Aficio C6055 Operating Instructions Manual Download Page 1

8

Getting Started

Authentication and its Application

Ensuring Information Security

Managing Access to the Machine

Enhanced Network Security

Specifying the Extended Security Functions

Troubleshooting

Appendix

1

2

3

4

5

6

7

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information 
in "About This Machine" before using the machine.

Security Reference

Operating Instructions

Summary of Contents for C6055

Page 1: ...urity Specifying the Extended Security Functions Troubleshooting Appendix 1 2 3 4 5 6 7 Read this manual carefully before you use this machine and keep it handy for future reference For safe and corre...

Page 2: ...bank notes revenue stamps bonds stock certificates bank drafts checks passports driver s licenses The preceding list is meant as a guide only and is not inclusive We assume no responsibility for its c...

Page 3: ...sure to read the Safety Information in this manual before using the machine This manual provides an introduction to the functions of the machine It also explains the control panel preparation procedur...

Page 4: ...PostScript 3 UNIX Supplement For UNIX Supplement please visit our Web site or consult an authorized dealer This manual includes descriptions of functions and settings that might not be available on t...

Page 5: ...ion Administrators and Users 19 Administrators 19 User 20 The Management Function 22 About Administrator Authentication 22 About User Authentication 23 Enabling Authentication 25 Authentication Settin...

Page 6: ...ontrol Panel 91 User Code Authentication Using a Printer Driver 92 Login Using the Control Panel 92 Log Off Using the Control Panel 93 Login Using a Printer Driver 94 Login Using Web Image Monitor 94...

Page 7: ...ail Transmission 133 Email Encryption 133 Attaching an Electronic Signature 135 Protecting the Address Book 141 Address Book Access Permission 141 Encrypting Data in the Address Book 144 Encrypting Da...

Page 8: ...Authentication by IPsec 209 Encryption Key Auto Exchange Settings and Encryption Key Manual Settings 210 IPsec Settings 211 Encryption Key Auto Exchange Settings Configuration Flow 218 Encryption Key...

Page 9: ...assword 275 Machine Administrator Settings 277 System Settings 277 Maintenance 280 Copier Document Server Features 280 Facsimile Features 280 Printer Features 282 Scanner Features 283 Settings via Web...

Page 10: ...ccount Settings in the Address Book 299 User Settings Control Panel Settings 302 Copier Document Server Features 303 Printer Functions 309 Printer Features 310 Scanner Features 314 Facsimile Features...

Page 11: ...This Machine Indicates points to pay attention to when using the machine and explanations of likely causes of paper misfeeds damage to originals or loss of data Be sure to read these explanations Ind...

Page 12: ...10...

Page 13: ...ific areas of machine usage such as settings and user registration Access limits for each user are specified by the administrator responsible for user access to machine functions and documents and dat...

Page 14: ...address are stored in the machine s Address Book Personal information can be obtained from the Windows domain controller Windows authentication LDAP Server LDAP authentication or Integration Server I...

Page 15: ...icate see Protection Using Encryption 9 Enable secure sockets layer SSL 10 Enter the administrator s user name and password For details about specifying the administrator user name and password see Re...

Page 16: ...p 38 Using Web Image Monitor p 199 Protection Using Encryption p 30 Registering the Administrator 1 Getting Started 14 1...

Page 17: ...gistered users By making this setting you can limit the functions available to users For details about specifying which functions are available see Limiting Available Functions p 25 Enabling Authentic...

Page 18: ...s about preventing data leaks due to unauthorized transmission see Preventing Data Leaks Due to Unauthorized Transmission Using S MIME to Protect Email Transmission When sending mail from the scanner...

Page 19: ...the Hard Disk Limiting and Controlling Access Preventing Modification or Deletion of Stored Data You can allow selected users to access stored scan files and files stored in Document Server You can p...

Page 20: ...ng revealed by encrypting them for transmission Also encrypt the login password for administrator authentication and user authentication For details about encrypting transmitted passwords see Encrypti...

Page 21: ...rk you can use the machine by accessing it using administrator authentication and disabling user authentication Do this if for instance you need to use the machine urgently p 50 Specifying Login User...

Page 22: ...correct network operation For instructions on registering the network administrator see Registering the Administrator File Administrator This is the administrator who manages permission to access sto...

Page 23: ...For details about registering users in the Address Book see Administrator Tools General Settings Guide SmartDeviceMonitor for Admin Help or Web Image Monitor Help Administrators and Users 21 2...

Page 24: ...istrator login user name and login password If an administrator login user name or login password is forgotten a new password must be specified using the supervisor s authority Be sure not to forget t...

Page 25: ...ing and receiving e mail can be specified by the network administrator only 4 File Administrator This administrator manages permission to access stored files You can specify passwords for Locked Print...

Page 26: ...g and printing 3 Unauthorized User 4 Authentication Using a login user name and password user authentication is performed 5 This Machine 6 Access Limit Using authentication unauthorized users are prev...

Page 27: ...cation Setting Procedure Specify administrator authentication and user authentication according to the following chart Administrator Authentication See Administrator Authentication Specifying Administ...

Page 28: ...e Authentication without specifying administrator authentication p 27 Administrator Authentication p 40 User Authentication p 27 Specifying Administrator Privileges p 30 Registering the Administrator...

Page 29: ...h as copying and printing To use these functions the administrator must register as a user in the Address Book and then be authenticated as the user Administrator authentication can also be specified...

Page 30: ...ettings 3 Press Administrator Tools 4 Press Administrator Authentication Management If the setting to be specified does not appear press Next to scroll down to other settings 2 Authentication and its...

Page 31: ...e settings to manage from Available Settings The selected settings will be unavailable to users Available Settings varies depending on the administrator For details about Available Settings see Managi...

Page 32: ...n by a single administrator You can register up to four login user names Administrators 1 4 to which you can grant administrator privileges Administrator authentication can also be specified via Web I...

Page 33: ...2 Press System Settings 3 Press Administrator Tools 4 Press Program Change Administrator Administrator Authentication 31 2...

Page 34: ...ress Administrator 1 Administrator 2 Administrator 3 or Administrator 4 and then press Change If you allocate each administrator s authority to a different person the screen appears as follows 6 Press...

Page 35: ...d and then press OK Follow the password policy to make the login password more secure For details about the password policy and how to specify it see Specifying the Extended Security Functions 10 If a...

Page 36: ...t passwords are case sensitive User names cannot contain numbers only a space colon or quotation mark nor can they be left blank Do not use Japanese Traditional Chinese Simplified Chinese or Hangul do...

Page 37: ...n describes how to log on 1 Press the Login Logout key BBD002S The message Press Login then enter the login user name and login password appears 2 Press Login If you do not want to log in press Cancel...

Page 38: ...inistrator logging on appears If you log on using a login user name with the authority of more than one administrator Administrator appears If you try to log on from an operating screen Selected funct...

Page 39: ...r example to assign machine administrator authority and user administrator authority to Administrator 1 press Administrator 1 in the lines for the machine administrator and the user administrator For...

Page 40: ...Press OK twice You will be logged off 9 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Using Web Image Monitor...

Page 41: ...192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login 4 Enter the login name and password of an administrator and then click Login 5 Make settings as desired...

Page 42: ...on In this case since the User Code authentication does not have a password the login password is set as blank When authentication switches to an external authentication method Windows authentication...

Page 43: ...see Printer Reference or the printer driver Help For details about specifying the TWAIN driver user code see the TWAIN driver Help To control the use of DeskTopBinder for the delivery of files stored...

Page 44: ...uthentication management select Off 6 Select which of the machine s functions you want to limit The selected settings will be unavailable to users For details about limiting available functions for in...

