User's Manual
Table Of Contents
- Contents
- Setting Up
- Main Functions
- Preparations Required Before Use
- Preventing Unauthorized Access
- Setting Up Using the Setup Guide
- Setting the Date/Time
- Setting Up the Network Environment
- Installing Drivers
- Configuring Initial Settings for Fax Functions
- Configuring Scan Settings
- Basic Operations
- Parts and Their Functions
- Turning ON the Machine
- Using the Operation Panel
- Logging in to the Machine
- Placing Originals
- Loading Paper
- Loading Paper in the Paper Drawer
- Loading Paper in the Multi-Purpose Tray
- Loading Envelopes
- Loading Preprinted Paper
- Specifying Paper Size and Type
- Specifying Paper Size and Type in the Paper Drawer
- Specifying Paper Size and Type in the Multi-Purpose Tray
- Registering Default Paper Settings for the Multi-Purpose Tray
- Registering a Custom Paper Size
- Limiting the Paper Sizes Displayed
- Automatically Selecting an Appropriate Paper Source for Each Function
- Customizing the Display
- Changing the Default Settings for Functions
- Setting Sounds
- Entering Sleep Mode
- Registering Destinations
- Using a USB Memory Device
- Copying
- Faxing
- Printing
- Scanning
- Linking with Mobile Devices
- Managing the Machine
- Setting Access Privileges
- Configuring the Network Security Settings
- Restricting the Machine's Functions
- Increasing the Security of Documents
- Managing the Machine from a Computer (Remote UI)
- Updating the Firmware
- Initializing Settings
- Setting Menu List
- Maintenance
- Troubleshooting
- Appendix
- SIL OPEN FONT LICENSE
IPSec Communication
While TLS only encrypts data used on a specic application, such as a W
eb browser or an e-mail application,
IPSec encrypts the whole (or payloads of) IP packets. This enables IPSec to offer a more versatile security system
than TLS.
Conguring IPSec Settings(P
. 389)
IEEE 802.1X Authentication
IEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectively
managing user authentication information. If a de
vice tries to connect to the 802.1X network, the device must
go through user authentication in order to prove that the connection is made by an authorized user.
Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication
to the network depending on the authentication result. If authentication fails, a LAN switch (or an access point)
blocks access from the outside of the network. The machine can connect to an 802.1X network as a client
device.
Conguring IEEE 802.1X Authentication Settings
(P. 396)
Managing the Machine
366