6
Installation Overview............................................................................................242
Step 1 Enabling the Port and Setting TCP/IP ......................................................242
Step 2 Configuring the E-mail Environment.........................................................243
Step 3 Testing Internet Fax .................................................................................247
11 Using the Server Fax Service................................................................................249
Server Fax Overview................................................................................................250
Preparations .............................................................................................................250
System Requirements for the Machine................................................................250
Installation Procedure...............................................................................................251
Installation Overview............................................................................................251
Step 1 Fax Settings .............................................................................................251
Step 2 Setting the Server Fax Feature ................................................................252
12 Encryption and Digital Signature Settings ..........................................................255
Encryption and Digital Signature Overview ..............................................................256
Encryption Features for Communication .............................................................256
Encryption and Digital-Signature Features for Scan Files ...................................257
Configuration of HTTP Communication Encryption..................................................258
Installation Overview............................................................................................258
Step1 Configuration on the Machine ...................................................................258
Step2 Configuration on a Computer ....................................................................259
Configuration of Encryption using IPSec..................................................................260
Installation Overview............................................................................................260
Step1 Import and Configuration of a Certificate...................................................260
Step2 Configuration on the Machine (Configuration of IPSec) ............................261
Step3 Configuration on a Computer ....................................................................262
Configuration of E-mail Encryption/Digital Signature ...............................................263
Installation Overview............................................................................................263
Step1 Configuration on the Machine ...................................................................263
Step2 Configuration on a Computer ....................................................................265
Configuration of PDF/DocuWorks/XPS Signature....................................................267
Installation Overview............................................................................................267
Step1 Configuration on the Machine ...................................................................267
Step2 Configuration on a Computer ....................................................................269
13 Authentication and Account Administration .......................................................271
Overview of Authentication and Account Administration..........................................272
Overview of Authentication ..................................................................................272
Overview of Account Administration ....................................................................273
Authentication...........................................................................................................274
Users Controlled by Authentication .....................................................................274
User Role and Authorization Groups ...................................................................274
Types of Authentication .......................................................................................275
Types of Account Administration .........................................................................276