Page 45: ...ent that does not support authentication select Simple All or Simple Limitation If you select Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you...

Page 46: ...driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it ma...

Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...

Page 48: ...uthentication the administrator must specify the functions available to each user registered in the Address Book Specifying Basic Authentication This can be specified by the machine administrator For...

Page 49: ...nt select Off 6 Select which of the machine s functions you want to permit Basic Authentication will be applied to the selected functions Users can use the selected functions only For details about sp...

Page 50: ...lecting Entire or Simple All If you select Entire you cannot print using a printer driver or a device that does not support authentication To print under an environment that does not support authentic...

Page 51: ...is required for printing with non specified devices If you select Simple Limitation you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a...

Page 52: ...idual users and groups of users Specify the setting in the Address Book for each user Users must have a registered account in the Address Book in order to use the machine when User Authentication is s...

Page 53: ...4 Press Address Book Management 5 Select the user or group 6 Press Auth Info Basic Authentication 51 2...

Page 54: ...o Log on The login user name and password specified in Address Book Management can be used as the login information for SMTP Authentication Folder Authentication and LDAP Authentication If you do not...

Page 55: ...ol represents any character To use Use Auth Info at Login for SMTP authentication a login password up to 128 characters in length must be specified 1 Press the User Tools Counter key 2 Press System Se...

Page 56: ...ified does not appear press Next to scroll down to other settings For folder authentication select Use Auth Info at Login in Folder Authentication For LDAP authentication select Use Auth Info at Login...

Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...

Page 58: ...A domain controller has been set up in a designated domain This function is supported by the operating systems listed below To obtain user information when running Active Directory use LDAP If SSL is...

Page 59: ...which users first make settings in advance in the Address Book When accessing the machine subsequently you can use all the functions available to your group and to you as an individual user Users who...

Page 60: ...3 Press Administrator Tools 4 Press User Authentication Management 5 Select Windows Auth If you do not want to use user authentication management select Off 2 Authentication and its Application 58 2...

Page 61: ...9 To enable Kerberos authentication a realm must be registered beforehand The realm name must be registered in capital letters For details about registering a realm see Programming the Realm General...

Page 62: ...entication Selecting Entire or Simple All If you select Entire you cannot print using a printer driver or a device that does not support authentication To print in an environment that does not support...

Page 63: ...f the global groups registered in the Windows Server Keep in mind that group names are case sensitive Then specify the machine functions available to each group If global groups are not specified user...

Page 64: ...nter key Under Windows Authentication you can select whether or not to use secure sockets layer SSL authentication To automatically register user information such as fax numbers and e mail addresses u...

Page 65: ...s required for printing with non specified devices If you select Simple Limitation you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a p...

Page 66: ...group members Create global groups in the machine by entering the names of the global groups registered in the Windows Server Keep in mind that group names are case sensitive Then specify the machine...

Page 67: ...ools Counter key Under Windows Authentication you can select whether or not to use secure sockets layer SSL authentication To automatically register user information such as fax numbers and e mail add...

Page 68: ...te Authority and then click Next On the displayed screen Enterprise root CA is selected 9 Enter the Certificate Authority name optional in CA Identifying Information and then click Next 10 Leave Data...

Page 69: ...icate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor This section explains the use of a certificate issued by a certificate authority as the devic...

Page 70: ...te Request box enter the contents of the device certificate received from the certificate authority 9 Click OK Installed appears under Certificate Status to show that a device certificate for the mach...

Page 71: ...the machine If user information on the server is changed information registered in the machine may be overwritten when authentication is performed Under LDAP authentication you cannot specify access...

Page 72: ...t The first time an unregistered user accesses the machine after LDAP authentication has been specified the user is registered in the machine and can use the functions available under Available Functi...

Page 73: ...2 Press System Settings 3 Press Administrator Tools 4 Press User Authentication Management LDAP Authentication 71 2...

Page 74: ...he IPv4 address range to which this setting is applied and whether or not to apply the setting to the parallel and USB interfaces If you select Entire or Simple All proceed to Selecting Entire or Simp...

Page 75: ...Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if...

Page 76: ...place a comma between them The search will return hits for either or both attributes Also if you place an equal sign between a login attribute and a value for example cn abcde uid xyz the search will...

Page 77: ...gin user name will be created in the machine 6 Press OK 7 Press the User Tools Counter key p 174 Limiting Available Functions Selecting Simple Limitation If you select Simple Limitation you can specif...

Page 78: ...nauthorized users 1 Press Simple Limitation 2 Press Change 3 Specify the range in which Simple Limitation is applied to Printer Job Authentication You can specify the IPv4 address range to which this...

Page 79: ...select a user and then retrieve the user information from the LDAP server so it is transferred to the machine s Address Book To specify multiple login attributes place a comma between them The search...

Page 80: ...user registered in the machine the two instances are treated as referring to the same user You can enter an attribute such as serialNumber or uid Additionally you can enter cn or employeeNumber provid...

Page 81: ...entative Using Web Image Monitor you can specify that the server reliability and site certificate are checked every time you access the SSL server For details about specifying SSL using Web Image Moni...

Page 82: ...Settings 3 Press Administrator Tools 4 Press User Authentication Management 5 Select Integration Svr Auth If you do not want to use User Authentication Management select Off 2 Authentication and its A...

Page 83: ...ation 7 Enter the server name and then press OK Enter the IPv4 address or host name 8 In Authentication Type select the authentication system for external authentication Select an available authentica...

Page 84: ...Change for Domain Name 10 Enter the domain name and then press OK You cannot specify a domain name under an authentication system that does not support domain login 2 Authentication and its Applicati...

Page 85: ...proceed to step 17 If you have registered a group proceed to step 13 If you set Authentication Type to Windows Native or Windows NT Compatible you can use the global group If you set Authentication T...

Page 86: ...ers can use the selected functions only For details about specifying available functions for individuals or groups see Limiting Available Functions 17 Press OK 18 Select the Printer Job Authentication...

Page 87: ...to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentica...

Page 88: ...rinting However note that because the machine does not require authentication in this case it may be used by unauthorized users 1 Press Simple Limitation 2 Press Change 3 Specify the range in which Si...

Page 89: ...5 Press On for Use Secure Connection SSL and then press OK To not use secure sockets layer SSL for authentication press Off 6 Press the User Tools Counter key Integration Server Authentication 87 2...

Page 90: ...ion fails the print job is reset C Printing is possible if user authentication is successful and Driver Encryption Key for the printer driver and machine match X Printing is not possible regardless of...

Page 91: ...the UserAuthentication and Encrypt check boxes are selected Personal authentication information is added to the printer job The printer driver applies simple encryption to login passwords For details...

Page 92: ...sonal authentication is performed using the user ID and password used for logging on via ftp However the user ID and password are not encrypted p 233 Specifying the Extended Security Functions 2 Authe...

Page 93: ...a given time Additionally you can authenticate using an external device For details about using an external device for user authentication see Authentication Using an External Device Consult the User...

Page 94: ...the printer driver For details see the printer driver Help Login Using the Control Panel Use the following procedure to log in when Basic Authentication Windows Authentication LDAP Authentication or...

Page 95: ...press OK The message Authenticating Please wait appears Log Off Using the Control Panel Follow the procedure below to log off when Basic Authentication Windows Authentication or LDAP Authentication is...

Page 96: ...he printer driver Help When logged on using a printer driver logging off is not required Login Using Web Image Monitor This section explains how to log on to the machine via Web Image Monitor 1 Click...

Page 97: ...d administrator accounts only not general user accounts Lockout setting items The lockout function settings can be made using Web Image Monitor Setting Item Description Setting Values Default Setting...

