Managing the Machine
Managing the Machine ...............................................................................................................................
161
Setting Access Privileges .................................................................................................................................. 163
Setting the System Manager PIN .................................................................................................................. 164
Setting a Remote UI PIN ............................................................................................................................... 166
Conguring the Network Security Settings .................................................................................................... 168
Restricting Communication by Using Firewalls ............................................................................................. 170
Specifying IP Addresses for Firewall Settings ......................................................................................... 171
Specifying MAC Addresses for Firewall Settings ..................................................................................... 174
Changing Port Numbers ............................................................................................................................... 176
Setting a Proxy ............................................................................................................................................. 177
Conguring the Key and Certicate for TLS .................................................................................................. 179
Generating the Key and Certicate for Network Communication .......................................................... 181
Generating a Key and Certicate Signing Request (CSR) ........................................................................ 184
Registering the Key and Certicate for Network Communication .......................................................... 187
Conguring IEEE 802.1X Authentication Settings ......................................................................................... 189
Restricting the Machine's Functions ................................................................................................................ 193
Restricting USB Functions ............................................................................................................................. 194
Disabling HTTP Communication ................................................................................................................... 195
Disabling Remote UI ..................................................................................................................................... 196
Managing the Machine from a Computer (Remote UI) ................................................................................... 197
Starting Remote UI ....................................................................................................................................... 198
Checking the Status and Logs ....................................................................................................................... 201
Setting Up Menu Options from Remote UI ................................................................................................... 205
Updating the Firmware ..................................................................................................................................... 208
Initializing Settings ........................................................................................................................................... 210
Managing the Machine
160
Comments to this Manuals