background image

Specifying the Extended Security Functions

111

6

Restrict Adding of User Destinations

This can be specified by the user administrator.
When “Restrict Use of Destinations” is set to 

[

Off

]

. After entering a fax or scan-

ner destination directly, you can register it in the address book by pressing

[

ProgDest

]

. If 

[

On

]

 is selected for this setting, 

[

ProgDest

]

 does not appear. This

prevents the registration of destinations not managed by the administrator.
• On
• Off

Note

Default:

Off

Restrict Display of User Information

This can be specified by the machine administrator.
This can be specified if user authentication is specified. When the job history
is checked using a network connection for which authentication is not avail-
able, all personal information can be displayed as “********”. For example,
when someone not authenticated as an administrator checks the job history
using SNMP in SmartDeviceMonitor for Admin, personal information can be
displayed as “********” so users cannot be identified. Because no information
identifying registered users can be viewed, unauthorized users can be pre-
vented from obtaining information about the registered files.
• On
• Off

Note

Default:

Off

Enhance File Protection

This can be specified by the file administrator. By specifying a password, you
can limit operations such as printing, deleting, and sending files, and can pre-
vent unauthorized people from accessing the files. However, it is still possible
for the password to be cracked.
By specifying “Enhance File Protection”, files are locked and so become inac-
cessible if an invalid password is entered ten times. This can protect the files
from unauthorized access attempts in which a password is repeatedly
guessed.
The locked files can only be unlocked by the file administrator. When “En-
hance File Protection” is specified, (

) appears at the top right of the screen.

Note

If files are locked, you cannot select them even if the correct password is
entered.

• On
• Off

Note

Default:

Off

Summary of Contents for Aficio 3035

Page 1: ...be sure to read the Safety Information in the General Settings Guide before using the machine Getting Started Preventing Information Leaks Preventing Unauthorized Use of Functions and Settings Enhance...

Page 2: ...trademarks of Adobe Systems Incorporated PCL is a registered trademark of Hewlett Packard Company NetWare is a registered trademarks of Novell Inc Bluetooth is a Trademark of the Bluetooth SIG Inc Sp...

Page 3: ...t data from being tampered or prevent the machine from unauthorized use Also refer to this manual for the procedures for registering administrators as well as setting user and admin istrator authentic...

Page 4: ...ayed from the Setup display when DeskTopBinder Lite is installed DeskTopBinder Lite Introduction Guide PDF file CD ROM2 Describes operations of DeskTopBinder Lite and provides an overview of its funct...

Page 5: ...of Locked Print Files 18 Unlocking Locked Print Files 19 Specifying Access Permission for Stored Files 20 Assigning Users and Access Permission for Stored Files 21 Assigning the User and the Access P...

Page 6: ...ion 63 About User Authentication 64 About Administrator Authentication 65 Administrators and Users 66 Administrator 66 User 67 Enabling Authentication 68 Administrator Authentication 68 User Authentic...

Page 7: ...8 Appendix Operations by the Supervisor 121 Logging on as the Supervisor 122 Logging off as the Supervisor 122 Changing the Supervisor 123 Resetting an Administrator s Password 124 Machine Administrat...

Page 8: ...ser Account Settings in the Address Book 142 User Settings 145 Copier Document Server Features 145 Printer Functions 148 Scanner Features 150 Facsimile Features 151 System Settings 153 Web Image Monit...

Page 9: ...to read the instructions all of which are described in the Safety Information section The statements above are notes for your safety Important If this instruction is not followed paper might be misfe...

Page 10: ...2...

Page 11: ...thentication administrators manage the machine and its users To enable authentication information about both administrators and users must be registered in order to authenticate users via their login...

Page 12: ...the user who knows the login user name and password Administrator Authentication Administrators are authenticated by means of the login user name and login password supplied by the administrator when...

Page 13: ...tor and then log on to the machine as the admin istrator H Install the server certificate I Enable secure sockets layer SSL J Enter the administrator s user name and password K During steps F to I the...

Page 14: ...o use and access scanned files and the files in Document Server You can prevent such activities as the sending and downloading of stored files by unauthorized users Reference For details see p 20 Spec...

Page 15: ...ration Preventing Modification or Deletion of Stored Data You can specify who is allowed to access stored scan files and files stored in Document Server You can permit selected users who are allowed t...

Page 16: ...o encrypt the login password for administrator authentication and user authentication Reference For details see p 50 Encrypting Transmitted Passwords Safer Communication Using SSL When you access the...