Page 98: ...Image Monitor appears 3 Click Login The machine administrator can log on Enter the login user name and login password 4 Click Configuration and then click User Lockout Policy under Security The User L...

Page 99: ...d 4 Click Address Book The Address Book page appears 5 Select the locked out user account 6 Click Change 7 Select the Cancel Lockout check box under Authentication Information 8 Click OK 9 Click Logou...

Page 100: ...ress Auto Logout Timer If the setting to be specified does not appear press Next to scroll down to other settings 5 Select On If you do not want to specify Auto Logout Timer select Off 2 Authenticatio...

Page 101: ...6 Enter 60 to 999 seconds using the number keys and then press 7 Press the User Tools Counter key If User Authentication is Specified 99 2...

Page 102: ...Authentication Using an External Device To authenticate using an external device see the device manual For details contact your sales representative 2 Authentication and its Application 100 2...

Page 103: ...evention 1 Using the printer driver specify the printer settings for unauthorized copy prevention For details on how to specify settings for unauthorized copy prevention see Specifying Printer Setting...

Page 104: ...printer driver you can embed background images and pattern in a printed document for Unauthorized Copy Prevention 2 The document is copied scanned or stored in the Document Server 3 Printed Copies The...

Page 105: ...nter without the Copy Data Security Unit the embedded pattern appears conspicuously in the copy However character relief may differ depending on the copier or multifunction printer model in use or doc...

Page 106: ...ver You cannot print at 200 dpi resolution You cannot partially embed pattern in the printed document You can only embed pattern that is entered in the text box of the printer driver Printing with emb...

Page 107: ...d in the printed document Also specify Font Font style and Size 5 Click OK Specifying Printer Settings for Data Security for Copying Printer Driver Setting If a printed document using this function is...

Page 108: ...n the Copy Data Security Unit must be installed If a printed document is copied or stored in the Document Server the copy is grayed out If a document that is not copy guarded is copied or stored the c...

Page 109: ...settings 5 Press On If you do not want to specify Data Security for Copying select Off 6 Press OK 7 Press Exit 8 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 3...

Page 110: ...rinter driver specify a Locked Print File You can also encrypt passwords for Lock Print files using the printer driver If user authentication has been enabled you must enter the login user name and lo...

Page 111: ...r can change the user password if it is forgotten For details about logging on and logging off with user authentication see If User Authentication is Specified This can also be specified via Web Image...

Page 112: ...pecified Deleting Locked Print Files This can be specified by the file creator owner To delete Locked Print files you must enter the password for the files If the password has been forgotten ask the f...

Page 113: ...Press Print Jobs 3 Press Locked Print Job List 4 Select the file 5 Press Delete The password entry screen does not appear if the file administrator is logged in Printing a Confidential Document 111 3...

Page 114: ...of Locked Print Files This can be specified by the file creator owner or file administrator If the password has been forgotten the file administrator changes the password to restore access This can a...

Page 115: ...List 4 Select the file 5 Press Change Password 6 Enter the password for the stored file and then press OK The password entry screen does not appear if the file administrator is logged in Printing a Co...

Page 116: ...ce File Protection is one of the extended security functions For details about this and other extended security functions see Specifying the Extended Security Functions Only the file administrator can...

Page 117: ...6 Press Yes You can use the same procedure to unlock stored print files also p 233 Specifying the Extended Security Functions p 35 Logging on Using Administrator Authentication p 36 Logging off Using...

Page 118: ...can specify the user and access permission This includes permission to view edit and edit delete files Files can be stored by any user who is allowed to use the Document Server copy function scanner...

Page 119: ...ging on Using Administrator Authentication Logging off Using Administrator Authentication If files become inaccessible reset their access permission as the file creator owner This can also be done by...

Page 120: ...ogram Change Delete 6 Press New Program 7 Select the users or groups you want to assign permission to You can select more than one user By pressing All Users you can select all the users 8 Press Exit...

Page 121: ...ing the Scanner and Fax Functions If user authentication is set for the scanner function you can specify access privileges for stored files when storing them in the Document Server You can also change...

Page 122: ...ission to and then select the permission Select the access permission from Read only Edit Edit Delete or Full Control 6 Press Exit 7 Press OK 8 Store files in the Document Server Changing Access Privi...

Page 123: ...1 Press Select Stored File 2 Select the file 3 Press Manage Delete File 4 Press Change Access Priv Specifying Access Permission for Stored Files 121 3...

Page 124: ...select more than one user By pressing All Users you can select all the users 8 Press Exit Select the user who you want to assign access permission to and then select the permission Select the access p...

Page 125: ...an specifying and managing access permissions for each stored file For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logg...

Page 126: ...4 Press Address Book Management 5 Select the user or group 6 Press Protection 3 Ensuring Information Security 124 3...

Page 127: ...Program 9 Select the users or groups to register You can select more than one user By pressing All Users you can select all the users 10 Press Exit 11 Select the user who you want to assign access pe...

Page 128: ...file creator owner or file administrator Specify passwords for stored files This provides increased protection against unauthorized use of files For details about logging on and logging off with admin...

Page 129: ...tion p 36 Logging off Using Administrator Authentication Unlocking Files If you specify Enhance File Protection the file will be locked and become inaccessible if an invalid password is entered ten ti...

Page 130: ...entication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the Document Server key 2 Select the file 3 Press File Management 4 Press Unlock Fil...

Page 131: ...p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Specifying Access Permission for Stored Files 129 3...

Page 132: ...ns appears In Restrict Adding of User Destinations you can restrict users from registering data in the Address Book If you set Restrict Adding of User Destinations to Off users can directly enter dest...

Page 133: ...rator Tools 4 Press Extended Security 5 Press On for Restrict Use of Destinations If Restrict Use of Destinations is set to On Restrict Adding of User Destinations does not appear Preventing Data Leak...

Page 134: ...the User Tools Counter key p 233 Specifying the Extended Security Functions p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication 3 Ensuring Informati...

Page 135: ...r Netscape Messenger 7 1 and later Lotus Notes R5 and later When the electronic signature is specified the machine administrator s address appears in the From field and the address of the sender appea...

Page 136: ...r When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Mon...

Page 137: ...t be installed in advance It is possible to use either a self signed certificate created by the machine or a certificate issued by a certificate authority Electronic Signature 1 Install a device certi...

Page 138: ...This can be specified by the network administrator Create and install the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Monitor He...

Page 139: ...ess or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the mac...

Page 140: ...a certificate authority Enter the details of the device certificate issued by the certificate authority 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When...

Page 141: ...own box in S MIME under Certification 6 Click OK The certificate to be used for the S MIME electronic signature is set 7 Click OK 8 Click Logout Specifying the Electronic Signature This can be specifi...

Page 142: ...Select the method for attaching the electronic signature when forwarding received fax messages in When Transferring by Fax under Signature 8 Select the method for attaching the electronic signature wh...

Page 143: ...d user Access permission can also be specified by a user granted full control or the user administrator You can specify who is allowed to access the data in the Address Book By making this setting you...

Page 144: ...Press Address Book Management 5 Select the user or group 6 Press Protection 7 Press Program Change Delete for Permissions for Users Groups under Protect Destination 3 Ensuring Information Security 142...

Page 145: ...ressing All Users you can select all the users 10 Press Exit 11 Select the user who you want to assign access permission to and then select the permission Select the permission from Read only Edit Edi...

Page 146: ...using the extended security function Encrypt Address Book For details about this and other extended security functions see Specifying the Extended Security Functions For details about logging on and...

