User's Manual
Table Of Contents
- Contents
- Setting Up
- Main Functions
- Preparations Required Before Use
- Preventing Unauthorized Access
- Setting Up Using the Setup Guide
- Setting the Date/Time
- Setting Up the Network Environment
- Installing Drivers
- Configuring Initial Settings for Fax Functions
- Configuring Scan Settings
- Basic Operations
- Parts and Their Functions
- Turning ON the Machine
- Using the Operation Panel
- Placing Originals
- Loading Paper
- Customizing the Display
- Changing the Default Settings for Functions
- Setting Sounds
- Entering Quiet Mode
- Entering Sleep Mode
- Registering Destinations
- Copying
- Faxing
- Printing
- Scanning
- Linking with Mobile Devices
- Managing the Machine
- Setting Access Privileges
- Configuring the Network Security Settings
- Restricting the Machine's Functions
- Managing the Machine from a Computer (Remote UI)
- Registering Destinations from Remote UI
- Saving/Loading Address Book from Remote UI
- Importing/Exporting Address Book Data with the Supplied Software
- Updating the Firmware
- Initializing Settings
- Setting Menu List
- Maintenance
- Troubleshooting
- Appendix
- SIL OPEN FONT LICENSE
IEEE 802.1X Authentication
IEEE 802.1X is a standard and mechanism for blocking unauthorized access to the network by collectively
managing user authentication information. If a de
vice tries to connect to the 802.1X network, the device must
go through user authentication in order to prove that the connection is made by an authorized user.
Authentication information is sent to and checked by a RADIUS server, which permits or rejects communication
to the network depending on the authentication result. If authentication fails, a LAN switch (or an access point)
blocks access from the outside of the network. The machine can connect to an 802.1X network as a client
device.
Conī “guring IEEE 802.1X Authentication Settings
(P. 319)
Managing the Machine
299