Page 17: ...Copy Prevention A Using the printer driver specify the printer settings for unauthorized copy prevention See p 13 Specifying Printer Settings for Unauthorized Copy Prevention Printer Driver Setting Da...

Page 18: ...attern for instance a warn ing such as No Copying in a printed document appears conspicuously in printed copies Important Unauthorized copy prevention discourages unauthorized copying and will not nec...

Page 19: ...Text and images in the document are grayed out in printed copies Limitation To gray out copies of data security for copying documents when they are cop ied or stored in the Document Server the option...

Page 20: ...ment is registered as a user stamp the machine does not beep the file registered as a user stamp is grayed out and no entry is added to the unauthorized copying log Printing Limitations The following...

Page 21: ...er Settings for Unauthorized Copy Prevention Printer Driver Setting Using the printer driver specify the printer settings for unauthorized copy pre vention Reference To use the printer function under...

Page 22: ...see p 11 Data Security for Copy ing Reference To use the printer function under the User Authentication you must enter the login user name and password for the printer driver For details see the print...

Page 23: ...for Copy ing Preparation For details about logging on and logging off with administrator authentica tion see p 106 Logging on Using Administrator Authentication p 107 Logging off Using Administrator...

Page 24: ...these files Choosing a Locked Print file Using the printer driver specify a Locked Print file Reference If user authentication has been enabled you must enter the login user name and login password us...

Page 25: ...ed via Web Image Monitor For details see the Web Image Monitor Help Preparation For details about logging on and logging off with user authentication see p 92 Login Using the Control Panel p 92 Log Of...

Page 26: ...Print Jobs C Press Locked Print Job List D Select the file E Press Delete F Enter the password of the Locked Print file and then press OK G Press Yes Deleting Passwords of Locked Print Files If the fi...

Page 27: ...cked and become in accessible if an invalid password is entered ten times This section explains how to unlock files Only the file administrator can unlock files For details about Enhance File Protecti...

Page 28: ...ls see the Web Image Monitor Help The default access permission for the file creator owner is Read on ly You can also specify the access permission Password for Stored Files Passwords for stored files...

Page 29: ...ut logging on and logging off with administrator authentica tion see p 106 Logging on Using Administrator Authentication p 107 Logging off Using Administrator Authentication Important If files become...

Page 30: ...his can be specified by the file creator owner or user administrator Specify the users and their access permission to files stored by a particular user Only those users granted access permission can a...

Page 31: ...s Book Management If the setting to be specified does not appear press TNext to scroll down to other settings E Select the user or group F Press Protection G Under Protect File s press Program Change...

Page 32: ...By pressing All Users you can select all the users J Press Exit K Select the user who you want to assign an access permission to and then select the permission Select the access permission from Read o...

Page 33: ...on and logging off with administrator authentica tion see p 106 Logging on Using Administrator Authentication p 107 Logging off Using Administrator Authentication A Press the Document Server key B Se...

Page 34: ...inistrator can unlock files For details about Enhance File Protection see p 109 Specifying the Extended Security Functions Preparation For details about logging on and logging off with administrator a...

Page 35: ...ibit users from directly entering telephone numbers e mail addresses or Folder Path in order to send files If you set Restrict Use of Destinations to Off Restrict Adding of User Destina tions appears...

Page 36: ...ls D Press Extended Security E Press On for Restrict Use of Destinations F Press OK G Press the User Tools Counter key Reference This can also be specified using Web Image Monitor or SmartDeviceMon it...

Page 37: ...pecified by a user granted full control or the user administrator You can specify who is allowed to access the data in the address book By making this setting you can prevent the data in the address b...

Page 38: ...r Users Groups H Press New Program I Select the users or groups to register You can select more than one users By pressing All Users you can select all the users J Press Exit K Select the user who you...

Page 39: ...ss book may take a long time Up to three minutes The time it takes to encrypt the data in the address book depends on the number of registered users The machine cannot be used during encryption If you...

Page 40: ...curity E Press On for Encrypt Address Book F Press Change for Encryption Key G Enter the encryption key and then press OK Enter the encryption key using up to 32 alphanumeric characters H Press Encryp...

Page 41: ...ng log information is stored in the machine s memory and on its hard disk Job log Stores information about workflow related to user files such as copying printing and scan file delivery Access log Sto...

