Olivetti d-Color MF551 Network Administrator's Manual page 8

Hide thumbs Also See for d-Color MF551:
Table of Contents

Advertisement

2.42.2
External Server Settings................................................................................................................. 2-137
2.42.3
Authentication Method................................................................................................................... 2-138
2.42.4
Default Function Permission .......................................................................................................... 2-138
2.42.5
Client Setting.................................................................................................................................. 2-139
2.42.6
WINS Setting.................................................................................................................................. 2-139
2.42.7
Direct Hosting Setting.................................................................................................................... 2-139
2.43
Restricting users of this machine (NDS over IPX/SPX) ........................................................... 2-140
2.43.1
External Server Settings................................................................................................................. 2-140
2.43.2
Authentication Method................................................................................................................... 2-141
2.43.3
Default Function Permission .......................................................................................................... 2-141
2.43.4
NetWare Settings ........................................................................................................................... 2-142
2.44
Restricting users of this machine (NDS over TCP/IP) ............................................................. 2-143
2.44.1
TCP/IP Settings.............................................................................................................................. 2-143
2.44.2
External Server Settings................................................................................................................. 2-144
2.44.3
Authentication Method................................................................................................................... 2-145
2.44.4
Default Function Permission .......................................................................................................... 2-145
2.45
Restricting users of this machine (LDAP) ................................................................................. 2-146
2.45.1
TCP/IP Settings.............................................................................................................................. 2-146
2.45.2
External Server Settings................................................................................................................. 2-147
2.45.3
Authentication Method................................................................................................................... 2-148
2.45.4
Default Function Permission .......................................................................................................... 2-148
2.45.5
LDAP over SSL .............................................................................................................................. 2-148
External Server Settings................................................................................................................. 2-148
Setting Up LDAP (Certificate Verification Level Settings) .............................................................. 2-149
Certificate Verification Settings...................................................................................................... 2-149
2.46
Filtering IP addresses ................................................................................................................. 2-151
2.46.1
TCP/IP Settings.............................................................................................................................. 2-151
2.46.2
IP Filtering ...................................................................................................................................... 2-151
2.47
Communicating using IPv6 ........................................................................................................ 2-153
TCP/IP Setting ............................................................................................................................... 2-154
2.48
Communicating using IPsec ...................................................................................................... 2-156
2.48.1
TCP/IP Settings.............................................................................................................................. 2-156
2.48.2
IPsec .............................................................................................................................................. 2-157
2.48.3
IKE.................................................................................................................................................. 2-157
IKE.................................................................................................................................................. 2-157
IKE Setting ..................................................................................................................................... 2-158
2.48.4
SA................................................................................................................................................... 2-158
SA................................................................................................................................................... 2-158
SA Setting ...................................................................................................................................... 2-158
2.48.5
Peer................................................................................................................................................ 2-159
2.49
Using IEEE802.1X authentication .............................................................................................. 2-160
2.49.1
TCP/IP Settings.............................................................................................................................. 2-160
2.49.2
Device Certificate Setting .............................................................................................................. 2-160
2.49.3
IEEE802.1X Authentication Setting................................................................................................ 2-161
2.49.4
Certificate validation ...................................................................................................................... 2-163
IEEE802.1X Authentication Setting................................................................................................ 2-163
Certificate Verification Settings...................................................................................................... 2-163
2.49.5
IEEE802.1X Authentication Trial .................................................................................................... 2-164
2.50
Using applications that communicate with this machine with TCP Socket.......................... 2-165
2.50.1
TCP/IP Settings.............................................................................................................................. 2-165
2.50.2
Device Certificate Setting .............................................................................................................. 2-165
2.50.3
TCP Socket Settings...................................................................................................................... 2-166
2.51
Linking an OpenAPI system with this machine........................................................................ 2-167
2.51.1
TCP/IP Settings.............................................................................................................................. 2-167
2.51.2
Device Certificate Setting .............................................................................................................. 2-167
2.51.3
OpenAPI Setting ............................................................................................................................ 2-168
2.51.4
Certificate validation ...................................................................................................................... 2-169
Contents-6
d-Color MF651/551

Advertisement

Table of Contents
loading

This manual is also suitable for:

D-color mf651

Table of Contents