Aficio C6055 Скачать руководство пользователя страница 1

8

Getting Started

Authentication and its Application

Ensuring Information Security

Managing Access to the Machine

Enhanced Network Security

Specifying the Extended Security Functions

Troubleshooting

Appendix

1

2

3

4

5

6

7

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information 
in "About This Machine" before using the machine.

Security Reference

Operating Instructions

Содержание C6055

Страница 1: ...urity Specifying the Extended Security Functions Troubleshooting Appendix 1 2 3 4 5 6 7 Read this manual carefully before you use this machine and keep it handy for future reference For safe and corre...

Страница 2: ...bank notes revenue stamps bonds stock certificates bank drafts checks passports driver s licenses The preceding list is meant as a guide only and is not inclusive We assume no responsibility for its c...

Страница 3: ...sure to read the Safety Information in this manual before using the machine This manual provides an introduction to the functions of the machine It also explains the control panel preparation procedur...

Страница 4: ...PostScript 3 UNIX Supplement For UNIX Supplement please visit our Web site or consult an authorized dealer This manual includes descriptions of functions and settings that might not be available on t...

Страница 5: ...ion Administrators and Users 19 Administrators 19 User 20 The Management Function 22 About Administrator Authentication 22 About User Authentication 23 Enabling Authentication 25 Authentication Settin...

Страница 6: ...ontrol Panel 91 User Code Authentication Using a Printer Driver 92 Login Using the Control Panel 92 Log Off Using the Control Panel 93 Login Using a Printer Driver 94 Login Using Web Image Monitor 94...

Страница 7: ...ail Transmission 133 Email Encryption 133 Attaching an Electronic Signature 135 Protecting the Address Book 141 Address Book Access Permission 141 Encrypting Data in the Address Book 144 Encrypting Da...

Страница 8: ...Authentication by IPsec 209 Encryption Key Auto Exchange Settings and Encryption Key Manual Settings 210 IPsec Settings 211 Encryption Key Auto Exchange Settings Configuration Flow 218 Encryption Key...

Страница 9: ...assword 275 Machine Administrator Settings 277 System Settings 277 Maintenance 280 Copier Document Server Features 280 Facsimile Features 280 Printer Features 282 Scanner Features 283 Settings via Web...

Страница 10: ...ccount Settings in the Address Book 299 User Settings Control Panel Settings 302 Copier Document Server Features 303 Printer Functions 309 Printer Features 310 Scanner Features 314 Facsimile Features...

Страница 11: ...This Machine Indicates points to pay attention to when using the machine and explanations of likely causes of paper misfeeds damage to originals or loss of data Be sure to read these explanations Ind...

Страница 12: ...10...

Страница 13: ...ific areas of machine usage such as settings and user registration Access limits for each user are specified by the administrator responsible for user access to machine functions and documents and dat...

Страница 14: ...address are stored in the machine s Address Book Personal information can be obtained from the Windows domain controller Windows authentication LDAP Server LDAP authentication or Integration Server I...

Страница 15: ...icate see Protection Using Encryption 9 Enable secure sockets layer SSL 10 Enter the administrator s user name and password For details about specifying the administrator user name and password see Re...

Страница 16: ...p 38 Using Web Image Monitor p 199 Protection Using Encryption p 30 Registering the Administrator 1 Getting Started 14 1...

Страница 17: ...gistered users By making this setting you can limit the functions available to users For details about specifying which functions are available see Limiting Available Functions p 25 Enabling Authentic...

Страница 18: ...s about preventing data leaks due to unauthorized transmission see Preventing Data Leaks Due to Unauthorized Transmission Using S MIME to Protect Email Transmission When sending mail from the scanner...

Страница 19: ...the Hard Disk Limiting and Controlling Access Preventing Modification or Deletion of Stored Data You can allow selected users to access stored scan files and files stored in Document Server You can p...

Страница 20: ...ng revealed by encrypting them for transmission Also encrypt the login password for administrator authentication and user authentication For details about encrypting transmitted passwords see Encrypti...

Страница 21: ...rk you can use the machine by accessing it using administrator authentication and disabling user authentication Do this if for instance you need to use the machine urgently p 50 Specifying Login User...

