Security
Security
................................................................................................................................................................
251
Protecting the Machine from Unauthorized Access
.......................................................................................
252
Preventing Unauthorized Access
..................................................................................................................
253
Setting Access Privileges
..............................................................................................................................
255
Setting the System Manager Password
..................................................................................................
256
Setting the Department ID Management
..............................................................................................
258
Setting a Remote UI PIN
........................................................................................................................
265
Restricting Communication by Using Firewalls
.............................................................................................
267
Specifying IP Addresses for Firewall Rules
.............................................................................................
268
Specifying MAC Addresses for Firewall Rules
.........................................................................................
274
Setting a Proxy
.............................................................................................................................................
277
Restricting the Machine's Functions
................................................................................................................
280
Restricting the Printing Operations
..............................................................................................................
281
Restricting USB Functions
.............................................................................................................................
285
Restricting Operation Panel Functions
.........................................................................................................
288
Disabling HTTP Communication
...................................................................................................................
291
Disabling Remote UI
.....................................................................................................................................
292
Disabling the LAN Port
.................................................................................................................................
293
Hiding the Print Job History
..........................................................................................................................
294
Implementing Robust Security Features
.........................................................................................................
296
Using TLS for Encrypted Communications
....................................................................................................
297
Configuring IPSec Settings
...........................................................................................................................
301
Configuring IEEE 802.1X Authentication
.......................................................................................................
312
Configuring Settings for Key Pairs and Digital Certificates
...........................................................................
318
Generating Key Pairs
.............................................................................................................................
320
Using CA-issued Key Pairs and Digital Certificates
.................................................................................
329
Verifying Key Pairs and Digital Certificates
.............................................................................................
332
Security
250