User Guide
Table Of Contents
- Contents
- Important Safety Instructions
- Basic Operations
- Copying
- Faxing
- Configuring Initial Settings for Fax Functions
- Sending Faxes
- Receiving Faxes
- Sending and Receiving Faxes According to Your Purposes
- Checking Status and Log for Sent and Received Documents
- Importing/Exporting Address Book Data with the Supplied Software
- Sending Faxes from Your Computer (PC Fax)
- Using the Machine as a Printer
- Using the Machine as a Scanner
- Preparing to Use the Machine as a Scanner
- Scanning from the Machine
- Scanning from a Computer
- Convenient Scanning with a Machine-Based Operation
- Can Be Used Conveniently with a Mobile Device
- Network
- Connecting to a Network
- Viewing Network Settings
- Configuring the Machine for Printing or Faxing from a Computer
- Configuring Scan Settings (E-Mail/Shared Folders)
- Configuring the Machine for Your Network Environment
- Security
- Using Remote UI
- Setting Menu List
- Troubleshooting
- Maintenance
- Appendix
- SIL OPEN FONT LICENSE
Conguring Settings for Ke
y Pairs and Digital
Certicates
1469-089
In or
der to encrypt communication with a remote device, an encryption key must be sent and received over an
unsecured network beforehand. This problem is solved by public-key cryptography. Public-key cryptography ensures
secure communication by protecting important and valuable information from attacks, such as sning, spoong, and
tampering of data as it ows over a network.
Key Pair
A key pair consists of a public key and a secret key, both of which are required for encrypting or
decrypting data. Because data that has been encrypted with one of the k
ey pair cannot be
returned to its original data form without the other, public-key cryptography ensures secure
communication of data over the network. A key pair is used for TLS encrypted communication
or TLS of the IEEE 802.1X authentication. Up to ve key pairs (including the preinstalled pairs)
can be generated to the machine (
Using CA-issued Key Pairs and Digital
Certicates(P
. 443) ). A key pair can be generated with the machine (
Generating Key
Pairs(P
. 436) ).
CA Certicate
Digital certicates including CA certicates ar
e similar to other forms of identication, such as
driver's licenses. A digital certicate contains a digital signature, which enables the machine to
detect any spoong or tampering of data. It is extremely dicult for third parties to abuse
digital certicates. A digital certicate that contains a public key of a certication authority (CA)
is referred to as a CA certicate. CA certicates are used for verifying the device the machine is
communicating with for features such as printing with Google Cloud Print or IEEE 802.1X
authentication. Up to 67 CA certicates can be registered, including the 62 certicates that are
preinstalled in the machine (
Using CA-issued Key Pairs and Digital Certicates(P
. 443) ).
◼ Ke
y and Certicate Requirements
The certicate contained in a key pair generated with the machine conforms to X.509v3. If you install a key pair or a CA
certicate from a computer, make sure that they meet the following requirements:
Format
● Ke
y pair: PKCS#12
*1
● CA certicate: X.509v1 or X.509v3, DER (encoded binary), PEM
File extension ● Key pair: ".p12" or ".pfx"
● CA certicate: ".cer"
Public key algorithm
(and key length)
RSA (512 bits, 1024 bits, 2048 bits, or 4096 bits)
Certicate signature algorithm
SHA1-RSA, SHA256-RSA, SHA384-RSA
*2
, SHA512-RSA
*2
, MD5-RSA, or MD2-RSA
Certicate thumbprint algorithm SHA1
*1
Requir
ements for the certicate contained in a key pair are pursuant to CA certicates.
*2
SHA384-RSA and SHA512-RSA are available only when the RSA key length is 1024 bits or more.
Security
434