User's Manual
Table Of Contents
- Contents
- Important Safety Instructions
- Basic Operations
- Copying
- Faxing
- Configuring Initial Settings for Fax Functions
- Sending Faxes
- Receiving Faxes
- Sending and Receiving Faxes According to Your Purposes
- Checking Status and Log for Sent and Received Documents
- Importing/Exporting Address Book Data with the Supplied Software
- Sending Faxes from Your Computer (PC Fax)
- Using the Machine as a Printer
- Printing from a Computer
- Printing a Document
- Canceling Prints
- Checking the Printing Status
- Various Print Settings
- Enlarging or Reducing
- Switching 1-Sided and 2-Sided Printing (MF249dw / MF247dw)
- Collating Printouts by Page
- Printing Multiple Pages onto One Sheet
- Printing Posters
- Printing Booklet (MF249dw / MF247dw)
- Printing Borders
- Printing Dates and Page Numbers
- Printing Watermarks
- Selecting Document Type
- Saving Toner
- Combining and Printing Multiple Documents
- Configuring Print Settings to Your Needs
- Printing from a Computer
- Using the Machine as a Scanner
- Preparing to Use the Machine as a Scanner
- Scanning from the Machine
- Scanning from a Computer
- Convenient Scanning with a Machine-Based Operation (MF249dw / MF247dw)
- Can Be Used Conveniently with a Mobile Device
- Network
- Connecting to a Network
- Viewing Network Settings
- Configuring the Machine for Printing or Faxing from a Computer
- Configuring Scan Settings (E-Mail/Shared Folders) (MF249dw / MF247dw)
- Configuring the Machine for Your Network Environment
- Security
- Using Remote UI
- Setting Menu List
- Troubleshooting
- Maintenance
- Appendix
- SIL OPEN FONT LICENSE
Setting a Wait Time for Connecting to a Network
.................................................................................................. 376
Conguring DNS .............................................................................................................................................. 377
Conguring SMB (MF249dw / MF247dw) ............................................................................................................. 382
Conguring SNTP ............................................................................................................................................. 384
Monitoring and Controlling the Machine with SNMP ............................................................................................. 386
Security .............................................................................................................................................................. 392
Protecting the Machine from Unauthorized Access ................................................................................................ 393
Preventing Unauthorized Access ........................................................................................................................ 394
Setting Access Privileges .................................................................................................................................... 396
Setting the System Manager PIN .................................................................................................................. 397
Setting a Remote UI PIN .............................................................................................................................. 399
Restricting Communication by Using Firewalls ...................................................................................................... 400
Specifying IP Addresses for Firewall Rules ...................................................................................................... 401
Specifying MAC Addresses for Firewall Rules .................................................................................................. 405
Changing Port Numbers .................................................................................................................................... 408
Setting a Proxy ................................................................................................................................................. 410
Restricting the Machine's Functions ...................................................................................................................... 412
Restricting Access to Address Book and Sending Functions .................................................................................... 413
Setting a PIN for Address Book ..................................................................................................................... 414
Limiting Available Destinations ..................................................................................................................... 416
Prohibiting PC Faxing .................................................................................................................................. 417
Disabling Use of Previously Used Destinations ............................................................................................... 418
Checking Destinations before Sending Documents ......................................................................................... 419
Prohibiting Sequential Broadcasting ............................................................................................................. 421
Disabling HTTP Communication .......................................................................................................................... 422
Disabling Remote UI ......................................................................................................................................... 423
Implementing Robust Security Features ................................................................................................................ 424
Enabling TLS Encrypted Communication for the Remote UI ................................................................................... 425
Conguring IEEE 802.1X Authentication ............................................................................................................... 428
Conguring Settings for Key Pairs and Digital Certicates ...................................................................................... 433
Generating Key Pairs ................................................................................................................................... 435
Using CA-issued Key Pairs and Digital Certicates ........................................................................................... 442
Verifying Key Pairs and Digital Certicates ..................................................................................................... 445
Using Remote UI ........................................................................................................................................ 448
Starting Remote UI ............................................................................................................................................... 449
Remote UI Screens ................................................................................................................................................ 451
Managing Documents and Checking the Machine Status ........................................................................................ 455
Setting Up Menu Options from Remote UI ............................................................................................................. 460
Saving/Loading Address Book from Remote UI ....................................................................................................... 462
Registering Address Book from Remote UI ............................................................................................................. 466
Setting Menu List ...................................................................................................................................... 471
Network Settings ................................................................................................................................................. 472
V