Secure Function Lock 2.0 .....................................................................................................................143
(web browser)..............................................................................................................................144
12
Overview................................................................................................................................................151
13
Internet fax Overview.............................................................................................................................152
Getting connected ...........................................................................................................................152
Control panel key functions .............................................................................................................153
Sending an Internet fax ...................................................................................................................153
Manually entering text .....................................................................................................................154
Relay broadcasting..........................................................................................................................155
TX Verification Mail..........................................................................................................................158
Setup Mail TX ..................................................................................................................................158
Setup Mail RX..................................................................................................................................158
Error mail .........................................................................................................................................158
14
Overview................................................................................................................................................162
Security terms..................................................................................................................................162
Security protocols ............................................................................................................................163
Specifying a different URL...............................................................................................................168
®
) ............................................167
151
152
162
viii