User Manual
Table Of Contents
- Contents
- Setting Up
- Main Functions
- Preparations Required Before Use
- Preventing Unauthorized Access
- Setting Up Using the Setup Guide
- Setting the Date/Time
- Setting Up the Network Environment
- Installing Drivers
- Configuring Initial Settings for Fax Functions
- Configuring Scan Settings
- Basic Operations
- Parts and Their Functions
- Turning ON the Machine
- Using the Operation Panel
- Logging in to the Machine
- Placing Originals
- Loading Paper
- Loading Paper in the Paper Drawer
- Loading Paper in the Multi-Purpose Tray
- Loading Envelopes
- Loading Preprinted Paper
- Specifying Paper Size and Type
- Specifying Paper Size and Type in the Paper Drawer
- Specifying Paper Size and Type in the Multi-Purpose Tray
- Registering Default Paper Settings for the Multi-Purpose Tray
- Registering a Custom Paper Size
- Limiting the Paper Sizes Displayed
- Automatically Selecting an Appropriate Paper Source for Each Function
- Customizing the Display
- Changing the Default Settings for Functions
- Setting Sounds
- Entering Sleep Mode
- Registering Destinations
- Using a USB Memory Device
- Copying
- Faxing
- Printing
- Scanning
- Linking with Mobile Devices
- Managing the Machine
- Setting Access Privileges
- Configuring the Network Security Settings
- Restricting the Machine's Functions
- Managing the Machine from a Computer (Remote UI)
- Updating the Firmware
- Initializing Settings
- Setting Menu List
- Maintenance
- Troubleshooting (FAQ)
- Appendix
- SIL OPEN FONT LICENSE
Conguring IPSec Settings
7YX0-07F
Internet Pr
otocol Security (IPSec or IPsec) is a protocol suite for encrypting data transported over a network, including
Internet networks. While TLS only encrypts data used on a specic application, such as a Web browser or an e-mail
application, IPSec encrypts either whole IP packets or the payloads of IP packets, offering a more versatile security
system. The IPSec of the machine works in transport mode, in which the payloads of IP packets are encrypted. With
this feature, the machine can connect directly to a computer that is in the same virtual private network (VPN). Check
the system requirements (
Management Functions(P. 626) ) and set the necessary congur
ation on the computer
before you congure the machine.
Using IPSec with IP address lter
● IP addr
ess lter settings are applied before the IPSec policies.
Specifying IP Addresses for Firewall
Settings(P
. 371)
Conguring IPSec Settings
Befor
e using IPSec for encrypted communication, you need to register security policies (SP). A security policy consists
of the groups of settings described below. After registering policies, specify the order in which they are applied.
Selector
Selector denes conditions for IP pack
ets to apply IPSec communication. Selectable conditions include IP
addresses and port numbers of the machine and the devices to communicate with.
IKE
IKE congur
es the IKEv1 that is used for key exchange protocol. Note that instructions vary depending on the
authentication method selected.
[Pre-Shared Key Method]
This authentication method uses a common key word, called Shared Key, for communication between the
machine and other devices. Enable TLS for the Remote UI before specifying this authentication method (
Conguring the Key and Certicate for TLS(P. 380) ).
[Digital Signature Method]
The machine and the other devices authenticate each other by mutually verifying their digital signatures.
Generate or install the key and certicate beforehand ( Registering the Key and Certicate for Network
Communication
(P. 392) ).
AH/ESP
Specify the settings for AH/ESP, which is added to packets during IPSec communication. AH and ESP can be used
at the same time. Y
ou can also select whether or not to enable PFS for tighter security.
Managing the Machine
394