User Setting for SSL/TLS...........................................................................................................................138
Setting the SSL/TLS Encryption Mode.....................................................................................................139
Enabling SSL for SMTP Connections.......................................................................................................140
Configuring S/MIME....................................................................................................................................142
E-mail Encryption.......................................................................................................................................142
Attaching an Electronic Signature............................................................................................................144
Specifying Checking of the Certificate Valid Period...............................................................................
146
Configuring PDFs with Electronic Signatures...............................................................................................148
Selecting the Device Certificate...............................................................................................................148
Configuring IPsec...........................................................................................................................................149
Encryption and Authentication by IPsec..................................................................................................149
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................150
IPsec Settings.............................................................................................................................................151
Encryption Key Auto Exchange Settings Configuration Flow................................................................161
Encryption Key Manual Settings Configuration Flow.............................................................................165
telnet Setting Commands..........................................................................................................................166
Configuring IEEE 802.1X Authentication.....................................................................................................174
Installing a Site Certificate........................................................................................................................174
Selecting the Device Certificate...............................................................................................................175
Setting Items of IEEE 802.1X for Ethernet................................................................................................175
Setting Items of IEEE 802.1X for Wireless LAN......................................................................................177
SNMPv3 Encryption......................................................................................................................................179
Encrypting Transmitted Passwords...............................................................................................................181
Specifying a Driver Encryption Key.........................................................................................................181
Specifying an IPP Authentication Password............................................................................................182
Kerberos Authentication Encryption Setting................................................................................................184
6. Preventing the Leaking of Documents
Configuring Access Permissions for Stored Files.........................................................................................185
Configuring Access Permission for Each Stored File..............................................................................186
Changing the Owner of a Document......................................................................................................189
Configuring Access Permission for Each User for Stored Files..............................................................190
Specifying Passwords for Stored Files..........................................................................................................
192
Unlocking Stored Files..............................................................................................................................193
4