Page 42: ...ion message appears E Press Yes F Press Exit G Press the User Tools Counter key Transfer Log Setting The machine administrator can select On from the log server only When using the machine s control p...

Page 43: ...ting the Data on the Hard Disk To use this function the optional DataOverwriteSecurity unit must be installed You can overwrite data on the hard disk Note Depending on the hard disk capacity and the m...

Page 44: ...tically once the job is completed The Copier Fax and Printer functions take priority over the Auto Erase Memory function If a copy fax or print job is in progress overwriting will only be done after t...

Page 45: ...o Erase Memory is set to On temporary data that remained on the hard disk when Auto Erase Memory was Off might not be overwritten Note Should the main power switch of the machine be turned off before...

Page 46: ...r it has been printed or deleted from the Document Server 5 Data stored in the Address Book can be encrypted for security For details see p 31 Encrypting the Data in the Address Book 6 Image overlay d...

Page 47: ...re also deleted user codes counters under each user code user stamps data stored in the Address Book printer fonts downloaded by users applications using Embedded Software Architecture SSL server cert...

Page 48: ...ompleted overwriting is canceled Make sure the main power switch is not turned off during overwriting Note If the main power is turned off when Erase All Memory is in progress overwriting will start a...

Page 49: ...of administrator can be designat ed User Administrator File Administrator Network Administrator Machine Administrator Reference For details see p 99 The Roles of Administrators For details see p 101...

Page 50: ...by the user administrator Specify the functions available to registered users By making this setting you can limit the functions available to users Preparation For details about logging on and logging...

Page 51: ...F Press Auth Info G In Available Functions select the functions you want to specify If the setting to be specified does not appear press TNext to scroll down to other settings H Press OK I Press Exit...

Page 52: ...Preventing Unauthorized Use of Functions and Settings 44 3...

Page 53: ...her to enable or disable the function for each protocol By making this setting you can specify which protocols are available and so pre vent unauthorized access over the network Preparation For detail...

Page 54: ...ess is possible will be from 192 168 15 16 to 192 168 15 20 Limitation Using access control you can limit access involving LPD RCP RSH FTP IPP DIPRINT Web Image Monitor SmartDeviceMonitor for Client o...

Page 55: ...ice local area network LAN Select Level 0 to use this setting if no information needs to be protected You can specify the entire network security level setting the machine s control panel If you chang...

Page 56: ...s not appear press TNext to scroll down to other settings E Select the network security level Select Level 0 Level 1 or Level 2 F Press OK G Press the User Tools Counter key Status of Functions under...

Page 57: ...P HTTP Port 80 U U U Port 443 U U U Port 631 U U Port 7443 7444 U U U IPP Port 80 U U U Port 631 U U Port 443 U U U DIPRINT LPR FTP Port 21 U U U RFU Port 10021 U U U RSH RCP SNMP SNMP v1v2 Setting Br...

Page 58: ...e security Note To use PDF direct print the optional PostScript3 unit must be installed Password for IPP Authentication Using Web Image Monitor you can encrypt the password for IPP authentica tion Not...

Page 59: ...K Enter the driver encryption key using up to 32 alphanumeric characters Note The network administrator must give users the driver encryption key specified on the machine so they can register it on th...

Page 60: ...tor Authentication p 107 Logging off Using Administrator Authentication A Press the User Tools Counter key B Press Printer Features C Press PDF Menu and then press PDF Group Password If the setting to...

Page 61: ...ion passwords for the machine using Web Image Monitor By making this setting you can encrypt IPP authentication passwords for trans mission to prevent them from being analyzed A Open a Web Image Monit...

Page 62: ...stall a server certificate in the machine negotiate a secure connection and encrypt transmitted data SSL Secure Sockets Layer A To access the machine from a user s computer request for the SSL server...

Page 63: ...on the cer tificate authority Follow the procedure specified by the certificate author ity B Installing the server certificate Install the server certificate using Web Image Monitor C Enabling SSL En...

Page 64: ...te the server certificate from the machine Creating the Server Certificate Certificate Issued by a Certificate Authority Create the server certificate using Web Image Monitor This section explains the...

Page 65: ...erver Certificate Certificate Issued by a Certificate Authority Install the server certificate using Web Image Monitor This section explains the use of a certificate issued by a certificate authority...

Page 66: ...Enable for SSL TLS F Click Apply The SSL setting is enabled G Log off from the machine Note If you set Permit SSL TLS Communication to Ciphertext Only enter ht tps machine s address to access the mach...

