Conguring the Machine for Your Network Environment ....................................................................................... 216
Conguring Ethernet Settings ............................................................................................................................ 217
Setting a Wait Time for Connecting to a Network .................................................................................................. 219
Conguring DNS .............................................................................................................................................. 220
Conguring WINS ............................................................................................................................................. 226
Conguring SNTP ............................................................................................................................................. 229
Monitoring and Controlling the Machine with SNMP ............................................................................................. 232
Conguring Settings for Device Management Software ......................................................................................... 238
Conguring SMB .............................................................................................................................................. 242
Conguring Settings on the Computer for Printing ......................................................................................... 245
Security .............................................................................................................................................................. 248
Protecting the Machine from Unauthorized Access ................................................................................................ 249
Preventing Unauthorized Access ........................................................................................................................ 250
Setting Access Privileges .................................................................................................................................... 252
Setting the System Manager Password .......................................................................................................... 253
Setting the Department ID Management ....................................................................................................... 256
Setting a Remote UI PIN .............................................................................................................................. 263
Restricting Communication by Using Firewalls ..................................................................................................... 264
Specifying IP Addresses for Firewall Rules ...................................................................................................... 265
Specifying MAC Addresses for Firewall Rules .................................................................................................. 271
Setting a Proxy ................................................................................................................................................. 274
Restricting the Machine's Functions ...................................................................................................................... 277
Restricting the Printing Operations ..................................................................................................................... 278
Restricting USB Functions .................................................................................................................................. 282
Restricting Operation Panel Functions ................................................................................................................. 285
Disabling HTTP Communication ......................................................................................................................... 288
Disabling Remote UI ......................................................................................................................................... 289
Disabling the LAN Port ...................................................................................................................................... 290
Hiding the Print Job History ................................................................................................................................ 291
Implementing Robust Security Features ................................................................................................................ 293
Using TLS for Encrypted Communications ............................................................................................................ 294
Conguring IPSec Settings ................................................................................................................................. 298
Conguring IEEE 802.1X Authentication ............................................................................................................... 309
Conguring Settings for Key Pairs and Digital Certicates ...................................................................................... 315
Generating Key Pairs ................................................................................................................................... 317
Using CA-issued Key Pairs and Digital Certicates ........................................................................................... 326
Verifying Key Pairs and Digital Certicates ..................................................................................................... 329
Using Remote UI ........................................................................................................................................ 332
Starting Remote UI ............................................................................................................................................... 333
Remote UI Screens ................................................................................................................................................ 336
Managing Documents and Checking the Machine Status ........................................................................................ 342
Enabling End Users to Operate Documents .......................................................................................................... 348
Setting Up Menu Options from Remote UI ............................................................................................................. 351
III