Managing the Machine
Managing the Machine
...............................................................................................................................
360
Setting Access Privileges
..................................................................................................................................
362
Setting the System Manager ID and PIN
......................................................................................................
363
Setting the Department ID Management
.....................................................................................................
365
Setting a Remote UI PIN
...............................................................................................................................
371
LDAP Server Authentication
..........................................................................................................................
373
Configuring the Network Security Settings
....................................................................................................
377
Restricting Communication by Using Firewalls
.............................................................................................
379
Specifying IP Addresses for Firewall Settings
.........................................................................................
380
Specifying MAC Addresses for Firewall Settings
.....................................................................................
383
Changing Port Numbers
...............................................................................................................................
386
Setting a Proxy
.............................................................................................................................................
387
Configuring the Key and Certificate for TLS
..................................................................................................
389
Generating the Key and Certificate for Network Communication
..........................................................
392
Generating a Key and Certificate Signing Request (CSR)
........................................................................
395
Registering the Key and Certificate for Network Communication
..........................................................
398
Configuring IPSec Settings
...........................................................................................................................
400
Configuring IEEE 802.1X Authentication Settings
.........................................................................................
407
Restricting the Machine's Functions
................................................................................................................
411
Restricting Access to Address Book and Sending Functions
.........................................................................
413
Restricting Use of the Address Book
......................................................................................................
414
Limiting Available Destinations
..............................................................................................................
416
Restricting the Fax Sending Functions
...................................................................................................
418
Restricting Printing from a Computer
...........................................................................................................
420
Restricting USB Functions
.............................................................................................................................
421
Disabling HTTP Communication
...................................................................................................................
423
Disabling Remote UI
.....................................................................................................................................
424
Increasing the Security of Documents
.............................................................................................................
425
Generating a Device Signature Key
...............................................................................................................
426
Managing the Machine from a Computer (Remote UI)
...................................................................................
427
Starting Remote UI
.......................................................................................................................................
428
Checking the Status and Logs
.......................................................................................................................
432
Setting Up Menu Options from Remote UI
...................................................................................................
438
Registering Destinations from Remote UI
....................................................................................................
441
Security Policy
..............................................................................................................................................
445
Managing the Machine
358