
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................9
Symbols...........................................................................................................................................................9
IP Address.......................................................................................................................................................9
1. Getting Started
Enhanced Security............................................................................................................................................11
Glossary.......................................................................................................................................................11
Setting Up the Machine...............................................................................................................................12
Security Measures Provided by this Machine................................................................................................15
Using Authentication and Managing Users...............................................................................................15
Ensuring Information Security.....................................................................................................................15
Limiting and Controlling Access..................................................................................................................17
Enhanced Network Security.......................................................................................................................18
2. Authentication and its Application
Administrators and Users.................................................................................................................................19
Administrators...............................................................................................................................................19
User...............................................................................................................................................................20
The Management Function..............................................................................................................................22
About Administrator Authentication............................................................................................................22
About User Authentication..........................................................................................................................23
Enabling Authentication...................................................................................................................................25
Authentication Setting Procedure...............................................................................................................25
Administrator Authentication...........................................................................................................................27
Specifying Administrator Privileges............................................................................................................27
Registering the Administrator......................................................................................................................30
Logging on Using Administrator Authentication........................................................................................35
Logging off Using Administrator Authentication........................................................................................36
Changing the Administrator........................................................................................................................37
Using Web Image Monitor.........................................................................................................................38
User Authentication..........................................................................................................................................40
User Code Authentication...............................................................................................................................41
Specifying User Code Authentication........................................................................................................41
Basic Authentication.........................................................................................................................................46
3
Summary of Contents for C6055
Page 12: ...10...
Page 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Page 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Page 168: ...3 Ensuring Information Security 166 3...
Page 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Page 250: ...6 Specifying the Extended Security Functions 248 6...
Page 272: ...7 Troubleshooting 270 7...
Page 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Page 360: ...MEMO 358...
Page 361: ...MEMO 359...
Page 362: ...MEMO 360 EN USA D015 7902...