Page 147: ...lphanumeric characters 8 Press Encrypt Decrypt 9 Press Yes Do not switch the main power off during encryption as doing so may corrupt the data Encrypting the data in the Address Book may take a long t...

Page 148: ...ypted 10 Press Exit 11 Press OK 12 Press the User Tools Counter key If you register additional users after encrypting the data in the Address Book those users are also encrypted p 35 Logging on Using...

Page 149: ...I F setting information System settings information Enabling the Encryption Settings Use the following procedure to enable the encryption settings at initial set up or after encryption settings have b...

Page 150: ...User Tools Counter key 2 Press System Settings 3 Press Administrator Tools 4 Press Machine Data Encryption Settings If the setting to be specified does not appear press Next 3 Ensuring Information Sec...

Page 151: ...carry all of the data over to the hard disk select All Data To carry over only the machine settings data select File System Data Only To reset all of the data select Format All Data 7 Press the Start...

Page 152: ...er see Turning On the Power About This Machine Printing the Encryption Key Use the following procedure to print the key again if it has been lost or misplaced The encryption key is required for data r...

Page 153: ...3 Press Administrator Tools 4 Press Machine Data Encryption Settings 5 Press Print Encryption Key The encryption key for retrieving backup data is printed Encrypting Data on the Hard Disk 151 3...

Page 154: ...e sure to store the encryption key safely for retrieving back up data When the encryption key is updated encryption is performed using the new key After completing the procedure on the machine s contr...

Page 155: ...y 6 Select the data to be carried over to the hard disk and not be reset To carry all of the data over to the hard disk select All Data To carry over only the machine settings data select File System...

Page 156: ...ter key 12 Turn off the power and the main power switch and then turn the main power switch back on For details about turning off the power see Turning On the Power About This Machine Canceling Data E...

Page 157: ...start the machine to enable the new settings Restarting can be slow when there is data to be carried over to the hard disk 1 Press the User Tools Counter key 2 Press System Settings 3 Press Administra...

Page 158: ...achine settings data select File System Data Only To reset all of the data select Format All Data 7 Press OK 8 Press Exit 9 Press Exit 10 Press the User Tools Counter key 11 Turn off the power and the...

Page 159: ...vent data leakage by automatically overwriting temporarily saved data Auto Erase Memory or overwriting all the data stored on the hard disk Erase All Memory For details see the manual supplied with th...

Page 160: ...s in the hard disk as temporary data Auto Erase Memory erases the temporary data on the hard disk by writing over it Overwriting starts automatically once the job is completed The copier fax and print...

Page 161: ...System Settings 3 Press Administrator Tools 4 Press Auto Erase Memory Setting If the setting to be specified does not appear press Next to scroll down to other settings Deleting Data on the Hard Disk...

Page 162: ...times that you want to overwrite using the number keys and then press 8 Press OK Auto Erase Memory is set p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authe...

Page 163: ...t can or cannot be overwritten by Auto Erase Memory Data overwritten by Auto Erase Memory Copier Copy jobs Printer Print Jobs Printer Sample Print Locked Print Stored Print Jobs 1 Printer Spool Printi...

Page 164: ...Book 6 Image overlay data can be overwritten by Auto Erase Memory only if it is deleted in advance p 141 Protecting the Address Book Erase All Memory This can be specified by the machine administrato...

Page 165: ...Press System Settings 4 Press Administrator Tools 5 Press Erase All Memory If the setting to be specified does not appear press Next to scroll down to other settings Deleting Data on the Hard Disk 163...

Page 166: ...ne Before erasing the hard disk you can back up user codes counters for each user code and Address Book data using SmartDeviceMonitor for Admin For details see SmartDeviceMonitor for Admin Help If an...

Page 167: ...3 Turn off the main power Before turning the power off see Turning On the Power About This Machine To resume overwriting turn on the main power Deleting Data on the Hard Disk 165 3...

Page 168: ...3 Ensuring Information Security 166 3...

Page 169: ...user name and password The administrator can also specify Available Settings in Admin Authentication to prevent users from specifying certain settings Administrator type determines which machine setti...

Page 170: ...nitor Settings p 19 Administrators and Users p 27 Administrator Authentication p 295 User Administrator Settings p 277 Machine Administrator Settings p 288 Network Administrator Settings p 293 File Ad...

Page 171: ...27 User Settings Web Image Monitor Settings Menu Protect You can set menu protect to Off Level 1 or Level 2 If you set it to Off no menu protect limitation is applied To limit access to the fullest ex...

Page 172: ...n Facsimile Features set Machine Management to On in Administrator Authentication Management in Administrator Tools in System Settings 1 Press the User Tools Counter key 2 Press Facsimile Features 3 P...

Page 173: ...er Functions To specify Menu Protect in Printer Features set Machine Management to On in Administrator Authentication Management in Administrator Tools in System Settings 1 Press the User Tools Counte...

Page 174: ...To specify Menu Protect in Scanner Features set Machine Management to On in Administrator Authentication Management in Administrator Tools in System Settings 1 Press the User Tools Counter key 2 Press...

Page 175: ...5 Select the menu protect level and then press OK 6 Press the User Tools Counter key Menu Protect 173 4...

Page 176: ...colour and black white select Full Colour Two Colour Black White To print in both colour and black white select Full Colour Unless you select all items in the Copier or Printer setting the Auto Colour...

Page 177: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user Limiting Available Functions 175 4...

Page 178: ...he setting to be specified does not appear press Next to scroll down to other settings 8 Press OK 9 Press Exit 10 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p...

Page 179: ...ng the Job Log function settings changing the Access Log function settings and changing the Log Encryption settings Service representative procedures include formatting the hard disk and specifying wh...

Page 180: ...Off only if it is set to On You can check and change the transfer log setting This setting lets you transfer log files to the log server to check the history data and identify unauthorized access For...

Page 181: ...Tools Counter key 2 Press System Settings 3 Press Administrator Tools 4 Press Transfer Log Setting If the setting to be specified does not appear press Next to scroll down to other settings Managing...

Page 182: ...5 Press Off 6 Press OK 7 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication 4 Managing Access to the Machine 180 4...

Page 183: ...nvolving LPR RCP RSH FTP IPP DIPRINT Web Image Monitor SmartDeviceMonitor for Client or DeskTopBinder You cannot limit the monitoring of SmartDeviceMonitor for Client You cannot limit access involving...

Page 184: ...ntenance by telnet Network Guide To disable SMTP on Web Image Monitor in E mail settings set the protocol to anything other than SMTP For details see Web Image Monitor Help For details about logging o...

Page 185: ...You can restrict personal information frombeing displayedby making settings on the control panel using Restrict Display of User Information 1 telnet TCP 23 Web Image Monitor Commands using telnet are...

Page 186: ...OS designated functions on the WINS server cannot be used SNMPv1 v2 UDP 161 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor Functions that require SNMPv1 v2 cannot be used...

Page 187: ...Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor LPR functions cannot be used You can restrict personal information frombeing displayedby making settings on the control pan...

Page 188: ...CP 9100 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor DIPRINT functions cannot be used RFU TCP 10021 telnet You can attempt to update firmware via FTP NetWare IPX SPX Co...

Page 189: ...lnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor WS Device Printer search function cannot be used RHPP TCP 59100 Web Image Monitor telnet Cannot print with RHPP 1 Restrict Display of User Info...

Page 190: ...2 Press System Settings 3 Press Interface Settings 4 Press Effective Protocol 5 Enhanced Network Security 188 5...

Page 191: ...address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web...

Page 192: ...ct confidential information from outside threats Select Level 1 for moderate security to protect important information Use this setting if the machine is connected to the office local area network LAN...

