Authentication by telnet.................................................................................................................................206
"authfree" Command.................................................................................................................................206
Authentication by IEEE802.1X.....................................................................................................................207
8. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................209
Changing the Extended Security Functions.............................................................................................209
Procedure for Changing the Extended Security Functions.....................................................................209
Settings.......................................................................................................................................................210
Other Security Functions...............................................................................................................................215
Fax Function...............................................................................................................................................215
Scanner Function.......................................................................................................................................215
Limiting Machine Operation to Customers Only.........................................................................................217
Settings.......................................................................................................................................................217
Specifying Service Mode Lock Preparation............................................................................................217
Canceling Service Mode Lock.................................................................................................................218
Additional Information Enhanced Security..................................................................................................220
Settings to configure using the Control panel.........................................................................................220
Settings to configure using Web Image Monitor....................................................................................222
Settings when IPsec is available / unavailable......................................................................................223
9. Troubleshooting
Authentication Does Not Work Properly.....................................................................................................227
A Message Appears.................................................................................................................................227
An Error Code Appears............................................................................................................................229
Machine Cannot Be Operated................................................................................................................244
10. Appendix
Supervisor Operations..................................................................................................................................249
Logging on as the Supervisor...................................................................................................................249
Logging off as the Supervisor...................................................................................................................250
Changing the Supervisor..........................................................................................................................250
Resetting an Administrator's Password....................................................................................................251
Machine Administrator Settings....................................................................................................................253
System Settings..........................................................................................................................................253
Copier / Document Server Features.......................................................................................................256
5