Recalling Previously Used Settings for Sending/Saving (Recall Settings) ...................................................................
256
Specifying E-Mail Settings .................................................................................................................................. 258
Using Your Computer to Scan (Remote Scan) .......................................................................................................... 260
Scanning Documents from an Application ........................................................................................................... 261
Using ScanGear MF ........................................................................................................................................... 263
Linking with Mobile Devices ............................................................................................................ 265
Connecting with Mobile Devices ............................................................................................................................ 266
Connecting via a Wireless LAN Router (LAN Connection) ........................................................................................ 267
Connecting Directly (Access Point Mode) ............................................................................................................. 268
Utilizing the Machine through Applications ........................................................................................................... 271
Using AirPrint ....................................................................................................................................................... 272
Printing with AirPrint ........................................................................................................................................ 277
Scanning with AirPrint ....................................................................................................................................... 280
Faxing with AirPrint .......................................................................................................................................... 282
If AirPrint Cannot Be Used ................................................................................................................................. 284
Using Google Cloud Print ....................................................................................................................................... 285
Managing the Machine by the Remote Control ....................................................................................................... 287
Managing the Machine ........................................................................................................................ 289
Setting Access Privileges ....................................................................................................................................... 291
Setting the System Manager PIN ........................................................................................................................ 292
Setting a Remote UI PIN .................................................................................................................................... 294
Conguring the Network Security Settings ............................................................................................................ 296
Restricting Communication by Using Firewalls ..................................................................................................... 298
Specifying IP Addresses for Firewall Settings .................................................................................................. 299
Specifying MAC Addresses for Firewall Settings .............................................................................................. 302
Changing Port Numbers .................................................................................................................................... 304
Setting a Proxy ................................................................................................................................................. 305
Conguring the Key and Certicate for TLS .......................................................................................................... 307
Generating the Key and Certicate for Network Communication ...................................................................... 309
Generating a Key and Certicate Signing Request (CSR) ................................................................................... 312
Registering the Key and Certicate for Network Communication ...................................................................... 315
Conguring IEEE 802.1X Authentication Settings .................................................................................................. 317
Restricting the Machine's Functions ...................................................................................................................... 321
Restricting Access to Address Book and Sending Functions .................................................................................... 323
Restricting Use of the Address Book ............................................................................................................. 324
Limiting Available Destinations ..................................................................................................................... 326
Restricting the Fax Sending Functions ........................................................................................................... 328
Restricting USB Functions .................................................................................................................................. 330
Disabling HTTP Communication ......................................................................................................................... 331
Disabling Remote UI ......................................................................................................................................... 332
Managing the Machine from a Computer (Remote UI) ............................................................................................ 333
Starting Remote UI ........................................................................................................................................... 334
Checking the Status and Logs ............................................................................................................................ 337
IV