Logs That Can Be Managed Using Web Image Monitor......................................................................131
7. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................145
Access Control...........................................................................................................................................145
Enabling and Disabling Protocols............................................................................................................146
Specifying Network Security Level..........................................................................................................151
Encrypting Transmitted Passwords...............................................................................................................155
Specifying a Driver Encryption Key.........................................................................................................155
Protection Using Encryption..........................................................................................................................157
SSL (Secure Sockets Layer) Encryption....................................................................................................157
User Settings for SSL (Secure Sockets Layer)..........................................................................................162
Setting the SSL/TLS Encryption Mode.....................................................................................................162
SNMPv3 Encryption.................................................................................................................................164
Transmission Using IPsec...............................................................................................................................166
Encryption and Authentication by IPsec..................................................................................................166
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................167
IPsec Settings.............................................................................................................................................168
Encryption Key Auto Exchange Settings Configuration Flow................................................................176
Encryption Key Manual Settings Configuration Flow.............................................................................181
telnet Setting Commands..........................................................................................................................182
Authentication by IEEE802.1X.....................................................................................................................190
8. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................191
Changing the Extended Security Functions.............................................................................................191
Extended Security Settings........................................................................................................................192
Other Security Functions...............................................................................................................................196
Scanner Function.......................................................................................................................................196
System Status.............................................................................................................................................196
Weekly Timer Code..................................................................................................................................196
Limiting Machine Operations to Customers Only.......................................................................................199
Settings.......................................................................................................................................................199
Additional Information for Enhanced Security............................................................................................202
Settings You Can Configure Using the Control Panel............................................................................202
4