Security
Security ................................................................................................................................................................
343
Setting the Department ID and PIN for the Administrator ............................................................................ 344
Protecting the Network .................................................................................................................................... 347
Setting the Firewall ....................................................................................................................................... 348
Changing the Port Number .......................................................................................................................... 351
Using a Proxy ............................................................................................................................................... 352
Using TLS ...................................................................................................................................................... 354
Using IEEE 802.1X ......................................................................................................................................... 356
Managing and Verifying a Key and Certiî ´cate .............................................................................................. 358
Generating a Key and Certiî ´cate ........................................................................................................... 359
Generating a Key and Certiî ´cate Signing Request (CSR) and Obtaining and Registering a Certiî ´cate ... 361
Registering a Key and Certiî ´cate or CA Certiî ´cate Obtained from an Issuing Authority ........................ 364
Verifying a Received Certiî ´cate with OCSP ............................................................................................. 366
Preventing Sending Data by Mistake and Leaking Information .................................................................... 367
Limiting Available Destinations .................................................................................................................... 368
Conî ´rming the Destination before Sending ................................................................................................. 370
Restricting Fax Sending ................................................................................................................................ 372
Restricting Use from a Mobile Device ........................................................................................................... 374
Restricting Printing ....................................................................................................................................... 375
Saving Received Documents in the Machine (Memory Lock) .................................................................. 376
Preventing Unauthorized Use .......................................................................................................................... 379
Restricting Address Book Registration and Editing ....................................................................................... 380
Restricting Use of Remote UI ........................................................................................................................ 382
Preventing Connection to Computer via USB Port ........................................................................................ 385
Conî ´guring LPD, RAW, or WSD ..................................................................................................................... 386
Disabling HTTP Communication ................................................................................................................... 388
Security
342