11
Sending Email Notifications......................................................................................................... 280
Adjusting Power Saving Settings................................................................................................. 281
Adjusting Control Panel Sounds.................................................................................................. 281
Importing and Exporting Product Settings ................................................................................... 282
Exporting Settings Using Web Config ..................................................................................... 282
Importing Settings Using Web Config ..................................................................................... 283
Updating Firmware Using Web Config ........................................................................................ 283
Synchronizing the Date and Time with a Time Server ................................................................. 283
Clearing the Internal Memory ...................................................................................................... 284
Adjusting the Contact List View Options...................................................................................... 284
Enabling Periodic Cleaning ......................................................................................................... 285
Powering Off or Rebooting the Product Remotely ....................................................................... 285
Restoring Default Product Settings.............................................................................................. 285
Configuring Security Settings ........................................................................................................... 286
Connecting an Authentication Device.......................................................................................... 286
Restricting Features Available for Users ..................................................................................... 287
User Feature Restriction ......................................................................................................... 288
Configuring User Feature Restrictions .................................................................................... 288
Disabling the External Interface................................................................................................... 289
Setting Up Password Encryption ................................................................................................. 289
Working with Audit Logs .............................................................................................................. 290
Restricting PDL File Operations .................................................................................................. 290
Enabling Program Verification on Start Up .................................................................................. 290
Restricting Domain Access.......................................................................................................... 291
Using Your Product on a Secure Network ........................................................................................ 291
Configuring Protocols and Services in Web Config ..................................................................... 292
Protocol Settings..................................................................................................................... 292
Configuring SSL/TLS Communication......................................................................................... 296
Configuring SSL/TLS Settings ................................................................................................ 296
Configuring a Server Certificate for the Product...................................................................... 297
Configuring IPsec/IP Filtering ...................................................................................................... 297
About IPsec/IP Filtering .......................................................................................................... 298
Configuring the Default IPsec/IP Filtering Policy..................................................................... 298