Security
Security ................................................................................................................................................................
301
Setting the Department ID and PIN for the Administrator ............................................................................ 302
Protecting the Network .................................................................................................................................... 304
Setting the Firewall ....................................................................................................................................... 305
Changing the Port Number .......................................................................................................................... 308
Using a Proxy ............................................................................................................................................... 309
Using TLS ...................................................................................................................................................... 311
Using IEEE 802.1X ......................................................................................................................................... 313
Managing and Verifying a Key and Certicate .............................................................................................. 315
Generating a Key and Certicate ........................................................................................................... 316
Generating a Key and Certicate Signing Request (CSR) and Obtaining and Registering a Certicate ... 318
Registering a Key and Certicate or CA Certicate Obtained from an Issuing Authority ........................ 321
Verifying a Received Certicate with OCSP ............................................................................................. 323
Preventing Sending Data by Mistake and Leaking Information .................................................................... 324
Limiting Available Destinations .................................................................................................................... 325
Conrming the Destination before Sending ................................................................................................. 327
Restricting Fax Sending ................................................................................................................................ 329
Restricting Printing (Touch Panel Model) ...................................................................................................... 331
Saving Received Documents in the Machine (Memory Lock) (Touch Panel Model) ................................. 332
Preventing Unauthorized Use .......................................................................................................................... 335
Restricting Address Book Registration and Editing (Touch Panel Model) ...................................................... 336
Restricting Use of Remote UI ........................................................................................................................ 338
Restricting Use from a Mobile Device ........................................................................................................... 341
Preventing Connection to Computer via USB Port ........................................................................................ 342
Conguring LPD, RAW, or WSD ..................................................................................................................... 343
Disabling HTTP Communication ................................................................................................................... 345
Security
300