Page 67: ...ication Mode Using the encrypted communication mode you can specify encrypted com munication Setting the SSL TLS Encryption Mode This can be specified by the network administrator After installing the...

Page 68: ...ss TNext to scroll down to other settings E Select the encrypted communication mode Select Ciphertext Only Ciphertext Priority or Ciphertext Clear Text as the en crypted communication mode F Press OK...

Page 69: ...with Preparation For details about logging on and logging off with administrator authentica tion see p 106 Logging on Using Administrator Authentication p 107 Logging off Using Administrator Authentic...

Page 70: ...nitor for Admin in addition to specifying Permit SNMP V3 Communication on the machine If network administrator s Encryption Password setting is not specified the data for transmission may not be encry...

Page 71: ...limits you can not only limit the machine s available functions but also protect the machine settings and files and data stored in the machine Important If you have enabled Administrator Authenticati...

Page 72: ...cation function to prevent unauthorized access By using login user name and login password you can specify access limits for individual users and groups of users 1 User A user performs normal operatio...

Page 73: ...te all logs can only be specified by the ma chine administrator 3 Network Administrator This administrator manages the network settings You can set the machine so that network settings such as the IP...

Page 74: ...he Web Image Monitor Help Reference For details see p 88 Specifying Login User Name and Login Password For details see p 121 Operations by the Supervisor Administrator There are four types of administ...

Page 75: ...address book by the user administrator In addition to registering users with the machine s control panel you can register them using SmartDeviceMonitor for Admin or Web Im age Monitor Note Only the us...

Page 76: ...104 Registering the Administrator Administrator Authentication To use administrator authentication enable Administrator Authentication Manage ment on the control panel Important If you have enabled Ad...

Page 77: ...ol panel and then make the required settings for the authen tication The settings depend on the authentication method Important When using Windows authentication or LDAP authentication keep in mind th...

Page 78: ...hine select Basic Authentication Windows Authentication LDAP Au thentication or Integration Server Authentication Reference For details about specifying the user code for the printer driver see Printe...

Page 79: ...you can not only manage the ma chine s available functions but also limit access to stored files and to the personal data in the address book Under basic authentication the administrator must specify...

Page 80: ...authentication is not required Specify this setting if you want to print using unauthenticat ed printer drivers or without any printer driver Authentication is required for printing with non specifie...

Page 81: ...en when authentication is performed Operational Requirements for Windows Authentication To specify Windows authentication the following requirements must be met A domain controller has been set up in...

Page 82: ...o or more global groups can use all the functions avail able to members of those groups If the Guest account on the Windows server is enabled even users not reg istered in the domain controller can be...

Page 83: ...ter job authentication is not required Specify Parallel Interface Simple USB Sim ple and the clients IP address range in which printer job authentication is not required Specify this setting if you wa...

Page 84: ...authenticated You also need to register in the machine the functions available to the global group members Create global groups in the machine by entering the names of the global groups registered in...

Page 85: ...d dresses registered in Active Directory We recommend you install Internet Information Services IIS and Certificate services as the Windows components Install the components and then create the server...

Page 86: ...xt F Select Prepare the request now but send it later and then click Next G Enter the required information according to the instructions given by Web Server Certificate Wizard H Check the specified da...

Page 87: ...network configuration must allow the ma chine to detect the presence of the LDAP server To use LDAP authentication you need to register the LDAP server in the ma chine For details about registration s...

Page 88: ...print using a printer driver or a device that does not support authentication To also print under an environment that does not support authentication select Simple All By making this setting only regi...

Page 89: ...y the ma chine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be used by unauthorized users Reference Fo...

Page 90: ...Authentication To use Integration Server Authentication you need a server on which ScanRout er software that supports authentication is installed For external authentication the Integration Server Au...

Page 91: ...ration Svr Auth Note If you do not wish to use User Authentication Management select Off F Press Change for Server Name Specify the name of the server for external authentication G Enter the server na...

Page 92: ...e the available functions specified in Default Group By default all functions are available to Default Group members Specify the limitation on available functions according to user needs A Under Group...

Page 93: ...r printing with non specified devices If you select Simple All or Simple Limitation you can print even with un authenticated printer drivers or devices Specify this setting if you want to print with a...

Page 94: ...eset Reference For details about Restrict Use of Simple Encryption see p 109 Specifying the Extended Security Functions Printer Job Auth Entire The machine authenticates all printer jobs and remote se...