Page 193: ...on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Making Settings Using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host nam...

Page 194: ...el 1 Level 2 TCP IP Available Available Available HTTP Port 80 open open open HTTP Port 443 open open open HTTP Port 631 open open closed HTTP Port 7443 7444 open open open IPP Port 80 open open open...

Page 195: ...e SSL SSL TLS Encryption Mode Ciphertext Priority Ciphertext Priority Ciphertext Only Bonjour Available Available Unavailable SMB Available Available Unavailable WS MFP WS Device Available Available U...

Page 196: ...use PDF direct print the optional PostScript 3 Unit must be installed Password for IPP Authentication To encrypt the IPP Authentication password on Web Image Monitor set Authentication to DIGEST and t...

Page 197: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security Encrypting Transmitted Passwords 195 5...

Page 198: ...t specifying the encryption key on the printer driver see the printer driver Help For details about specifying the encryption key on the TWAIN driver see the TWAIN driver Help p 35 Logging on Using Ad...

Page 199: ...network administrator must give users the group password for PDF files that are already registered on the machine The users can then register it in DeskTopBinder on their computers For details see Des...

Page 200: ...92 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login user name and login password 4 Click Configuration an...

Page 201: ...ecified by the network administrator To protect the communication path and establish encrypted communication create and install the device certificate There are two ways of installing a device certifi...

Page 202: ...procedure specified by the certificate authority 2 Installing the device certificate Install the device certificate using Web Image Monitor 3 Enabling SSL Enable the SSL TLS setting using Web Image M...

Page 203: ...thority Create the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Monitor Help This section explains the use of a certificate issue...

Page 204: ...ng the Device Certificate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image...

Page 205: ...n the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page...

Page 206: ...by following the Certificate Import Wizard instructions For details about how to install the certificate and about where to store the certificate when accessing the machine using IPP see Web Image Mo...

Page 207: ...ng this setting you can change the security level For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Adm...

Page 208: ...35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication SNMPv3 Encryption This can be specified by the network administrator When using SmartDeviceMonitor...

Page 209: ...s System Settings 3 Press Interface Settings 4 Press Permit SNMPv3 Communication If the setting to be specified does not appear press Next to scroll down to other settings Protection Using Encryption...

Page 210: ...mmunication on the machine For details about specifying Encryption Key in SmartDeviceMonitor for Admin see SmartDeviceMonitor for Admin Help If network administrator s Encryption Password setting is n...

Page 211: ...s Web Image Monitor due to IPsec configuration problems disable IPsec in System Settings on the control panel and then access Web Image Monitor For details about enabling and disabling IPsec using the...

Page 212: ...ing the IPsec SA the ISAKMPSA Phase 1 settings are auto configured After this the IPsec SA Phase 2 settings which allow actual IPsec transmission are auto configured Also for further security the SA c...

Page 213: ...Encryption Key Auto Exchange Security Level When you select a security level certain security settings are automatically configured The following table explains security level features Security Level...

Page 214: ...ble lists the settings that are automatically configured according to the security level Setting Authentication Only Authentication and Low Level Encryption Authentication and High Level Encryption Se...

Page 215: ...evel you can still make changes to the auto configured settings When you change an auto configured setting the security level switches automatically to User Setting Setting Description Setting Value A...

Page 216: ...sing IPsec or to allow cleartext transmission when IPsec cannot be established auto setting Use When Possible Always Require Authentication Method Specify the method for authenticating transmission pa...

Page 217: ...ation Algorithm Specify the authentication algorithm to be used in phase 2 auto setting HMAC MD5 96 HMAC SHA1 96 Phase 2 Encryption Algorithm Permissions Specify the encryption algorithm to be used in...

Page 218: ...y the address of the IPsec transmission partner You can also specify an address range The IPsec transmission partner s IPv4 or IPv6 address Ifyouarenotsettinganaddress range enter 32 after an IPv4 add...

Page 219: ...uthentication algorithm HMAC MD5 96 HMAC SHA1 96 Authentication Key Specify the key for the authentication algorithm Specify a value within the ranges shown below according to the encryption algorithm...

Page 220: ...48 digits AES 128 set 32 digits AES 192 set 48 digits AES 256 set 64 digits ASCII DES set 8 characters 3DES set 24 characters AES 128 set 16 characters AES 192 set 24 characters AES 256 set 32 charact...

Page 221: ...ed Specifying Encryption Key Auto Exchange Settings This can be specified using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When enteri...

Page 222: ...be specified by the network administrator Using Web Image Monitor select the certificate to be used for IPsec You must install the certificate before it can be used 1 Open a Web browser 2 Enter http t...

Page 223: ...t response rule check box and then click Next 8 Select Edit properties and then click Finish 9 In the General tab click Advanced 10 In Authenticate and generate a new key after every enter the same va...

Page 224: ...30 Click Add select the Custom check box and then click Settings 31 In Integrity algorithm select the authentication algorithm that was specified on the machine in Encryption Key Auto Exchange Setting...

Page 225: ...h IPsec transmission Encryption Key Manual Settings Configuration Flow This section explains the procedure for specifying encryption key manual settings This can be specified by the network administra...

Page 226: ...select the settings number and add settings 8 Click OK 9 Select Active for IPsec in IPsec 10 Set Exclude HTTPS Transmission to Active if you do not want to use IPsec for HTTPS communication 11 Click...

Page 227: ...n key manual settings Specify encryption key manual settings msh ipsec manual_mode on off To enable encryption key manual settings set to on To disable settings set to off ipsec exclude To display or...

Page 228: ...default ipv4 ipv6 any Specify the address type for the default setting To specify both IPv4 and IPv6 enter any Security protocol setting msh ipsec manual 1 2 3 4 default proto ah esp dual Enter the se...

Page 229: ...ncryption algorithm and encryption key setting msh ipsec manual 1 2 3 4 default encrypt null des 3des aes128 aes192 aes256 encryption key Enter the separate setting number 1 4 or default specify the e...

Page 230: ...ault ipv4 ipv6 any Specify the address type for the default setting To specify both ipv4 and ipv6 enter any Security policy setting msh ipsec ike 1 2 3 4 default proc apply bypass discard Enter the se...

Page 231: ...nning or ending address displays the current setting IKE partner authentication method setting msh ipsec ike 1 2 3 4 default auth psk rsasig Enter the separate setting number 1 4 or default and specif...

Page 232: ...ndspecifytheISAKMPSA phase1 validity period Enter the validity period in seconds from 300 to 172800 Not specifying a validity period displays the current setting IPsec SA phase 2 authentication algori...

Page 233: ...setting msh ipsec ike 1 2 3 4 default ph2 lifetime validity period Enter the separate setting number 1 4 or default and specify the IPsec SA phase 2 validity period Enter the validity period in secon...

Page 234: ...isplay and setting methods are explained below View Settings msh authfree If print job authentication exclusion is not specified authentication exclusion control is not displayed IPv4 address settings...

Page 235: ...d how to specify them For details about when to use each function see the corresponding chapters Changing the Extended Security Functions To change the extended security functions display the extended...

Page 236: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security 6 Specifying the Extended Security Functions 234 6...

Page 237: ...the user administrator Encrypt the data in the machine s Address Book For details on protecting data in the Address Book see Protecting the Address Book On Off Restrict Use of Destinations This can b...

Page 238: ...t be viewed unauthorized users are prevented from obtaining information about the registered files On Off Enhance File Protection This can be specified by the file administrator By specifying a passwo...

Page 239: ...unction files stored in the machine can be transferred or delivered If you select Prohibit for this setting stored files cannot be transferred by Forwarding and Transfer Request Use this setting to pr...

