Contents > 4
Adding a telephone handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Managing the phone book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Adding a speed dial entry to the phone book . . . . . . . . . . . . . . . . . . . .42
Adding a group entry to the phone book . . . . . . . . . . . . . . . . . . . . . . .43
Deleting a speed dial entry from the phone book. . . . . . . . . . . . . . . . . .43
Deleting a group dial entry from the phone book. . . . . . . . . . . . . . . . . .43
Modifying a speed dial entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Modifying a group dial entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Sorting speed dial entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Sorting group dial entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Searching a speed dial entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Searching a group dial entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Registering an entry from reception or transmission history . . . . . . . . . .45
User authentication and access control . . . . . . . . . . . . . . . . . . . . . . . . .46
Registering a PIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Enabling PIN authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Operation when PIN authentication is enabled . . . . . . . . . . . . . . . . . . .48
User name and password authentication . . . . . . . . . . . . . . . . . . . . . . . . .49
Registering a user name and password . . . . . . . . . . . . . . . . . . . . . . . .49
Enabling user name and password authentication . . . . . . . . . . . . . . . . .49
Operation when user name and password authentication is enabled . . . .49
Operation from the computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Advanced network settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Configuring the wireless LAN (WPA/WPA2-EAP) from the Web Page
IEEE802.1X settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Wireless(Infrastructure) settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Changing network settings from the web page . . . . . . . . . . . . . . . . . . . . .56
Encrypting Communication by SSL/TLS . . . . . . . . . . . . . . . . . . . . . . . .56
IPP printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Encrypting communication by IPSec . . . . . . . . . . . . . . . . . . . . . . . . . .60
Controlling access using IP address (IP filtering) . . . . . . . . . . . . . . . . . .63
Controlling access using MAC address (MAC address filtering) . . . . . . . .63
Error notification by E-mail (E-mail alert) . . . . . . . . . . . . . . . . . . . . . . .64
Checking IPv6 address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Using IEEE802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Configuring your machine for IEEE802.1X . . . . . . . . . . . . . . . . . . . . . .67
Connecting your machine to authentication switch . . . . . . . . . . . . . . . .68
Configuring LDAP server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Configuring secure protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Printing without printer driver (direct printing) . . . . . . . . . . . . . . . . . . . . .70
Printing PDFs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Configuring server to print files attached to E-mails. . . . . . . . . . . . . . . .70
Initializing network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Configuring DHCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Configuring your machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73