Network ............................................................................................................................................................ 158
Connecting to a Network ...................................................................................................................................... 159
Selecting Wired LAN or Wireless LAN .................................................................................................................. 161
Connecting to a Wired LAN ................................................................................................................................ 162
Connecting to a Wireless LAN ............................................................................................................................. 163
Setting Up Connection Using WPS Push Button Mode ..................................................................................... 165
Setting Up Connection Using WPS PIN Code Mode ......................................................................................... 167
Setting Up Connection by Selecting a Wireless Router ..................................................................................... 170
Setting Up Connection by Specifying Detailed Settings .................................................................................... 173
Checking the SSID and Network Key ............................................................................................................. 177
Setting IP Addresses ......................................................................................................................................... 180
Setting IPv4 Address ................................................................................................................................... 181
Setting IPv6 Addresses ................................................................................................................................ 184
Viewing Network Settings ..................................................................................................................................... 187
Conguring the Machine for Printing from a Computer .......................................................................................... 190
Conguring Printing Protocols and WSD Functions ............................................................................................... 191
Conguring Printer Ports ................................................................................................................................... 194
Setting Up Print Server ...................................................................................................................................... 197
Conguring the Machine for Your Network Environment ....................................................................................... 200
Conguring Ethernet Settings ............................................................................................................................ 201
Changing the Maximum Transmission Unit .......................................................................................................... 203
Setting a Wait Time for Connecting to a Network .................................................................................................. 204
Conguring DNS .............................................................................................................................................. 205
Conguring SNTP ............................................................................................................................................. 209
Monitoring and Controlling the Machine with SNMP ............................................................................................. 211
Security .............................................................................................................................................................. 217
Protecting the Machine from Unauthorized Access ................................................................................................ 218
Preventing Unauthorized Access ........................................................................................................................ 219
Setting Access Privileges .................................................................................................................................... 221
Setting the System Manager PIN .................................................................................................................. 222
Setting a Remote UI PIN .............................................................................................................................. 224
Restricting Communication by Using Firewalls ...................................................................................................... 226
Specifying IP Addresses for Firewall Rules ...................................................................................................... 227
Specifying MAC Addresses for Firewall Rules .................................................................................................. 231
Changing Port Numbers .................................................................................................................................... 234
Setting a Proxy ................................................................................................................................................. 236
Restricting the Machine's Functions ....................................................................................................................... 238
Disabling HTTP Communication ......................................................................................................................... 239
Disabling Remote UI ......................................................................................................................................... 240
Implementing Robust Security Features ................................................................................................................ 241
Enabling TLS Encrypted Communication for the Remote UI ................................................................................... 242
Conguring IEEE 802.1X Authentication ............................................................................................................... 245
Conguring Settings for Key Pairs and Digital Certicates ...................................................................................... 250
III