User Manual

Table Of Contents
Configure Your Machine for a Wireless Network Using the PIN Method of Wi-Fi Protected
Setup
(WPS).................................................................................................................................. 341
Configure Your Machine for a Wireless Network When the SSID is Not Broadcast......................... 343
Configure Your Machine for an Enterprise Wireless Network .......................................................... 345
Use Wi-Fi Direct
®
............................................................................................................................. 347
Advanced Network Features...................................................................................................................... 356
Print the Network Configuration Report............................................................................................ 357
Fax Using the Internet (I-Fax) .......................................................................................................... 358
Configure and Operate LDAP Search .............................................................................................. 377
Synchronize Time with the SNTP Server Using Web Based Management ..................................... 380
Technical Information for Advanced Users................................................................................................. 383
Reset the Network Settings to Factory Default ................................................................................ 384
Print the WLAN Report..................................................................................................................... 385
Security .............................................................................................................................................. 388
Before Using Network Security Features ................................................................................................... 389
Secure Function Lock 3.0 .......................................................................................................................... 390
Before Using Secure Function Lock 3.0........................................................................................... 391
Configure Secure Function Lock 3.0 Using Web Based Management ............................................ 392
Scan Using Secure Function Lock 3.0 ............................................................................................. 393
Configure Public Mode for Secure Function Lock 3.0 ...................................................................... 394
Additional Secure Function Lock 3.0 Features................................................................................. 395
Register a new IC Card Using Machine's Control Panel .................................................................. 396
Register an External IC Card Reader............................................................................................... 397
Use Active Directory Authentication........................................................................................................... 398
Introduction to Active Directory Authentication................................................................................. 399
Configure Active Directory Authentication Using Web Based Management .................................... 400
Log On to Change the Machine Settings Using the Machine's Control Panel (Active Directory
Authentication) ................................................................................................................................. 401
Use LDAP Authentication........................................................................................................................... 402
Introduction to LDAP Authentication ................................................................................................ 403
Configure LDAP Authentication Using Web Based Management.................................................... 404
Log On to Change the Machine Settings Using the Machine's Control Panel (LDAP
Authentication) ................................................................................................................................. 405
Manage Your Network Machine Securely Using SSL/TLS ........................................................................ 406
Certificates and Web Based Management....................................................................................... 407
Manage Your Network Machine Securely Using IPsec .............................................................................. 429
Introduction to IPsec......................................................................................................................... 430
Configure IPsec Using Web Based Management ............................................................................ 431
Configure an IPsec Address Template Using Web Based Management ......................................... 432
Configure an IPsec Template Using Web Based Management ....................................................... 434
Send or Receive an Email Securely........................................................................................................... 443
Configure Email Sending or Receiving Using Web Based Management......................................... 444
Send an Email with User Authentication .......................................................................................... 445
Send or Receive an Email Securely Using SSL/TLS ....................................................................... 446
Use IEEE 802.1x Authentication for a Wired or a Wireless Network ......................................................... 447
What Is IEEE 802.1x Authentication? .............................................................................................. 448
Configure IEEE 802.1x Authentication for a Wired or a Wireless Network Using Web Based
Management (Web Browser)............................................................................................................ 449
Home > Table of Contents
iv