Security
Security ................................................................................................................................................................ 251
Protecting the Machine from Unauthorized Access ....................................................................................... 252
Preventing Unauthorized Access .................................................................................................................. 253
Setting Access Privileges .............................................................................................................................. 255
Setting the System Manager Password .................................................................................................. 256
Setting the Department ID Management .............................................................................................. 259
Setting a Remote UI PIN ........................................................................................................................ 266
Restricting Communication by Using Firewalls ............................................................................................. 267
Specifying IP Addresses for Firewall Rules ............................................................................................. 268
Specifying MAC Addresses for Firewall Rules ......................................................................................... 274
Setting a Proxy ............................................................................................................................................. 277
Restricting the Machine's Functions ................................................................................................................ 280
Restricting the Printing Operations .............................................................................................................. 281
Restricting USB Functions ............................................................................................................................. 285
Restricting Operation Panel Functions ......................................................................................................... 288
Disabling HTTP Communication ................................................................................................................... 291
Disabling Remote UI ..................................................................................................................................... 292
Disabling the LAN Port ................................................................................................................................. 293
Hiding the Print Job History .......................................................................................................................... 294
Implementing Robust Security Features ......................................................................................................... 296
Using TLS for Encrypted Communications .................................................................................................... 297
Conguring IPSec Settings ........................................................................................................................... 301
Conguring IEEE 802.1X Authentication ....................................................................................................... 312
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 318
Generating Key Pairs ............................................................................................................................. 320
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 329
Verifying Key Pairs and Digital Certicates ............................................................................................. 332
Security
250