Страница 22: ...correct network operation For instructions on registering the network administrator see Registering the Administrator File Administrator This is the administrator who manages permission to access sto...

Страница 23: ...For details about registering users in the Address Book see Administrator Tools General Settings Guide SmartDeviceMonitor for Admin Help or Web Image Monitor Help Administrators and Users 21 2...

Страница 24: ...istrator login user name and login password If an administrator login user name or login password is forgotten a new password must be specified using the supervisor s authority Be sure not to forget t...

Страница 25: ...ing and receiving e mail can be specified by the network administrator only 4 File Administrator This administrator manages permission to access stored files You can specify passwords for Locked Print...

Страница 26: ...g and printing 3 Unauthorized User 4 Authentication Using a login user name and password user authentication is performed 5 This Machine 6 Access Limit Using authentication unauthorized users are prev...

Страница 27: ...cation Setting Procedure Specify administrator authentication and user authentication according to the following chart Administrator Authentication See Administrator Authentication Specifying Administ...

Страница 28: ...e Authentication without specifying administrator authentication p 27 Administrator Authentication p 40 User Authentication p 27 Specifying Administrator Privileges p 30 Registering the Administrator...

Страница 29: ...h as copying and printing To use these functions the administrator must register as a user in the Address Book and then be authenticated as the user Administrator authentication can also be specified...

Страница 30: ...ettings 3 Press Administrator Tools 4 Press Administrator Authentication Management If the setting to be specified does not appear press Next to scroll down to other settings 2 Authentication and its...

Страница 31: ...e settings to manage from Available Settings The selected settings will be unavailable to users Available Settings varies depending on the administrator For details about Available Settings see Managi...

Страница 32: ...n by a single administrator You can register up to four login user names Administrators 1 4 to which you can grant administrator privileges Administrator authentication can also be specified via Web I...

Страница 33: ...2 Press System Settings 3 Press Administrator Tools 4 Press Program Change Administrator Administrator Authentication 31 2...

Страница 34: ...ress Administrator 1 Administrator 2 Administrator 3 or Administrator 4 and then press Change If you allocate each administrator s authority to a different person the screen appears as follows 6 Press...

Страница 35: ...d and then press OK Follow the password policy to make the login password more secure For details about the password policy and how to specify it see Specifying the Extended Security Functions 10 If a...

Страница 36: ...t passwords are case sensitive User names cannot contain numbers only a space colon or quotation mark nor can they be left blank Do not use Japanese Traditional Chinese Simplified Chinese or Hangul do...

Страница 37: ...n describes how to log on 1 Press the Login Logout key BBD002S The message Press Login then enter the login user name and login password appears 2 Press Login If you do not want to log in press Cancel...

Страница 38: ...inistrator logging on appears If you log on using a login user name with the authority of more than one administrator Administrator appears If you try to log on from an operating screen Selected funct...

Страница 39: ...r example to assign machine administrator authority and user administrator authority to Administrator 1 press Administrator 1 in the lines for the machine administrator and the user administrator For...

Страница 40: ...Press OK twice You will be logged off 9 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Using Web Image Monitor...

Страница 41: ...192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login 4 Enter the login name and password of an administrator and then click Login 5 Make settings as desired...

Страница 42: ...on In this case since the User Code authentication does not have a password the login password is set as blank When authentication switches to an external authentication method Windows authentication...

Страница 43: ...see Printer Reference or the printer driver Help For details about specifying the TWAIN driver user code see the TWAIN driver Help To control the use of DeskTopBinder for the delivery of files stored...

Страница 44: ...uthentication management select Off 6 Select which of the machine s functions you want to limit The selected settings will be unavailable to users For details about limiting available functions for in...

Страница 45: ...ent that does not support authentication select Simple All or Simple Limitation If you select Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you...

Страница 46: ...driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it ma...

Страница 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...

Страница 48: ...uthentication the administrator must specify the functions available to each user registered in the Address Book Specifying Basic Authentication This can be specified by the machine administrator For...

Страница 49: ...nt select Off 6 Select which of the machine s functions you want to permit Basic Authentication will be applied to the selected functions Users can use the selected functions only For details about sp...

Страница 50: ...lecting Entire or Simple All If you select Entire you cannot print using a printer driver or a device that does not support authentication To print under an environment that does not support authentic...