Page 95: ...s not selected In the PCL printer driver dialog box the User Authentication check box is not selected Personal authentication information is added to the printer job and is dis abled D When using the...

Page 96: ...he address book see General Settings Guide Specifying Login User Name and Login Password A Press the User Tools Counter key B Press System Settings C Press Administrator Tools D Press Address Book Man...

Page 97: ...n Folder Authentication Integration Server Authentication or LDAP Authentication see General Set tings Guide Note If you want to use Windows Authentication LDAP Authentication or Integration Svr Auth...

Page 98: ...entication or LDAP Authentication a user name other than oth er admin supervisor or HIDE must be specified The symbol represents any character To use Use Auth Info at Login for SMTP authentication a l...

Page 99: ...the machine automatically logs you off if you do not use the control panel within a given time Note Consult the User Administrator about your login user name password and user code For user code auth...

Page 100: ...entication or Integration Server Authentication is set A Press Enter for Login User Name B Enter a login user name and then press OK C Press Enter for Login Password D Enter a login password and then...

Page 101: ...B Enter a login user name and password and then click OK Note For user code authentication enter a user code in User Name and then click OK The procedure may differ depending on the Web Image Monitor...

Page 102: ...s Auto Logout Timer If the setting to be specified does not appear press TNext to scroll down to other settings E Select On and then enter 10 to 999 seconds using the number keys Note If you do not wa...

Page 103: ...protect limitation is applied To limit access to the fullest extent select Level 2 For details about the menu protect level for each function see p 139 User Administrator Settings Note The functions...

Page 104: ...ne Manage ment File Management and Network Management to On A Press the User Tools Counter key B Press Facsimile Features C Press Administrator Tools D Press Menu Protect If the setting to be specifie...

Page 105: ...er key B Press Printer Features C Press Maintenance D Press Menu Protect E Select the menu protect level and then press OK F Press the User Tools Counter key Scanner Functions Note To specify Menu Pro...

Page 106: ...Management Based on Authentication and Access Control 98 5 D Press Menu Protect E Select the menu protect level and then press OK F Press the User Tools Counter key...

Page 107: ...strator can register delete users in the address book or change users personal information Users registered in the address book can also change and delete their own in formation If any of the users fo...

Page 108: ...erver By making this setting you can pre vent data leaks and tampering due to unauthorized users viewing and using the registered data Supervisor The supervisor can delete an administrator s password...

Page 109: ...ica tions such as SmartDeviceMonitor for Admin Administrators are limited to managing the machine s settings and controlling user access so they cannot use functions such as copying and printing To us...

Page 110: ...entica tion see p 106 Logging on Using Administrator Authentication p 107 Logging off Using Administrator Authentication The Administrator 1 defaults are admin for the login name and blank for the pas...

Page 111: ...nt to specify management The selected settings will be unavailable to users Specifying Network Management Authentication A Press Network Management and then press On B Press the item for which you wan...

Page 112: ...horized operation by a single administra tor Administrator authentication can also be specified via Web Image Monitor For details see the Web Image Monitor Help Preparation If administrator authentica...

Page 113: ...administrator s authority to a different person the screen appears as follows F Press Change for the login user name G Enter the login user name and then press OK H Press Change for the login passwor...

Page 114: ...thentication appears To log on as an administrator enter the administrator s login user name and login password If you log on using administrator authority the name of the administrator logging on app...

Page 115: ...Tools Counter key Changing the Administrator Change the administrator s login user name and login password You can also assign each administrator s authority to the login user names Administrator 1 to...

Page 116: ...s Program Change Administrator E In the line for the administrator you want to change press Administrator 1 Administrator 2 Administrator 3 or Administrator 4 and then press Change F Press Change for...

Page 117: ...cify them For details about when to use each function see the corresponding chapters Changing the Extended Security Functions To change the extended security functions display the extended security sc...

Page 118: ...e user administrator Encrypt the data in the ma chine s address book Reference See p 31 Encrypting the Data in the Address Book On Off Note Default Off Restrict Use of Destinations This can be specifi...

Page 119: ...martDeviceMonitor for Admin personal information can be displayed as so users cannot be identified Because no information identifying registered users can be viewed unauthorized users can be pre vente...

Page 120: ...you want to access the machine using DeskTopBinder or the ScanRouter delivery software enable SSL TLS for encrypted commu nication For details about specifying SSL TLS see p 59 Setting the SSL TLS En...

Page 121: ...b in progress if you are not authorized to use the copy and printer functions You can specify Authenticate Current Job only if User Authentication Manage ment was specified Login Privilege Access Priv...

Page 122: ...ent information leaks Reference For details see User Parameters Facsimile Reference Advanced Features Stored RX File User Setting You can specify which users can manage fax files stored on the hard di...

Page 123: ...k This can be specified by the machine administrator Service mode is used by a customer engineer for inspection or repair If you set the service mode lock to On service mode cannot be used unless the...

Page 124: ...st log onto the machine and cancel the service mode lock Preparation For details about logging on and logging off with administrator authentica tion see p 106 Logging on Using Administrator Authentica...

Page 125: ...ding to the information contained in the message Messages Causes Solutions You do not have the privileges to use this function The authority to use the func tion is not specified If this appears when...

Page 126: ...t cor rect Inquire the user administrator for the correct login user name and login password The number of users regis tered in the address book has reached the maximum limit allowed by Windows Authen...

Page 127: ...ntication is taking time because of operating condi tions Make sure the LDAP server setting is correct Make sure the network set tings are correct Authentication is not possible while the machine is e...

Page 128: ...ission for Stored Files Destinations specified using the machine do not appear User authentication may have been disabled while All Users is not specified Re enableuserauthentication and then enable A...

Page 129: ...blank We recommend changing the login user name and login password When registering login user names and login passwords you can specify up to 32 alphanumeric characters and symbols Keep in mind that...

Page 130: ...OK Note When you assign the administrator for the first time enter supervisor E Press Enter for Login Password Note When you assign the administrator for the first time proceed to step G without press...

Page 131: ...Change Administrator E Under Supervisor click Change F Press Change for the login user name G Enter the login user name and then press OK H Press Change for the login password I Enter the login passw...

Page 132: ...trator D Press System Settings E Press Administrator Tools F Press Program Change Administrator G Press Change for the administrator you wish to reset H Press Change for the login password I Enter the...

Page 133: ...face Settings Parallel Interface File Transfer The following settings can be specified Delivery Option Capture Server IP Address Fax RX File Transmission Line 1 3 E mail Address IP Fax RX File Deliver...

Page 134: ...strator Machine Administrator You can change the user name and the full control user s authority Key Counter Management Extended Security Restrict Display of user Information Transfer to Fax Receiver...

Page 135: ...settings can be specified Reproduction Ratio All the settings can be specified Edit All the settings can be specified Stamp All the settings can be specified Input Output All the settings can be spec...

Page 136: ...Program Confidential ID Program Polling ID Program Memory Lock ID Select Dial Push Phone Program ISDN G3 Line Program ISDN G4 Line Memory File Transfer Reception File Setting Folder Transfer Result R...

Page 137: ...tings All the settings can be specified Destination List Settings All the settings can be specified Send Settings The following settings can be specified TWAIN Standby Time File Type Priority Compress...

Page 138: ...settings can be specified Auto E mail Notification All the settings can be specified On demand E mail Notification All the settings can be specified File Transfer All the settings can be specified Us...

Page 139: ...can be specified Duplex Blank Page Print PDF Group Password Resolution PDF Group Password 1 The PostScript 3 unit option must be installed Fax General All the settings can be specified Administrator T...

Page 140: ...Monitor for Admin The following settings can be specified Device Information Reset Device Reset Current Job Reset All Jobs User Management Tool The following settings can be specified User Page Count...

Page 141: ...d 1 The IEEE1394 interface board option must be installed 2 The IEEE802 11b interface unit option must be installed File Transfer SMTP Server Server Name Port No E mail Communication Port E mail Recep...

Page 142: ...Web Image Monitor The following settings can be specified Device Settings System Device Name Comment Location E mail Reception SMTP E mail Communication Port Auto E mail Notification Program Change Ad...

Page 143: ...94 SCSI print SBP 2 Bidirectional SCSI print Bluetooth 3 Operation Mode 1 The IEEE802 11b interface unit option must be installed 2 The IEEE1394 interface board option must be installed 3 The Bluetoot...

Page 144: ...urity All the settings can be specified Access Control All the settings can be specified IPP Authentication All the settings can be specified SSL TLS All the settings can be specified Certificates All...

Page 145: ...Extended Security Enhance File Protection Auto Delete File in Document Server Delete All Files in Document Server Facsimile Features The following settings can be specified Administrator Tools Stored...

