
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
Notice..................................................................................................................................................................9
Symbols........................................................................................................................................................10
Display..........................................................................................................................................................10
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Before Using the Security Functions................................................................................................................13
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................18
Using Authentication and Managing Users...............................................................................................18
Ensuring Information Security.....................................................................................................................18
Limiting and Controlling Access..................................................................................................................19
Enhanced Network Security.......................................................................................................................20
2. Administrators/Authentication and Its Application
User Administrator.......................................................................................................................................21
Machine Administrator................................................................................................................................22
Network Administrator................................................................................................................................22
File Administrator.........................................................................................................................................22
Supervisor.....................................................................................................................................................22
About Administrator Authentication................................................................................................................23
Enabling Administrator Authentication...........................................................................................................24
Specifying Administrator Privileges............................................................................................................24
Registering the Administrator......................................................................................................................26
Logging on Using Administrator Authentication........................................................................................30
Logging off Using Administrator Authentication........................................................................................31
3
Summary of Contents for Aficio MP C2030
Page 2: ......
Page 10: ...INDEX 245 8 ...
Page 118: ...6 Press the User Tools Counter key 5 Managing Access to the Machine 116 5 ...
Page 128: ...5 Managing Access to the Machine 126 5 ...
Page 153: ... p 26 Registering the Administrator Protection Using Encryption 151 6 ...
Page 194: ...8 Troubleshooting 192 8 ...
Page 249: ...MEMO 247 ...
Page 250: ...MEMO 248 GB GB EN USA AE AE D040 ...
Page 251: ...Copyright 2008 ...