Top
Security
Protecting the Machine from Unauthorized Access
Preventing Unauthorized Access
Setting Access Privileges
Setting the System Manager ID
Setting the Department ID Management
Setting a Remote UI PIN
Restricting Communication by Using Firewalls
Specifying IP Addresses for Firewall Rules
Specifying MAC Addresses for Firewall Rules
Changing Port Numbers
Setting a Proxy
Restricting the Machine's Functions
Restricting Access to Address Book and Sending Functions
Setting a PIN for Address Book
Limiting Available Destinations
Prohibiting PC Faxing(imageRUNNER C1225iF)
Disabling Use of Previously Used Destinations
Checking Destinations before Sending Documents
Prohibiting Sequential Broadcasting(imageRUNNER C1225iF)
Restricting USB Functions
Disabling HTTP Communication
Disabling Remote UI
Implementing Robust Security Features
Enabling TLS Encrypted Communication for the Remote UI
Configuring IPSec Settings
Configuring IEEE 802.1X Authentication
Configuring Settings for Key Pairs and Digital Certificates
Generating Key Pairs
Using CA-issued Key Pairs and Digital Certificates
Generating a Device Signature Key
Verifying Key Pairs, Device Signature Keys, and Certificates