Operation Manual

Security
Security ................................................................................................................................................................ 248
Protecting the Machine from Unauthorized Access ....................................................................................... 249
Preventing Unauthorized Access .................................................................................................................. 250
Setting Access Privileges .............................................................................................................................. 252
Setting the System Manager Password .................................................................................................. 253
Setting the Department ID Management .............................................................................................. 256
Setting a Remote UI PIN ........................................................................................................................ 263
Restricting Communication by Using Firewalls ............................................................................................. 264
Specifying IP Addresses for Firewall Rules ............................................................................................. 265
Specifying MAC Addresses for Firewall Rules ......................................................................................... 271
Setting a Proxy ............................................................................................................................................. 274
Restricting the Machine's Functions ................................................................................................................ 277
Restricting the Printing Operations .............................................................................................................. 278
Restricting USB Functions ............................................................................................................................. 282
Restricting Operation Panel Functions ......................................................................................................... 285
Disabling HTTP Communication ................................................................................................................... 288
Disabling Remote UI ..................................................................................................................................... 289
Disabling the LAN Port ................................................................................................................................. 290
Hiding the Print Job History .......................................................................................................................... 291
Implementing Robust Security Features ......................................................................................................... 293
Using TLS for Encrypted Communications .................................................................................................... 294
Conguring IPSec Settings ........................................................................................................................... 298
Conguring IEEE 802.1X Authentication ....................................................................................................... 309
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 315
Generating Key Pairs ............................................................................................................................. 317
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 326
Verifying Key Pairs and Digital Certicates ............................................................................................. 329
Security
247