User's Manual
Table Of Contents
- Contents
- Important Safety Instructions
- Setting Up
- Main Functions
- Preparations Required Before Use
- Preventing Unauthorized Access
- Setting Up Using the Setup Guide
- Setting the Date/Time
- Setting Up the Network Environment
- Installing Drivers
- Basic Operations
- Printing
- Linking with Mobile Devices
- Managing the Machine
- Setting Access Privileges
- Configuring the Network Security Settings
- Restricting the Machine's Functions
- Managing the Machine from a Computer (Remote UI)
- Updating the Firmware
- Initializing Settings
- Setting Menu List
- Maintenance
- Troubleshooting
- Appendix
- SIL OPEN FONT LICENSE
Management Functions
23FJ-05K
◼ Fir
ewall Settings
● Up to 4 IP addresses (or ranges of IP addresses) can be specied for both IPv4 and IPv6.
● Up to 10 MAC addresses can be specied.
◼ Registration of Keys and Certicates
● If you install a key or CA certicate from a computer, make sure that they meet the following requirements:
Format
● PK
CS#12
● CA certicate: X.509 DER, PEM
File extension
● Key: ".p12", ".pfx"
● CA certicate: ".cer"
Public key algorithm
(and key length)
RSA (512 bits
*1
, 1024 bits, 2048 bits, 4096 bits), ECDSA (P256, P384, P521)
Certicate signatur
e algorithm
SHA1-RSA
*2
, SHA256-RSA, SHA384-RSA
*3
, SHA512-RSA
*3
, MD5-RSA
*4
, MD2-RSA
*4
, SHA1-
ECDSA
*2
, SHA256-ECDSA, SHA384-ECDSA, SHA512-ECDSA
Certicate thumbprint algorithm SHA1
*1
The signatur
e algorithm is available only for SHA1-RSA or SHA256-RSA.
*2
Available only for a generated key and certicate signature request (CSR) or installation from the Remote UI.
*3
Available only when the key algorithm is 1024 bits or more.
*4
Available only for installation from the Remote UI.
● The machine does not support use of a certicate r
evocation list (CRL).
Appendix
322