
8
Getting Started
Authentication and its Application
Ensuring Information Security
Managing Access to the Machine
Enhanced Network Security
Specifying the Extended Security Functions
Troubleshooting
Appendix
1
2
3
4
5
6
7
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
Security Reference
Operating Instructions
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...