User Guide
Table Of Contents
- Contents
- Setting Up
- Main Functions
- Preparations Required Before Use
- Preventing Unauthorized Access
- Setting Up Using the Setup Guide
- Setting the Date/Time
- Setting Up the Network Environment
- Installing Drivers
- Configuring Initial Settings for Fax Functions
- Configuring Scan Settings
- Basic Operations
- Parts and Their Functions
- Turning ON the Machine
- Using the Operation Panel
- Logging in to the Machine
- Placing Originals
- Loading Paper
- Loading Paper in the Paper Drawer
- Loading Paper in the Multi-Purpose Tray
- Loading Envelopes
- Loading Preprinted Paper
- Specifying Paper Size and Type
- Specifying Paper Size and Type in the Paper Drawer
- Specifying Paper Size and Type in the Multi-Purpose Tray
- Registering Default Paper Settings for the Multi-Purpose Tray
- Registering a Custom Paper Size
- Limiting the Paper Sizes Displayed
- Automatically Selecting an Appropriate Paper Source for Each Function
- Customizing the Display
- Changing the Default Settings for Functions
- Setting Sounds
- Entering Sleep Mode
- Registering Destinations
- Copying
- Faxing
- Printing
- Scanning
- Linking with Mobile Devices
- Managing the Machine
- Setting Access Privileges
- Configuring the Network Security Settings
- Restricting the Machine's Functions
- Increasing the Security of Documents
- Managing the Machine from a Computer (Remote UI)
- Updating the Firmware
- Initializing Settings
- Setting Menu List
- Maintenance
- Troubleshooting
- Appendix
- SIL OPEN FONT LICENSE
● IPSec supports communication to a unicast addr
ess (or a single device).
● The machine cannot use both IPSec and DHCPv6 at the same time.
● IPSec is unavailable in networks in which NAT or IP masquerade is implemented.
◼ Registr
ation of Keys and Certicates
● A certicate and key that can be generated by the machine conform to X.509v3. If you install a key or CA certicate
from a computer, make sure that they meet the following requirements:
Format
● Ke
y: PKCS#12
*1
● CA certicate: X.509v1 or X.509v3, DER (encoded binary), PEM
File extension
● Key: ".p12" or ".pfx"
● CA certicate: ".cer" or ".pem"
Public key algorithm
(and key length)
RSA (512 bits, 1024 bits, 2048 bits, or 4096 bits), ECDSA (P256, P384, P521)
Certicate signatur
e algorithm
SHA1-RSA, SHA256-RSA, SHA384-RSA
*2
, SHA512-RSA
*2
, MD5-RSA, MD2-RSA, SHA1-ECDSA,
SHA256-ECDSA, SHA384-ECDSA, or SHA512-ECDSA
Certicate thumbprint algorithm SHA1
*1
Requir
ements for the certicate contained in a key are pursuant to CA certicates.
*2
SHA384-RSA and SHA512-RSA are available only when the RSA key length is 1024 bits or more.
● The machine does not support use of a certicate r
evocation list (CRL).
◼ Denition of "
Weak Encryption"
When <Prohibit Use of Weak Encrypt.> is set to <On>, the use of the following algorithms is prohibited.
Hash: MD4, MD5, SHA-1
HMAC: HMAC-MD5
Common key cryptosystem: RC2, RC4, DES
Public key cryptosystem:
RSA encryption (512 bits/1024 bits), RSA signature (512 bits/1024 bits), DSA (512 bits/1024
bits), DH (512 bits/1024 bits)
● Even when <Pr
ohibit Weak Encryp. Key/Cert.> is set to <On>, the hash algorithm SHA-1, which is used for
signing a root certicate, can be used.
Appendix
712