Page 240: ...etting and Minimum Character No If you select Level 1 specify the password using a combination of two types of characters selected from upper case letters lower case letters decimal numbers and symbol...

Page 241: ...ermissible or not by checking the firmware version displayed on the control panel screen If the firmware structure change is not permissible contact your service representative before logging in When...

Page 242: ...out Stored RX File User Setting see Facsimile Features General Settings Guide Printing the Journal When making authentication settings for users to prevent personal information in transmission history...

Page 243: ...Code settings must be enabled and you must enter a code before you can turn the power back on Specifying the Weekly Timer Code This can be specified by the machine administrator 1 Press the User Tool...

Page 244: ...y Timer Code 5 Press On Canceling Weekly Timer Code This can be specified by the machine administrator 1 Press the User Tools Counter key 2 Press System Settings 6 Specifying the Extended Security Fun...

Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...

Page 246: ...the machine administrator Service mode is used by a service representative for inspection or repair If you set the service mode lock to On service mode cannot be used unless the machine administrator...

Page 247: ...ress On and then press OK A confirmation message appears 6 Press Yes 7 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authenti...

Page 248: ...e mode lock For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the...

Page 249: ...s Counter key The service representative can switch to service mode p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Limiting Machine Operation to...

Page 250: ...6 Specifying the Extended Security Functions 248 6...

Page 251: ...e appears deal with the problem according to the information contained in the message Messages Cause Solutions You do not have the privileges to use this function The authority to use the function is...

Page 252: ...ntication has failed The entered login user name or login password is incorrect Ask the user administrator for the correctloginusernameandlogin password See the error codes below for possible solution...

Page 253: ...owing tables list the error codes likely causes of the problems they indicate and what you can do to resolve those problems If the error code that appears is not on this table take a note and contact...

Page 254: ...n on the System Settings screen where only the administrator has authentication ability Only the administrator has login privileges on this screen Log in as a general user from the application s login...

Page 255: ...ame was not specified but a DeskTopBinder operation was performed Set the DeskTopBinder login user name correctly W0206 002 The user attempted authentication from an application on the System Settings...

Page 256: ...functioning properly 2 Make sure that the security module is installed W0406 104 1 Cannot connect to the authentication server 1 Make sure that connection to the authentication server is possible Use...

Page 257: ...cted because NTLMv2 is not supported 2 Make sure that the ports for the domain control firewall and the firewall on the machine to the domain control connection path are open If you are using a Window...

Page 258: ...ill fail if the realm name is specified in lower case letters Make sure the realm name is specified in capital letters 4 Kerberos authentication will fail if automatic retrieval for KDC fails Ask your...

Page 259: ...he machine If there is more than one DC make sure that a confidential relationship has been configured between each DC W0400 106 The domain name cannot be resolved Make sure that DNS WINS is specified...

Page 260: ...tication settings 1 Delete the old duplicated name or change the login name 2 If the authentication server has just been changed delete the old name on the server W0607 001 An authentication error occ...

Page 261: ...me was not specified but a DeskTopBinder operation was performed Set the DeskTopBinder login user name correctly L0206 002 A user attempted authentication from an application on the System Settings sc...

Page 262: ...ccurring Notify the administrator of the screen message by e mail and check the system log for signs of an authentication attack L0406 201 Authenticationisdisabledinthe LDAP server settings Change the...

Page 263: ...space colon or quotation mark If the login user name exceeds 128 bytes L0406 202 L0406 203 3 There is an error in the simple encryption method 1 Authentication will fail if the password is left blank...

Page 264: ...n capital letters L0400 210 Failed to obtain user information in LDAP search The login attribute s search criteria might not be specified or the specified search information is unobtainable Make sure...

Page 265: ...Do not use other admin supervisor or HIDE in general user accounts L0612 005 Authentication failed because no more users can be registered The number of users registered in the Address Book has reach...

Page 266: ...ivileges on this screen Log in as a general user from the application s login screen I0206 003 An authentication error occurred because the user name contains a space colon or quotation mark Recreate...

Page 267: ...ator If the situation does not return to normal contact your service representative I0511 000 The authentication server login name is the same as a user name already registered on the machine Names ar...

Page 268: ...ication has been rejected Confirm the user name and login name with the administrator of the network in use if using Windows Authentication LDAP Authentication or Integration Server Authentication Con...

Page 269: ...estrict Use of Simple Encryption to On Alternatively enable SSL TLS install the server certificate in the machine and then install the certificate in the computer See Setting the SSL TLS Encryption Mo...

Page 270: ...been disabled while All Users is not specified Re enable user authentication and then enable All Users for the destinations that did not appear For details about enabling All Users see Protecting the...

Page 271: ...p 194 Driver Encryption Key p 204 Setting the SSL TLS Encryption Mode p 116 Specifying Access Permission for Stored Files p 141 Protecting the Address Book Authentication Does Not Work Properly 269 7...

Page 272: ...7 Troubleshooting 270 7...

Page 273: ...specify up to 32 alphanumeric characters and symbols Keep in mind that user names and passwords are case sensitive Be sure not to forget the supervisor login user name and login password If you do fo...

Page 274: ...2 Press the Login Logout key BBD002S 3 Press Login 4 Enter a login user name and then press OK When you assign the administrator for the first time enter supervisor 8 Appendix 272 8...

Page 275: ...tion has been specified be sure to log off after completing settings This section describes how to log off after completing settings 1 Press the Login Logout key BBD002S 2 Press Yes Changing the Super...

Page 276: ...2 Press System Settings 3 Press Administrator Tools 4 Press Program Change Administrator 5 Under Supervisor press Change 8 Appendix 274 8...

Page 277: ...twice 12 Press the User Tools Counter key Resetting an Administrator s Password This section describes how to reset the administrators passwords For details about logging on and logging off as the sup...

Page 278: ...wish to reset 8 Press Change for the login password 9 Enter the login password and then press OK 10 If a password reentry screen appears enter the login password and then press OK 11 Press OK twice 12...

Page 279: ...ngs can be specified Interface Settings The following settings can be specified Network DNS Configuration You can perform a connection test Parallel Interface Parallel Timing Parallel Communication Sp...

Page 280: ...sword NCP User Name NCP Password Program Change Delete E mail Message Fax E mail Account Administrator Tools Display Print Counter Print Counter List Display Clear Print Counter per User Display Count...

Page 281: ...Structure Program Change Delete LDAP Server Name Server Name Search Base Port Number Use Secure Connection SSL Authentication User Name Password Connection Test Search Conditions Search Options LDAP S...

Page 282: ...The following settings can be specified General Features All the settings can be specified Reproduction Ratio All the settings can be specified Edit All the settings can be specified Stamp All the se...

Page 283: ...ing Reception File Setting SMTP RX File Delivery Settings 2 Sided Print Checkered Mark Centre Mark Print Reception Time Reception File Print Quantity Paper Tray Specify Tray for Lines Folder Transfer...

Page 284: ...Colour Graphic Mode System Print Error Report Auto Continue Memory Overflow Job Separation Rotate by 180 Degrees Initial Print Job List Memory Usage Duplex Copies Blank Page Print Spool Image Reserved...

Page 285: ...eneral Settings All the settings can be specified Scan Settings All the settings can be specified Send Settings Compression Black White Compression Gray Scale Full Colour High Compression PDF Level In...

Page 286: ...Slip Sheet Tray Designation Sheet 1 Tray Designation Sheet 2 Tray Separation Sheet Tray Paper All the settings can be specified Date Time All the settings can be specified Timer All the settings can b...

