Security
Security ................................................................................................................................................................ 223
Protecting the Machine from Unauthorized Access ....................................................................................... 224
Preventing Unauthorized Access .................................................................................................................. 225
Setting Access Privileges .............................................................................................................................. 227
Setting the System Manager PIN ........................................................................................................... 228
Setting a Remote UI PIN (MF244dw / MF232w) ...................................................................................... 230
Restricting Communication by Using Firewalls (MF244dw / MF232w) ........................................................... 232
Specifying IP Addresses for Firewall Rules ............................................................................................. 233
Specifying MAC Addresses for Firewall Rules ......................................................................................... 237
Changing Port Numbers (MF244dw / MF232w) ............................................................................................ 240
Setting a Proxy (MF244dw / MF232w) ........................................................................................................... 242
Restricting the Machine's Functions (MF244dw / MF232w) ............................................................................ 244
Disabling HTTP Communication ................................................................................................................... 245
Disabling Remote UI ..................................................................................................................................... 246
Implementing Robust Security Features (MF244dw / MF232w) ..................................................................... 247
Enabling TLS Encrypted Communication for the Remote UI ......................................................................... 248
Conguring IEEE 802.1X Authentication ....................................................................................................... 251
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 256
Generating Key Pairs ............................................................................................................................. 258
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 265
Verifying Key Pairs and Digital Certicates ............................................................................................. 268
Security
222