User Guide
Table Of Contents
- Contents
- Important Safety Instructions
- Basic Operations
- Copying
- Faxing
- Configuring Initial Settings for Fax Functions
- Sending Faxes
- Receiving Faxes
- Sending and Receiving Faxes According to Your Purposes
- Checking Status and Log for Sent and Received Documents
- Importing/Exporting Address Book Data with the Supplied Software
- Sending Faxes from Your Computer (PC Fax)
- Using the Machine as a Printer
- Using the Machine as a Scanner
- Preparing to Use the Machine as a Scanner
- Scanning from the Machine
- Scanning from a Computer
- Convenient Scanning with a Machine-Based Operation
- Can Be Used Conveniently with a Mobile Device
- Network
- Connecting to a Network
- Viewing Network Settings
- Configuring the Machine for Printing or Faxing from a Computer
- Configuring Scan Settings (E-Mail/Shared Folders)
- Configuring the Machine for Your Network Environment
- Security
- Using Remote UI
- Setting Menu List
- Troubleshooting
- Maintenance
- Appendix
- SIL OPEN FONT LICENSE
Implementing Robust Security Features
1469-086
Authorized users may incur unanticipated losses fr
om attacks by malicious third parties, such as sning, spoong,
and tampering of data as it ows over a network. To protect your important and valuable information from these
attacks, the machine supports the following features to enhance security and secrecy.
TLS Encrypted Communication
TLS is a protocol for encryption for data sent over a network and is often used for communication via a Web
br
owser or an e-mail application. TLS enables secure network communication when you access the machine
from a computer via the Remote UI.
Enabling TLS Encrypted Communication for the Remote UI(P. 426)
IEEE 802.1X Authentication
IEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectively
managing user authentication information. If a de
vice tries to connect to the 802.1X network, the device must
go through user authentication in order to prove that the connection is made by an authorized user.
Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication
to the network depending on the authentication result. If authentication fails, a LAN switch (or an access point)
blocks access from the outside of the network. The machine can connect to an 802.1X network as a client
device.
Conguring IEEE 802.1X Authentication
(P. 429)
LINKS
Conguring Settings for Ke
y Pairs and Digital Certicates(P. 434)
Security
425