Security
Security ................................................................................................................................................................ 519
Protecting the Machine from Unauthorized Access ....................................................................................... 520
Preventing Unauthorized Access .................................................................................................................. 521
Setting Access Privileges .............................................................................................................................. 523
Setting the System Manager ID ............................................................................................................. 524
Setting the Department ID Management .............................................................................................. 526
Setting a Remote UI PIN ........................................................................................................................ 534
LDAP Server Authentication .......................................................................................................................... 536
Restricting Communication by Using Firewalls ............................................................................................. 541
Specifying IP Addresses for Firewall Rules ............................................................................................. 542
Specifying MAC Addresses for Firewall Rules ......................................................................................... 546
Changing Port Numbers ............................................................................................................................... 549
Setting a Proxy ............................................................................................................................................. 551
Restricting the Machine's Functions ................................................................................................................ 554
Restricting Access to Address Book and Sending Functions ......................................................................... 555
Setting a PIN for Address Book .............................................................................................................. 556
Limiting Available Destinations .............................................................................................................. 558
Prohibiting PC Faxing (MF419x / MF416dw) ........................................................................................... 559
Disabling Use of Previously Used Destinations ...................................................................................... 560
Checking Destinations before Sending Documents ............................................................................... 561
Prohibiting Sequential Broadcasting (MF419x / MF416dw) .................................................................... 563
Restricting USB Functions ............................................................................................................................. 564
Disabling HTTP Communication ................................................................................................................... 567
Disabling Remote UI ..................................................................................................................................... 568
Implementing Robust Security Features ......................................................................................................... 569
Enabling TLS Encrypted Communication for the Remote UI ......................................................................... 570
Conguring IPSec Settings ........................................................................................................................... 574
Conguring IEEE 802.1X Authentication ....................................................................................................... 583
Conguring Settings for Key Pairs and Digital Certicates ........................................................................... 588
Generating Key Pairs ............................................................................................................................. 590
Using CA-issued Key Pairs and Digital Certicates ................................................................................. 598
Verifying Key Pairs and Digital Certicates ............................................................................................. 602
Security
518