Secure Function Lock 2.0 .....................................................................................................................144
(web browser)..............................................................................................................................145
12
Overview................................................................................................................................................153
13
Internet fax Overview.............................................................................................................................154
Getting connected ...........................................................................................................................154
Control panel key functions .............................................................................................................155
Sending an Internet fax ...................................................................................................................155
Manually entering text .....................................................................................................................156
Relay broadcasting..........................................................................................................................157
TX Verification Mail..........................................................................................................................160
Setup Mail TX ..................................................................................................................................160
Setup Mail RX..................................................................................................................................160
Error mail .........................................................................................................................................160
14
Overview................................................................................................................................................164
Security terms..................................................................................................................................164
Security protocols ............................................................................................................................165
Specifying a different URL...............................................................................................................170
®
) .................................................169
153
154
164
viii