Printer
- Using the Machine as a Scanner
- Preparing to Use the Machine as a Scanner
- Scanning from the Machine
- Scanning from a Computer
- Convenient Scanning with a Machine-Based Operation
- Can Be Used Conveniently with a Mobile Device
- Network
- Connecting to a Network
- Viewing Network Settings
- Configuring the Machine for Printing or Faxing from a Computer
- Configuring Scan Settings (E-Mail/Shared Folders)
- Configuring the Machine for Your Network Environment
- Security
- Using Remote UI
- Setting Menu List
- Troubleshooting
- Maintenance
- Appendix
- SIL OPEN FONT LICENSE
Security
Security ................................................................................................................................................................
392
Protecting the Machine from Unauthorized Access ....................................................................................... 393
Preventing Unauthorized Access .................................................................................................................. 394
Setting Access Privileges .............................................................................................................................. 396
Setting the System Manager PIN ........................................................................................................... 397
Setting a Remote UI PIN ........................................................................................................................ 399
Restricting Communication by Using Firewalls ............................................................................................. 401
Specifying IP Addresses for Firewall Rules ............................................................................................. 402
Specifying MAC Addresses for Firewall Rules ......................................................................................... 406
Changing Port Numbers ............................................................................................................................... 409
Setting a Proxy ............................................................................................................................................. 411
Restricting the Machine's Functions ................................................................................................................ 413
Restricting Access to Address Book and Sending Functions ......................................................................... 414
Setting a PIN for Address Book .............................................................................................................. 415
Limiting Available Destinations .............................................................................................................. 417
Prohibiting PC Faxing ............................................................................................................................ 418
Disabling Use of Previously Used Destinations ...................................................................................... 419
Checking Destinations before Sending Documents ............................................................................... 420
Prohibiting Sequential Broadcasting ...................................................................................................... 422
Disabling HTTP Communication ................................................................................................................... 423
Disabling Remote UI ..................................................................................................................................... 424
Implementing Robust Security Features ......................................................................................................... 425
Enabling TLS Encrypted Communication for the Remote UI ......................................................................... 426
Conguring IEEE 802.1X Authentication ....................................................................................................... 429
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 434
Generating Key Pairs ............................................................................................................................. 436
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 443
Verifying Key Pairs and Digital Certicates ............................................................................................. 446
Security
391