Configuring DNS .............................................................................................................................................. 213Configuring WINS ............................................................................................................................................. 219Configuring SNTP ............................................................................................................................................. 222Monitoring and Controlling the Machine with SNMP ............................................................................................. 225Configuring Settings for Device Management Software ......................................................................................... 231Configuring SMB .............................................................................................................................................. 235Configuring Settings on the Computer for Printing ......................................................................................... 238Security .............................................................................................................................................................. 241Protecting the Machine from Unauthorized Access ................................................................................................ 242Preventing Unauthorized Access ........................................................................................................................ 243Setting Access Privileges .................................................................................................................................... 245Setting the System Manager Password .......................................................................................................... 246Setting the Department ID Management ....................................................................................................... 249Setting a Remote UI PIN .............................................................................................................................. 256Restricting Communication by Using Firewalls ..................................................................................................... 257Specifying IP Addresses for Firewall Rules ...................................................................................................... 258Specifying MAC Addresses for Firewall Rules .................................................................................................. 264Setting a Proxy ................................................................................................................................................. 267Restricting the Machine's Functions ...................................................................................................................... 270Restricting the Printing Operations ..................................................................................................................... 271Restricting USB Functions .................................................................................................................................. 275Restricting Operation Panel Functions ................................................................................................................. 278Disabling HTTP Communication ......................................................................................................................... 281Disabling Remote UI ......................................................................................................................................... 282Disabling the LAN Port ...................................................................................................................................... 283Hiding the Print Job History ................................................................................................................................ 284Implementing Robust Security Features ................................................................................................................ 286Using TLS for Encrypted Communications ............................................................................................................ 287Configuring IPSec Settings ................................................................................................................................. 291Configuring IEEE 802.1X Authentication ............................................................................................................... 302Configuring Settings for Key Pairs and Digital Certificates ...................................................................................... 308Generating Key Pairs ................................................................................................................................... 310Using CA-issued Key Pairs and Digital Certificates ........................................................................................... 319Verifying Key Pairs and Digital Certificates ..................................................................................................... 322Using Remote UI ........................................................................................................................................ 325Starting Remote UI ............................................................................................................................................... 326Remote UI Screens ................................................................................................................................................ 329Managing Documents and Checking the Machine Status ........................................................................................ 335Enabling End Users to Operate Documents .......................................................................................................... 342Setting Up Menu Options from Remote UI ............................................................................................................. 345Saving/Loading Registered Data ............................................................................................................................ 347Saving Registered Data ..................................................................................................................................... 348Loading Registered Data ................................................................................................................................... 350III