Top
Security
Protecting the Machine from Unauthorized Access
Preventing Unauthorized Access
Setting Access Privileges
Setting the System Manager ID
Setting the Department ID Management
Setting a Remote UI PIN
LDAP Server Authentication
Restricting Communication by Using Firewalls
Specifying IP Addresses for Firewall Rules
Specifying MAC Addresses for Firewall Rules
Changing Port Numbers
Setting a Proxy
Restricting the Machine's Functions
Restricting Access to Address Book and Sending Functions
Setting a PIN for Address Book
Limiting Available Destinations
Prohibiting PC Faxing (MF515x)
Disabling Use of Previously Used Destinations
Checking Destinations before Sending Documents
Prohibiting Sequential Broadcasting (MF515x)
Restricting USB Functions
Disabling HTTP Communication
Disabling Remote UI
Implementing Robust Security Features
Enabling TLS Encrypted Communication for the Remote UI
Configuring IPSec Settings
Configuring IEEE 802.1X Authentication
Configuring Settings for Key Pairs and Digital Certificates
Generating Key Pairs
Using CA-issued Key Pairs and Digital Certificates
Verifying Key Pairs and Digital Certificates