Disabling Menu Protect.............................................................................................................................139
Specifying Menu Protect...........................................................................................................................139
Limiting Available Functions..........................................................................................................................143
Specifying Which Functions are Available.............................................................................................143
Managing Log Files.......................................................................................................................................145
Using the Control Panel to Specify Log File Settings..............................................................................145
Using Remote Communication Gate S to Manage Log Files................................................................147
Using Web Image Monitor to Manage Log Files...................................................................................147
Logs That Can Be Managed Using Web Image Monitor......................................................................155
7. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................171
Access Control...........................................................................................................................................171
Enabling and Disabling Protocols............................................................................................................172
Specifying Network Security Level..........................................................................................................179
Encrypting Transmitted Passwords...............................................................................................................183
Specifying a Driver Encryption Key.........................................................................................................183
Specifying an IPP Authentication Password............................................................................................184
Protection Using Encryption..........................................................................................................................186
SSL (Secure Sockets Layer) Encryption....................................................................................................186
User Settings for SSL (Secure Sockets Layer)..........................................................................................191
Setting the SSL/TLS Encryption Mode.....................................................................................................191
SNMPv3 Encryption.................................................................................................................................193
Transmission Using IPsec...............................................................................................................................195
Encryption and Authentication by IPsec..................................................................................................195
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................196
IPsec Settings.............................................................................................................................................197
Encryption Key Auto Exchange Settings Configuration Flow................................................................205
Encryption Key Manual Settings Configuration Flow.............................................................................210
telnet Setting Commands..........................................................................................................................211
Authentication by telnet.................................................................................................................................219
"authfree" Command.................................................................................................................................219
Authentication by IEEE802.1X.....................................................................................................................220
4