Страница 51: ...is required for printing with non specified devices If you select Simple Limitation you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a...

Страница 52: ...idual users and groups of users Specify the setting in the Address Book for each user Users must have a registered account in the Address Book in order to use the machine when User Authentication is s...

Страница 53: ...4 Press Address Book Management 5 Select the user or group 6 Press Auth Info Basic Authentication 51 2...

Страница 54: ...o Log on The login user name and password specified in Address Book Management can be used as the login information for SMTP Authentication Folder Authentication and LDAP Authentication If you do not...

Страница 55: ...ol represents any character To use Use Auth Info at Login for SMTP authentication a login password up to 128 characters in length must be specified 1 Press the User Tools Counter key 2 Press System Se...

Страница 56: ...ified does not appear press Next to scroll down to other settings For folder authentication select Use Auth Info at Login in Folder Authentication For LDAP authentication select Use Auth Info at Login...

Страница 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...

Страница 58: ...A domain controller has been set up in a designated domain This function is supported by the operating systems listed below To obtain user information when running Active Directory use LDAP If SSL is...

Страница 59: ...which users first make settings in advance in the Address Book When accessing the machine subsequently you can use all the functions available to your group and to you as an individual user Users who...

Страница 60: ...3 Press Administrator Tools 4 Press User Authentication Management 5 Select Windows Auth If you do not want to use user authentication management select Off 2 Authentication and its Application 58 2...

Страница 61: ...9 To enable Kerberos authentication a realm must be registered beforehand The realm name must be registered in capital letters For details about registering a realm see Programming the Realm General...

Страница 62: ...entication Selecting Entire or Simple All If you select Entire you cannot print using a printer driver or a device that does not support authentication To print in an environment that does not support...

Страница 63: ...f the global groups registered in the Windows Server Keep in mind that group names are case sensitive Then specify the machine functions available to each group If global groups are not specified user...

Страница 64: ...nter key Under Windows Authentication you can select whether or not to use secure sockets layer SSL authentication To automatically register user information such as fax numbers and e mail addresses u...

Страница 65: ...s required for printing with non specified devices If you select Simple Limitation you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a p...

Страница 66: ...group members Create global groups in the machine by entering the names of the global groups registered in the Windows Server Keep in mind that group names are case sensitive Then specify the machine...

Страница 67: ...ools Counter key Under Windows Authentication you can select whether or not to use secure sockets layer SSL authentication To automatically register user information such as fax numbers and e mail add...

Страница 68: ...te Authority and then click Next On the displayed screen Enterprise root CA is selected 9 Enter the Certificate Authority name optional in CA Identifying Information and then click Next 10 Leave Data...

Страница 69: ...icate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor This section explains the use of a certificate issued by a certificate authority as the devic...

Страница 70: ...te Request box enter the contents of the device certificate received from the certificate authority 9 Click OK Installed appears under Certificate Status to show that a device certificate for the mach...

Страница 71: ...the machine If user information on the server is changed information registered in the machine may be overwritten when authentication is performed Under LDAP authentication you cannot specify access...

Страница 72: ...t The first time an unregistered user accesses the machine after LDAP authentication has been specified the user is registered in the machine and can use the functions available under Available Functi...

Страница 73: ...2 Press System Settings 3 Press Administrator Tools 4 Press User Authentication Management LDAP Authentication 71 2...

Страница 74: ...he IPv4 address range to which this setting is applied and whether or not to apply the setting to the parallel and USB interfaces If you select Entire or Simple All proceed to Selecting Entire or Simp...

Страница 75: ...Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if...

Страница 76: ...place a comma between them The search will return hits for either or both attributes Also if you place an equal sign between a login attribute and a value for example cn abcde uid xyz the search will...

Страница 77: ...gin user name will be created in the machine 6 Press OK 7 Press the User Tools Counter key p 174 Limiting Available Functions Selecting Simple Limitation If you select Simple Limitation you can specif...

Страница 78: ...nauthorized users 1 Press Simple Limitation 2 Press Change 3 Specify the range in which Simple Limitation is applied to Printer Job Authentication You can specify the IPv4 address range to which this...

