Wired Enable ....................................................................................................................................35
WLAN Enable ...................................................................................................................................35
IPsec..................................................................................................................................................35
Printing the WLAN report.........................................................................................................................38
5
Overview..................................................................................................................................................42
Setting a password ..................................................................................................................................44
(web browser)................................................................................................................................45
Secure Function Lock 2.0 ........................................................................................................................46
(web browser)................................................................................................................................46
Store Print Log to Network.......................................................................................................................49
(web browser)................................................................................................................................49
Error Detection Setting ......................................................................................................................50
Storage Print............................................................................................................................................53
IPsec........................................................................................................................................................53
6
Overview..................................................................................................................................................54
Sending an E-mail securely .....................................................................................................................60
Choosing the certificate .....................................................................................................................73
®
)..........................................................56
42
54
iii