Page 287: ...e settings can be specified Firmware Update All the settings can be specified Program Change Realm All the settings can be specified Printer System All the settings can be specified Host Interface All...

Page 288: ...gs All the settings can be specified Scanner General Settings All the settings can be specified Scan Settings All the settings can be specified Send Settings All the settings can be specified Initial...

Page 289: ...via SmartDeviceMonitor for Admin The following settings can be specified Device Information Reset Device Reset Current Job Reset All Jobs User Management Tool The following settings can be specified U...

Page 290: ...specified File Transfer SMTP Server Server Name Port No E mail Communication Port E mail Reception Interval Max Reception E mail Size E mail Storage in Server Auto Specify Sender Name Scanner Resend...

Page 291: ...IP Settings Program Change Delete Gateway Scanner Features The following settings can be specified Send Settings Max E mail Size Divide Send E mail Settings via Web Image Monitor The following setting...

Page 292: ...Password Change Encryption Password Fax Send Reception Settings Maximum E mail Size Divide Send E mail IP Fax Settings All the settings can be specified IP Fax Gateway Settings All the settings can b...

Page 293: ...he settings can be specified SSDP All the settings can be specified Bonjour All the settings can be specified Security Network Security All the settings can be specified Access Control All the setting...

Page 294: ...he settings can be specified S MIME All the settings can be specified Webpage Download Help file Settings via SmartDeviceMonitor for Admin The following settings can be specified NIB Setup Tool All th...

Page 295: ...Program Change Administrator File Administrator Extended Security Enhance File Protection Auto Delete File in Document Server Delete All Files in Document Server Facsimile Features The following sett...

Page 296: ...ngs Auto E mail Notification Select groups to notify Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator Program Change Administrator Yo...

Page 297: ...Edit Title Address Book Switch Title Back Up Restore Address Book Display Clear Print Counter per User Clear All Users Clear per User Administrator Authentication Management User Management Program C...

Page 298: ...rator The user administrator settings that can be specified are as follows Login User Name Login Password Change Encryption Password Webpage Download Help File Settings via SmartDeviceMonitor for Admi...

Page 299: ...Owner This is a user who can store files in the machine and authorize other users to view edit or delete those files File Administrator This is the file administrator A Granted authority to operate N...

Page 300: ...Settings Read only Edit Edit Delete Full Control Owner File Admin Unlocking Files A 1 This setting can be specified by the owner 8 Appendix 298 8...

Page 301: ...on registered in the Address Book and has a login password and user name Full Control This is a user granted full control Abbreviations in the table columns A You can view and change the setting B You...

Page 302: ...ser Edit Delete User Full Control Registere d User User Admin Use Name as B B B B A A Protection Code C C C C A 1 A 1 Protection Object B B B B A A Protect Dest Permissions for Users Groups C C C A A...

Page 303: ...l Control Register ed User User Admin E mail Address B A A A A A Tab Name Folder Destination Settings Read only User Edit User Edit Delete User Full Control Register ed User User Admin SMB FTP NCP B A...

Page 304: ...tion displays the user settings that can be specified on the machine when user authentication is specified Settings that can be specified by the user vary according to the menu protect level and avail...

Page 305: ...y be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 General Features Settings Off Level 1 Level 2 Auto Image Density Priority R W R R Original Photo Type P...

Page 306: ...ack Margin Left Right R W R R Front Margin Top Bottom R W R R Back Margin Top Bottom R W R R 1 Sided 2 Sided Auto Margin T to T R W R R 1 Sided 2 Sided Auto Margin T to B R W R R Creep Setting for Mag...

Page 307: ...s Off Level 1 Level 2 Stamp Language R W R W R Stamp Priority R W R W R Stamp Colour COPY R W R R Stamp Colour URGENT R W R R Stamp Colour PRIORITY R W R R Stamp Colour For Your Info R W R R Stamp Col...

Page 308: ...be adjusted but not specified User Stamp Settings Off Level 1 Level 2 Program Delete Stamp R W R W R Stamp Format 1 R W R W R Stamp Format 2 R W R W R Stamp Format 3 R W R W R Stamp Format 4 R W R W R...

Page 309: ...tamp on Designating Slip Sheet R W R W R Stamp Position P1 P2 1 R W R W R Stamp Position 1 5 2 5 1 R W R W R Stamp Position 1 2 1 R W R W R Stamp Position P 1 P 2 1 R W R W R Stamp Position 1 2 1 R W...

Page 310: ...Copy Eject Face Method in Bypass Mode R W R R Memory Full Auto Scan Restart R W R R Insert Separation Sheet R W R R Letterhead Setting R W R W R Staple Position R W R W R Punch Type R W R W R Simplifi...

Page 311: ...mns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available Settings that are not in the l...

Page 312: ...the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 List Test Print Settings Off Level 1...

Page 313: ...d Print Jobs R W R R Initial Print Job List R W R R Memory Usage R W R R Duplex R W R R Copies R W R R Blank Page Print R W R R Spool Image R W R R Reserved Job Waiting Time R W R R Printer Language R...

Page 314: ...urce R W R R Font Number R W R R Point Size R W R R Font Pitch R W R R Symbol Set R W R R Courier Font R W R R Extend A4 Width R W R R Append CR to LF R W R R Resolution R W R R PS Menu 1 Settings Off...

Page 315: ...ngs Off Level 1 Level 2 Change PDF Password R W R R PDF Group Password R W R R Resolution R W R R Colour Setting R W R R Colour Profile R W R R 1 The PostScript 3 Unit option must be installed Printer...

Page 316: ...can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 General Settings Settings Off Level 1 Level 2 Switch Title R W R R Update Delivery Server Desti...

Page 317: ...l 2 Compression Black White R W R W R Compression Gray Scale Full Colour R W R W R High Compression PDF Level R W R W R Max E mail Size R R R Divide Send E mail R R R Insert Additional E mail Info R W...

Page 318: ...er reading nor modifying the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Off General Settings...

Page 319: ...ram Special Sender Print List R W N A N A Forwarding R W R R Reception File Setting R W R R Stored Reception File User Setting R W R R SMTP RX File Delivery Setting R W R R 2 Sided Print R W R W R Che...

Page 320: ...Code R W R N A Program Memory Lock ID R W R N A Internet Fax Settings R W R R Select Dial Push Phone R W R R Program Fax Information R W R R Enable H 323 Settings R W R R Enable SIP R W R R H 323 Set...

Page 321: ...ns in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available General Fe...

Page 322: ...Paper Size Tray 1 3 R W R N A Paper Type Bypass Tray R W R N A Paper Type Tray 1 3 R W R N A Paper Type LCT R W R N A Front Cover Sheet Tray R W R N A Back Cover Sheet Tray R W R N A Slip Sheet Tray...

Page 323: ...eekly Timer Code Monday R W R N A Weekly Timer Code Tuesday R W R N A Weekly Timer Code Wednesday R W R N A Weekly Timer Code Thursday R W R N A Weekly Timer Code Friday R W R N A Weekly Timer Code Sa...

Page 324: ...otocol R W R N A NW Frame Type R W R N A SMB Computer Name R W N A N A SMB Work Group R W N A N A Ethernet Speed R W R N A LAN Type R W R N A Ping Command R W R N A Permit SNMPv3 Communication R W R N...

Page 325: ...ng R W R N A Ad hoc Channel R W R N A Security Method R W R N A Restore Factory Defaults R W N A N A 3 The Wireless LAN interface unit option must be installed WEP Encryption Settings Settings A B C W...

Page 326: ...hange Delete E mail Message R W R W N A Auto Specify Sender name R W R N A Fax E mail Account R W R N A Scanner Resend Interval Time R W R N A Number of Scanner Resends R W R N A 5 Only the Main Deliv...

