SecuritySecurity ................................................................................................................................................................ 251Protecting the Machine from Unauthorized Access ....................................................................................... 252Preventing Unauthorized Access .................................................................................................................. 253Setting Access Privileges .............................................................................................................................. 255Setting the System Manager Password .................................................................................................. 256Setting the Department ID Management .............................................................................................. 259Setting a Remote UI PIN ........................................................................................................................ 266Restricting Communication by Using Firewalls ............................................................................................. 267Specifying IP Addresses for Firewall Rules ............................................................................................. 268Specifying MAC Addresses for Firewall Rules ......................................................................................... 274Setting a Proxy ............................................................................................................................................. 277Restricting the Machine's Functions ................................................................................................................ 280Restricting the Printing Operations .............................................................................................................. 281Restricting USB Functions ............................................................................................................................. 285Restricting Operation Panel Functions ......................................................................................................... 288Disabling HTTP Communication ................................................................................................................... 291Disabling Remote UI ..................................................................................................................................... 292Disabling the LAN Port ................................................................................................................................. 293Hiding the Print Job History .......................................................................................................................... 294Implementing Robust Security Features ......................................................................................................... 296Using TLS for Encrypted Communications .................................................................................................... 297Configuring IPSec Settings ........................................................................................................................... 301Configuring IEEE 802.1X Authentication ....................................................................................................... 312Configuring Settings for Key Pairs and Digital Certificates ........................................................................... 318Generating Key Pairs ............................................................................................................................. 320Using CA-issued Key Pairs and Digital Certificates ................................................................................. 329Verifying Key Pairs and Digital Certificates ............................................................................................. 332Security250