Security
Security ................................................................................................................................................................
143
Setting the Department ID and PIN for the Administrator ............................................................................ 144
Protecting the Network .................................................................................................................................... 146
Setting the Firewall ....................................................................................................................................... 147
Changing the Port Number .......................................................................................................................... 150
Using a Proxy ............................................................................................................................................... 151
Using TLS ...................................................................................................................................................... 153
Using IEEE 802.1X ......................................................................................................................................... 155
Managing and Verifying a Key and Certicate .............................................................................................. 157
Generating a Key and Certicate ........................................................................................................... 158
Generating a Key and Certicate Signing Request (CSR) and Obtaining and Registering a Certicate ... 160
Registering a Key and Certicate or CA Certicate Obtained from an Issuing Authority ........................ 163
Verifying a Received Certicate with OCSP ............................................................................................. 165
Preventing Leaking Information ...................................................................................................................... 166
Preventing Unauthorized Use .......................................................................................................................... 167
Restricting Use of Remote UI ........................................................................................................................ 168
Restricting Use from a Mobile Device ........................................................................................................... 170
Preventing Connection to Computer via USB Port ........................................................................................ 171
Conguring LPD, RAW, or WSD ..................................................................................................................... 172
Disabling HTTP Communication ................................................................................................................... 174
Security
142