Page 327: ...A Auto Delete File in Document Server R W R N A Delete All Files in Document Server R W N A N A Capture Priority 7 R R N A Capture Delete All Unsent Files 7 R R N A Program Change Delete LDAP Server...

Page 328: ...ly the password can be specified 7 The File Format Converter option must be installed 8 The DataOverwriteSecurity Unit option must be installed 9 The Copy Data Security Unit option must be installed 1...

Page 329: ...iondisplaystheusersettingsthatcanbespecifiedonWebImageMonitorwhenuserauthentication isspecified Settingsthatcanbespecifiedbytheuservaryaccordingtothemenuprotectlevelandavailable settings specification...

Page 330: ...ite Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available System Settings A B C General Settings Device Nam...

Page 331: ...A Slip Sheet Tray Display Time R W R N A Designation Sheet 1 Tray Tray to set R W R N A Designation Sheet 1 Tray Apply Duplex R W R N A Designation Sheet 1 Tray Display Time R W R N A Designation She...

Page 332: ...er Select R W R N A Tray3 Apply Duplex R W R N A Tray4 Paper Size R W R N A Tray4 Custom Paper Size R W R N A Tray4 Paper Type R W R N A Tray4 Paper Thickness R W R N A Tray4 Apply Auto Paper Select R...

Page 333: ...rgy Saver Timer R W R N A Panel Off Timer R W R N A System Auto Reset Timer R W R N A Copier Document Server Auto Reset Timer R W R N A Facsimile Auto Reset Timer R W R N A Scanner Auto Reset Timer R...

Page 334: ...R W R N A Transfer Logs R R N A Encrypt Logs R R N A Delete All Logs R R N A E mail Settings A B C Administrator E mail Address R W R N A Reception Protocol R W R N A E mail Reception Interval R W R...

Page 335: ...tion Port No R W R N A IMAP4 Reception Port No R W R N A Fax E mail Address R W R N A Receive Fax E mail R W N A N A Fax E mail User Name R W N A N A Fax E mail Password R W N A N A E mail Notificatio...

Page 336: ...rror R R N A Duplex Unit Error R R N A Replacement Required PCU R R N A Add Staples R R N A Service Call Successful R R N A Hole Punch Receptacle is Full R R N A File Storage Memory Full Soon R R N A...

Page 337: ...R N A File Transfer Settings A B C SMB User Name R W N A N A SMB Password R W N A N A FTP User Name R W N A N A FTP Password R W N A N A NCP User Name R W N A N A NCP Password R W N A N A User Authent...

Page 338: ...W R N A LDAP Authentication Login Name Attribute R W R N A LDAP Authentication Unique Attribute R W R N A LDAP Authentication Available Function R W R N A Integration Server Authentication Printer Jo...

Page 339: ...thentication R R N A Available Settings for Machine Administrator R R N A Network Administrator Authentication R R N A Available Settings for Network Administrator R R N A File Administrator Authentic...

Page 340: ...r modifying the setting is available The default for Menu Protect is Level 2 Printer Basic Settings System Settings Off Level 1 Level 2 Print Error Report R W R N A Auto Continue R W R N A Memory Over...

Page 341: ...guage R W R N A Tray Switching R W R N A List Test Print Lock R R N A Virtual Printer R W R N A Host Interface Settings Off Level 1 Level 2 I O Buffer R R R I O Timeout R R R PCL Menu Settings Off Lev...

Page 342: ...it option must be installed PDF Menu 1 Settings Off Level 1 Level 2 Resolution R R R Color Setting R R R Color Profile R R R 1 The PostScript 3 Unit option must be installed Virtual Printer Settings S...

Page 343: ...New PDF Group Password R W N A N A Confirm PDF Group Password R W N A N A 1 The PostScript 3 Unit option must be installed PDF Fixed Password 1 Settings Off Level 1 Level 2 Current PDF Fixed Password...

Page 344: ...e default for Menu Protect is Level 2 General Settings Settings Off Level 1 Level 2 Switch Title R W N A N A Search Destination R W N A N A TWAIN Standby Time R W N A N A Destination List Display Prio...

Page 345: ...Compression PDF Level R W N A N A Max E mail Size R W N A N A Divide Send E mail R W N A N A Insert Additional E mail Info R W N A N A No of Digits for Single Page Files R W N A N A Stored File E mail...

Page 346: ...lt for Menu Protect is Off Initial Settings Settings Off Level 1 Level 2 Closed Network Code R W N A N A Internet Fax R W N A N A Program Memory Lock ID R W N A N A Fax Information Fax Header R W N A...

Page 347: ...N A Own Fax No R W N A N A Enable SIP R W N A N A Enable Server R W N A N A User Name R W N A N A Server IP Address Proxy Server Addr Main R W N A N A Server IP Address Proxy Server Addr Sub R W N A...

Page 348: ...N A N A Communication Result Report R W N A N A Memory Storage Report R W N A N A SEP Code RX Result Report R W N A N A SEP Code RX Reserve Report R W N A N A Confidential File Report R W N A N A LAN...

Page 349: ...n specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor mo...

Page 350: ...ethod R W R N A WEP Authentication R W R N A WEP Key Number R W R N A WEP Key R W R N A WPA Encryption Method R W R N A WPA Authentication Method R W R N A WPA PSK WPA2 PSK R W R N A WPA WPA2 Settings...

Page 351: ...vailable functions have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applic...

Page 352: ...R N A RHPP R W R N A IPv6 Settings A B C IPv6 Address R W R N A Host Name R W R N A Domain Name R W R N A Link local Address R W R N A Stateless Address R W R N A Manual Configuration Address R W R N...

Page 353: ...C NetWare R W R N A Print Server Name R W R N A Logon Mode R W R N A File Server Name R W R N A NDS Tree R W N A N A NDS Context Name R W R N A Operation Mode R W R N A Remote Printer No R W N A N A...

Page 354: ...B R W R N A Protocol R R N A Workgroup Name R W R N A Computer Name R W R N A Comment R W R N A Share Name R R N A Notify Print Completion R W R N A Bonjour Settings A B C Bonjour R W R N A Local Host...

Page 355: ...bpage Settings A B C Language 1 R W R N A Language 2 R W R N A URL 1 R W R N A URL 2 R W R N A Set Help URL Target R W R N A WS Device UPnP Setting R W R N A Download Help Page R W R W N A Network 353...

Page 356: ...options and additional functions Hard Disk overwrite erase function DataOverwriteSecurity Unit Data security for copying function Copy Data Security Unit PDF direct print function Postscript 3 Unit H...

Page 357: ...Address Book 235 Encrypting Data on the Hard Disk 147 Encrypting the Data in the Address Book 144 Encryption Key Auto Exchange Manual Settings Shared Settings 211 Encryption Key Auto Exchange Security...

Page 358: ...Restrict Display of User Information 236 Restrict Use of Destinations 235 Restrict Use of Simple Encryption 237 Restrictions on Destinations 130 S S MIME 133 Scanner 342 Scanner Features 314 Security...

Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...

Page 360: ...MEMO 358...

Page 361: ...MEMO 359...

Page 362: ...MEMO 360 EN USA D015 7902...

Page 363: ...orporation in the United States other countries or both Other product names used herein are for identification purposes only and might be trademarks of their respective companies We disclaim any and a...

Page 364: ...Security Reference Operating Instructions Type for C6055 MP C6000 LD260c Aficio MP C6000 D015 7902 EN USA Type for C7570 MP C7500 LD275c Aficio MP C7500...

Reviews: