User Setting for SSL/TLS...........................................................................................................................134
Setting the SSL/TLS Encryption Mode.....................................................................................................135
Enabling SSL for SMTP Connections.......................................................................................................136
Configuring S/MIME....................................................................................................................................138
E-mail Encryption.......................................................................................................................................138
Attaching an Electronic Signature............................................................................................................140
Specifying Checking of the Certificate Valid Period...............................................................................142
Configuring PDFs with Electronic Signatures
...............................................................................................144
Selecting the Device Certificate...............................................................................................................144
Configuring IPsec...........................................................................................................................................145
Encryption and Authentication by IPsec..................................................................................................145
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................146
IPsec Settings.............................................................................................................................................147
Encryption Key Auto Exchange Settings Configuration Flow................................................................156
Encryption Key Manual Settings Configuration Flow.............................................................................160
telnet Setting Commands..........................................................................................................................161
Configuring IEEE 802.1X Authentication.....................................................................................................169
Installing a Site Certificate........................................................................................................................169
Selecting the Device Certificate...............................................................................................................170
Setting Items of IEEE 802.1X for Ethernet................................................................................................170
Setting Items of IEEE 802.1X for Wireless LAN......................................................................................172
SNMPv3 Encryption......................................................................................................................................174
Encrypting Transmitted Passwords...............................................................................................................176
Specifying a Driver Encryption Key.........................................................................................................176
Specifying an IPP Authentication Password............................................................................................177
Kerberos Authentication Encryption Setting................................................................................................179
6. Preventing the Leaking of Documents
Configuring Access Permissions for Stored Files.........................................................................................181
Configuring Access Permission for Each Stored File..............................................................................182
Changing the Owner of a Document......................................................................................................185
Configuring Access Permission for Each User for Stored Files..............................................................185
Specifying Passwords for Stored Files..........................................................................................................188
Unlocking Stored Files
..............................................................................................................................189
4