Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)............. 81
Creating and Installing a Device Certificate from Web Image Monitor (Self-Signed Certificate)....... 82
Creating a Device Certificate (Issued by a Certificate Authority)............................................................83
Installing a Device Certificate (Issued by a Certificate Authority)............................................................83
Installing an Intermediate Certificate (Issued by a Certificate Authority)................................................ 84
Configuring SSL/TLS Settings......................................................................................................................... 86
Enabling SSL/TLS........................................................................................................................................ 87
User Setting for SSL/TLS............................................................................................................................. 88
Setting SSL/TLS Encryption Mode............................................................................................................. 88
Enabling SSL for SMTP Connections..........................................................................................................90
Configuring IPsec Settings............................................................................................................................... 91
Encryption and Authentication by IPsec.....................................................................................................91
Encryption Key Auto Exchange Settings.................................................................................................... 92
IPsec Settings................................................................................................................................................93
Encryption Key Auto Exchange Settings Configuration Flow...................................................................99
telnet Setting Commands.......................................................................................................................... 103
Configuring IEEE 802.1X Authentication.....................................................................................................108
Installing a Site Certificate........................................................................................................................ 108
Selecting the Device Certificate............................................................................................................... 109
Setting Items of IEEE 802.1X for Ethernet................................................................................................109
SNMPv3 Encryption......................................................................................................................................112
Kerberos Authentication Encryption Setting................................................................................................ 113
6. Managing the Machine
Managing Log Files.......................................................................................................................................115
Using Web Image Monitor to Manage Log Files....................................................................................... 116
Logs That Can Be Managed Using Web Image Monitor......................................................................116
Attributes of Logs You Can Download.................................................................................................... 118
Specifying Log Collect Settings................................................................................................................ 138
Downloading Logs.................................................................................................................................... 139
Number of Logs That Can Be Kept on the Machine...............................................................................140
Notes on Operation When the Number of Log Entries Reaches the Maximum.................................. 141
Deleting All Logs........................................................................................................................................143
Disabling Log Transfer to the Log Collection Server...............................................................................143
3