Страница 79: ...select a user and then retrieve the user information from the LDAP server so it is transferred to the machine s Address Book To specify multiple login attributes place a comma between them The search...

Страница 80: ...user registered in the machine the two instances are treated as referring to the same user You can enter an attribute such as serialNumber or uid Additionally you can enter cn or employeeNumber provid...

Страница 81: ...entative Using Web Image Monitor you can specify that the server reliability and site certificate are checked every time you access the SSL server For details about specifying SSL using Web Image Moni...

Страница 82: ...Settings 3 Press Administrator Tools 4 Press User Authentication Management 5 Select Integration Svr Auth If you do not want to use User Authentication Management select Off 2 Authentication and its A...

Страница 83: ...ation 7 Enter the server name and then press OK Enter the IPv4 address or host name 8 In Authentication Type select the authentication system for external authentication Select an available authentica...

Страница 84: ...Change for Domain Name 10 Enter the domain name and then press OK You cannot specify a domain name under an authentication system that does not support domain login 2 Authentication and its Applicati...

Страница 85: ...proceed to step 17 If you have registered a group proceed to step 13 If you set Authentication Type to Windows Native or Windows NT Compatible you can use the global group If you set Authentication T...

Страница 86: ...ers can use the selected functions only For details about specifying available functions for individuals or groups see Limiting Available Functions 17 Press OK 18 Select the Printer Job Authentication...

Страница 87: ...to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentica...

Страница 88: ...rinting However note that because the machine does not require authentication in this case it may be used by unauthorized users 1 Press Simple Limitation 2 Press Change 3 Specify the range in which Si...

Страница 89: ...5 Press On for Use Secure Connection SSL and then press OK To not use secure sockets layer SSL for authentication press Off 6 Press the User Tools Counter key Integration Server Authentication 87 2...

Страница 90: ...ion fails the print job is reset C Printing is possible if user authentication is successful and Driver Encryption Key for the printer driver and machine match X Printing is not possible regardless of...

Страница 91: ...the UserAuthentication and Encrypt check boxes are selected Personal authentication information is added to the printer job The printer driver applies simple encryption to login passwords For details...

Страница 92: ...sonal authentication is performed using the user ID and password used for logging on via ftp However the user ID and password are not encrypted p 233 Specifying the Extended Security Functions 2 Authe...

Страница 93: ...a given time Additionally you can authenticate using an external device For details about using an external device for user authentication see Authentication Using an External Device Consult the User...

Страница 94: ...the printer driver For details see the printer driver Help Login Using the Control Panel Use the following procedure to log in when Basic Authentication Windows Authentication LDAP Authentication or...

Страница 95: ...press OK The message Authenticating Please wait appears Log Off Using the Control Panel Follow the procedure below to log off when Basic Authentication Windows Authentication or LDAP Authentication is...

Страница 96: ...he printer driver Help When logged on using a printer driver logging off is not required Login Using Web Image Monitor This section explains how to log on to the machine via Web Image Monitor 1 Click...

Страница 97: ...d administrator accounts only not general user accounts Lockout setting items The lockout function settings can be made using Web Image Monitor Setting Item Description Setting Values Default Setting...

Страница 98: ...Image Monitor appears 3 Click Login The machine administrator can log on Enter the login user name and login password 4 Click Configuration and then click User Lockout Policy under Security The User L...

Страница 99: ...d 4 Click Address Book The Address Book page appears 5 Select the locked out user account 6 Click Change 7 Select the Cancel Lockout check box under Authentication Information 8 Click OK 9 Click Logou...

Страница 100: ...ress Auto Logout Timer If the setting to be specified does not appear press Next to scroll down to other settings 5 Select On If you do not want to specify Auto Logout Timer select Off 2 Authenticatio...

Страница 101: ...6 Enter 60 to 999 seconds using the number keys and then press 7 Press the User Tools Counter key If User Authentication is Specified 99 2...

Страница 102: ...Authentication Using an External Device To authenticate using an external device see the device manual For details contact your sales representative 2 Authentication and its Application 100 2...

Страница 103: ...evention 1 Using the printer driver specify the printer settings for unauthorized copy prevention For details on how to specify settings for unauthorized copy prevention see Specifying Printer Setting...

