
Preventing Unauthorized Access..................................................................................................................181
Access Control...........................................................................................................................................181
Enabling/Disabling Protocols..................................................................................................................182
Specifying Network Security Level..........................................................................................................190
Encrypting Transmitted Passwords...............................................................................................................194
Driver Encryption Key...............................................................................................................................194
Group Password for PDF files...................................................................................................................196
IPP Authentication Password.....................................................................................................................197
Protection Using Encryption..........................................................................................................................199
SSL (Secure Sockets Layer) Encryption....................................................................................................199
User Settings for SSL (Secure Sockets Layer)..........................................................................................204
Setting the SSL / TLS Encryption Mode...................................................................................................204
SNMPv3 Encryption.................................................................................................................................206
Transmission Using IPsec...............................................................................................................................209
Encryption and Authentication by IPsec..................................................................................................209
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................210
IPsec Settings.............................................................................................................................................211
Encryption Key Auto Exchange Settings Configuration Flow................................................................218
Encryption Key Manual Settings Configuration Flow.............................................................................223
telnet Setting Commands..........................................................................................................................224
Authentication by telnet.................................................................................................................................232
"authfree" Command.................................................................................................................................232
6. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................233
Changing the Extended Security Functions.............................................................................................233
Procedure for Changing the Extended Security Functions.....................................................................233
Settings.......................................................................................................................................................235
Other Security Functions...............................................................................................................................240
Fax Function...............................................................................................................................................240
Scanner Function.......................................................................................................................................240
Weekly Timer Code..................................................................................................................................241
Limiting Machine Operation to Customers Only.........................................................................................244
Settings.......................................................................................................................................................244
6
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...