Page 146: ...ministrator Program Change Administrator You can specify the following administrator settings for the file adminis trator Login User Name Login Password Change Encryption Password Administrator Authen...

Page 147: ...ation Management User Management Program Change Administrator User Administrator Extended Security Restrict Use of Destinations Restrict Adding of User Destinations Encrypt Address Book Password Polic...

Page 148: ...Authentication Available Settings for File Administrator Program Change Administrator The user administrator settings that can be specified are as follows Login User Name Login Password Change Encrypt...

Page 149: ...is a user granted full control Owner This is a user who can store files in the machine and authorize other users to view edit or delete those files File Administrator This is the file administrator Gr...

Page 150: ...y Edit This is a user assigned Edit authority Edit Delete This is a user assigned Edit Delete authority Full Control This is a user granted full control Registered User This is a user whose personal i...

Page 151: ...tion No U Key Display U Name U Select Title U Auth Info User Code Login User Name Login Password 1 1 SMTP Authenti cation 1 1 Folder Authenti cation U LDAP Authenti cation 1 1 Available Functions U Pr...

Page 152: ...nterna tional TX Mode U Fax Header U Label In sertion U E mail Address E mail Address U Folder Destina tion SMB FT P NCP U SMB Path U FTP Port No U FTP Server Name U FTP Path U NCP Path U NCP Connec t...

Page 153: ...in the list can only be viewed regardless of the menu pro tect level setting Copier Document Server Features The default for Menu Protect is Level 2 Tab Names Settings Menu Protect Off Level 1 Level 2...

Page 154: ...RY 1 U Stamp Position For Internal Use Only 1 U Stamp Position CONFIDENTIAL 1 U Stamp Position DRAFT 1 U Stamp Language U User Stamp Program Delete Stamp U Stamp Position 1 U Stamp Format 1 U Stamp Po...

Page 155: ...ring in Combine U Stamp on Designating Slip Sheet U Stamp Position P1 P2 1 U Stamp Position 1 5 2 5 1 U Stamp Position 1 2 1 U Stamp Position 1 2 1 U Stamp Position P 1 P 2 1 U Stamp Position 1 1 1 2...

Page 156: ...U U Memory Overflow U U Job Separation U U Auto Delete Temporary Print Jobs U U Auto Delete Stored Print Jobs U U Initial Print Job List U U Memory Usage U U Duplex U U Copies U U Blank Page Print U U...

Page 157: ...t Source U U Font Number U U Point Size U U Font Pitch U U Symbol Set U U Courier Font U U Extend A4 Width U U Append CR to LF U U Resolution U U PS Menu 1 Data Format U U Resolution U U PDF Menu 1 Ch...

Page 158: ...Priority 1 U Destination List Priority 2 U Select Title U Update Delivery Server Destination List U Send Settings TWAIN Standby Time U File Type Priority U Compression Black White U Compression Gray S...

Page 159: ...ion Switch U Text Size Priority U Original Type Priority U Auto Image Density U Adjust Scan Density U Select Title U Change Initial Mode U Adjust Sound Volume U Program Fax Information U Scan End Rese...

Page 160: ...Delete Auto Document U Program Change Delete Scan Size U Print Journal U Transmission Page Count U Forwarding U Memory Lock RX U ECM U Parameter Setting U Program Special Sender Box Setting Transfer...

Page 161: ...has been speci fied Availa ble Set tings has been speci fied Availa ble Set tings has not been speci fied General Features Panel Tone U Warm Up Notice U Copy Count Display U Function Priority U Print...

Page 162: ...Facsimile Auto Reset Timer U Printer Auto Reset Timer U Scanner Auto Reset Timer U Set Date U Set Time U Auto Logout Timer U Tab Names Settings Admin istrator authen tication has not been speci fied A...

Page 163: ...d U Ping Command U Permit SNMP V3 Communication U Permit SSL TLS Communication U Host Name U Machine Name U Parallel Inter face 8 Parallel Timing U Parallel Communication Speed U Selection Signal Stat...

Page 164: ...EEE 802 11b 6 Communication Mode U Transmission Speed U SSID Setting U Channel U WEP Encryp tion Setting WEP Encryption Setting 2 U Transmission Speed U Return to Defaults U Print List U Tab Names Set...

Page 165: ...ception E mail Size U E mail Storage in Server U Default User Name Password Send 4 U Program Change Delete E mail Message U U Program Change Delete Subject U U Scanner Recall Interval Time U Number of...

Page 166: ...ogram Change Delete Transfer Request U U U Address Book Change Order U Address Book Edit Title U Address Book Select Title U Auto Delete File in Document Server U Delete All Files in Document Server U...

Page 167: ...ge Monitor Setting Device Settings The settings available to the user depend on whether or not administrator au thentication has been specified If administrator authentication has been specified the s...

Page 168: ...Date Time Set Date U Set Time U SNTP Server Address U SNTP Polling Interval U Time Zone U Timer Auto Off Timer U Panel Off Timer U System Auto Reset Timer U Copier Document Server Auto Reset Timer U F...

Page 169: ...E mail Address U POP User Name POP Password 1 Timeout setting after POP Auth U POP3 IMAP4 Server Name U POP3 IMAP4 Encryption U POP3 Reception Port No U IMAP4 Reception Port No U SMTP Reception Port N...

Page 170: ...ll U Add Staple U Paper Misfeed U Cover Open U Out of Paper U Hole Punch U Receptacle is Full U Paper Tray Error U Output Tray Full U Unit Connection Error U Duplex Unit Error U Document Server Memory...

Page 171: ...o Supply Info U Restriction to Device Status Info U Receivable E mail Address Domain Name U E mail Language U File Transfer SMB User Name SMB Password 1 FTP User Name FTP Password 1 NCP User Name NCP...

Page 172: ...Authentication Login Name Attribute U LDAP Authentication Unique Attribute U Integration Server Authentication Printer Job Authentication U Integration Server Authentication Integra tion Server Name...

Page 173: ...U Auto Delete Temporary Print Jobs U Auto Delete Stored Print Jobs U Initial Print Job List U Memory Usage U U Duplex U U Copies U U Blank Page Print U U Printer Language U U Edge Smoothing U Toner Sa...

Page 174: ...U U Point Size U U Font Pitch U U Symbol Set U U Courier Font U U Extend A4 Width U U Append CR to LF U U Resolution U U PS Settings 1 Duplex U U Blank Page Print U U Data Format U U Resolution U U PD...

Page 175: ...or Tools Program Confidential ID Program Polling ID ECM Memory Lock Reception Program Memory Lock ID Transfer Report Select Dial Push Phone E mail Settings Internet Fax Settings Maximum E mail Size SM...

Page 176: ...munication Result Report Memory Storage Report Polling TX Clear Report Polling RX Result Report Polling RX Reserve Report Confidential File Report LAN Fax Result Report Inclusion of part of image Erro...

Page 177: ...d 4 The IEEE 1284 interface board option must be installed Category Settings Admin istrator authen tication has not been speci fied Administrator authentication has been speci fied Avail able Set ting...

Page 178: ...ings available to the user depend on whether or not Available Settings has been specified Category Settings Admin istrator authen tication has not been speci fied Administrator authentication has been...

Page 179: ...dary WINS Server U Scope ID U Default Gateway Address U DNS Server U LPR U RSH RCP U DIPRINT U FTP U IPP U IPP Timeout U Category Settings Admin istrator authen tication has not been speci fied Admini...

Page 180: ...rotocol U AppleTalk AppleTalk U Printer Name U Zone Name U SMB SMB U Workgroup Name U Computer Name U Comment U Notify Print Completion U Rendezvous Rendezvous U Computer Name U Location U DIPRINT U L...

Page 181: ...Require Options The following functions require certain options and additional functions Hard Disk overwrite erases function DataOverwriteSecurity unit Data security for copying function Copy Data Sec...

Page 182: ...41 142 E mail Settings 127 131 134 Encrypt Address Book 110 Encrypted Communication Mode 59 Encryption Technology 3 Enhance File Protection 111 Erase All Memory 35 F Fax 131 135 167 File Administrator...

Page 183: ...ions 111 Restrict Display of User Information 111 Restrict Use of Destinations 110 Restrict Use of Simple Encryption 112 S Scan Settings 129 Security 136 Send Settings 129 134 Service Mode Lock 115 Se...

Page 184: ...176 MEMO...

Page 185: ...177 MEMO...

Page 186: ...178 EN USA AE AE B198 6707 MEMO...

Page 187: ...Copyright 2005...

Page 188: ...B1986707 Operating Instructions Security Reference Printed in China EN USA AE AE B198 6707...

Reviews: