User Manual

Managing the Machine
Managing the Machine ...............................................................................................................................
360
Setting Access Privileges .................................................................................................................................. 362
Setting the System Manager ID and PIN ...................................................................................................... 363
Setting the Department ID Management ..................................................................................................... 365
Setting a Remote UI PIN ............................................................................................................................... 371
LDAP Server Authentication .......................................................................................................................... 373
Conguring the Network Security Settings .................................................................................................... 377
Restricting Communication by Using Firewalls ............................................................................................. 379
Specifying IP Addresses for Firewall Settings ......................................................................................... 380
Specifying MAC Addresses for Firewall Settings ..................................................................................... 383
Changing Port Numbers ............................................................................................................................... 386
Setting a Proxy ............................................................................................................................................. 387
Conguring the Key and Certicate for TLS .................................................................................................. 389
Generating the Key and Certicate for Network Communication .......................................................... 392
Generating a Key and Certicate Signing Request (CSR) ........................................................................ 395
Registering the Key and Certicate for Network Communication .......................................................... 398
Conguring IPSec Settings ........................................................................................................................... 400
Conguring IEEE 802.1X Authentication Settings ......................................................................................... 407
Restricting the Machine's Functions ................................................................................................................ 411
Restricting Access to Address Book and Sending Functions ......................................................................... 413
Restricting Use of the Address Book ...................................................................................................... 414
Limiting Available Destinations .............................................................................................................. 416
Restricting the Fax Sending Functions ................................................................................................... 418
Restricting Printing from a Computer ........................................................................................................... 420
Restricting USB Functions ............................................................................................................................. 421
Disabling HTTP Communication ................................................................................................................... 423
Disabling Remote UI ..................................................................................................................................... 424
Increasing the Security of Documents ............................................................................................................. 425
Generating a Device Signature Key ............................................................................................................... 426
Managing the Machine from a Computer (Remote UI) ................................................................................... 427
Starting Remote UI ....................................................................................................................................... 428
Checking the Status and Logs ....................................................................................................................... 432
Setting Up Menu Options from Remote UI ................................................................................................... 438
Registering Destinations from Remote UI .................................................................................................... 441
Security Policy .............................................................................................................................................. 445
Managing the Machine
358