Страница 104: ...printer driver you can embed background images and pattern in a printed document for Unauthorized Copy Prevention 2 The document is copied scanned or stored in the Document Server 3 Printed Copies The...

Страница 105: ...nter without the Copy Data Security Unit the embedded pattern appears conspicuously in the copy However character relief may differ depending on the copier or multifunction printer model in use or doc...

Страница 106: ...ver You cannot print at 200 dpi resolution You cannot partially embed pattern in the printed document You can only embed pattern that is entered in the text box of the printer driver Printing with emb...

Страница 107: ...d in the printed document Also specify Font Font style and Size 5 Click OK Specifying Printer Settings for Data Security for Copying Printer Driver Setting If a printed document using this function is...

Страница 108: ...n the Copy Data Security Unit must be installed If a printed document is copied or stored in the Document Server the copy is grayed out If a document that is not copy guarded is copied or stored the c...

Страница 109: ...settings 5 Press On If you do not want to specify Data Security for Copying select Off 6 Press OK 7 Press Exit 8 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 3...

Страница 110: ...rinter driver specify a Locked Print File You can also encrypt passwords for Lock Print files using the printer driver If user authentication has been enabled you must enter the login user name and lo...

Страница 111: ...r can change the user password if it is forgotten For details about logging on and logging off with user authentication see If User Authentication is Specified This can also be specified via Web Image...

Страница 112: ...pecified Deleting Locked Print Files This can be specified by the file creator owner To delete Locked Print files you must enter the password for the files If the password has been forgotten ask the f...

Страница 113: ...Press Print Jobs 3 Press Locked Print Job List 4 Select the file 5 Press Delete The password entry screen does not appear if the file administrator is logged in Printing a Confidential Document 111 3...

Страница 114: ...of Locked Print Files This can be specified by the file creator owner or file administrator If the password has been forgotten the file administrator changes the password to restore access This can a...

Страница 115: ...List 4 Select the file 5 Press Change Password 6 Enter the password for the stored file and then press OK The password entry screen does not appear if the file administrator is logged in Printing a Co...

Страница 116: ...ce File Protection is one of the extended security functions For details about this and other extended security functions see Specifying the Extended Security Functions Only the file administrator can...

Страница 117: ...6 Press Yes You can use the same procedure to unlock stored print files also p 233 Specifying the Extended Security Functions p 35 Logging on Using Administrator Authentication p 36 Logging off Using...

Страница 118: ...can specify the user and access permission This includes permission to view edit and edit delete files Files can be stored by any user who is allowed to use the Document Server copy function scanner...

Страница 119: ...ging on Using Administrator Authentication Logging off Using Administrator Authentication If files become inaccessible reset their access permission as the file creator owner This can also be done by...

Страница 120: ...ogram Change Delete 6 Press New Program 7 Select the users or groups you want to assign permission to You can select more than one user By pressing All Users you can select all the users 8 Press Exit...

Страница 121: ...ing the Scanner and Fax Functions If user authentication is set for the scanner function you can specify access privileges for stored files when storing them in the Document Server You can also change...

Страница 122: ...ission to and then select the permission Select the access permission from Read only Edit Edit Delete or Full Control 6 Press Exit 7 Press OK 8 Store files in the Document Server Changing Access Privi...

Страница 123: ...1 Press Select Stored File 2 Select the file 3 Press Manage Delete File 4 Press Change Access Priv Specifying Access Permission for Stored Files 121 3...

Страница 124: ...select more than one user By pressing All Users you can select all the users 8 Press Exit Select the user who you want to assign access permission to and then select the permission Select the access p...

Страница 125: ...an specifying and managing access permissions for each stored file For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logg...

Страница 126: ...4 Press Address Book Management 5 Select the user or group 6 Press Protection 3 Ensuring Information Security 124 3...

Страница 127: ...Program 9 Select the users or groups to register You can select more than one user By pressing All Users you can select all the users 10 Press Exit 11 Select the user who you want to assign access pe...

Страница 128: ...file creator owner or file administrator Specify passwords for stored files This provides increased protection against unauthorized use of files For details about logging on and logging off with admin...

Страница 129: ...tion p 36 Logging off Using Administrator Authentication Unlocking Files If you specify Enhance File Protection the file will be locked and become inaccessible if an invalid password is entered ten ti...

Страница 130: ...entication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the Document Server key 2 Select the file 3 Press File Management 4 Press Unlock Fil...

Страница 131: ...p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Specifying Access Permission for Stored Files 129 3...

Страница 132: ...ns appears In Restrict Adding of User Destinations you can restrict users from registering data in the Address Book If you set Restrict Adding of User Destinations to Off users can directly enter dest...

Страница 133: ...rator Tools 4 Press Extended Security 5 Press On for Restrict Use of Destinations If Restrict Use of Destinations is set to On Restrict Adding of User Destinations does not appear Preventing Data Leak...

Страница 134: ...the User Tools Counter key p 233 Specifying the Extended Security Functions p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication 3 Ensuring Informati...

Страница 135: ...r Netscape Messenger 7 1 and later Lotus Notes R5 and later When the electronic signature is specified the machine administrator s address appears in the From field and the address of the sender appea...

Страница 136: ...r When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Mon...

Страница 137: ...t be installed in advance It is possible to use either a self signed certificate created by the machine or a certificate issued by a certificate authority Electronic Signature 1 Install a device certi...

Страница 138: ...This can be specified by the network administrator Create and install the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Monitor He...

Страница 139: ...ess or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the mac...

Страница 140: ...a certificate authority Enter the details of the device certificate issued by the certificate authority 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When...

Страница 141: ...own box in S MIME under Certification 6 Click OK The certificate to be used for the S MIME electronic signature is set 7 Click OK 8 Click Logout Specifying the Electronic Signature This can be specifi...

Страница 142: ...Select the method for attaching the electronic signature when forwarding received fax messages in When Transferring by Fax under Signature 8 Select the method for attaching the electronic signature wh...

Страница 143: ...d user Access permission can also be specified by a user granted full control or the user administrator You can specify who is allowed to access the data in the Address Book By making this setting you...

Страница 144: ...Press Address Book Management 5 Select the user or group 6 Press Protection 7 Press Program Change Delete for Permissions for Users Groups under Protect Destination 3 Ensuring Information Security 142...

Страница 145: ...ressing All Users you can select all the users 10 Press Exit 11 Select the user who you want to assign access permission to and then select the permission Select the permission from Read only Edit Edi...

Страница 146: ...using the extended security function Encrypt Address Book For details about this and other extended security functions see Specifying the Extended Security Functions For details about logging on and...

Страница 147: ...lphanumeric characters 8 Press Encrypt Decrypt 9 Press Yes Do not switch the main power off during encryption as doing so may corrupt the data Encrypting the data in the Address Book may take a long t...

Страница 148: ...ypted 10 Press Exit 11 Press OK 12 Press the User Tools Counter key If you register additional users after encrypting the data in the Address Book those users are also encrypted p 35 Logging on Using...

Страница 149: ...I F setting information System settings information Enabling the Encryption Settings Use the following procedure to enable the encryption settings at initial set up or after encryption settings have b...

Страница 150: ...User Tools Counter key 2 Press System Settings 3 Press Administrator Tools 4 Press Machine Data Encryption Settings If the setting to be specified does not appear press Next 3 Ensuring Information Sec...

Страница 151: ...carry all of the data over to the hard disk select All Data To carry over only the machine settings data select File System Data Only To reset all of the data select Format All Data 7 Press the Start...

Страница 152: ...er see Turning On the Power About This Machine Printing the Encryption Key Use the following procedure to print the key again if it has been lost or misplaced The encryption key is required for data r...

Страница 153: ...3 Press Administrator Tools 4 Press Machine Data Encryption Settings 5 Press Print Encryption Key The encryption key for retrieving backup data is printed Encrypting Data on the Hard Disk 151 3...

Страница 154: ...e sure to store the encryption key safely for retrieving back up data When the encryption key is updated encryption is performed using the new key After completing the procedure on the machine s contr...

Страница 155: ...y 6 Select the data to be carried over to the hard disk and not be reset To carry all of the data over to the hard disk select All Data To carry over only the machine settings data select File System...

Страница 156: ...ter key 12 Turn off the power and the main power switch and then turn the main power switch back on For details about turning off the power see Turning On the Power About This Machine Canceling Data E...

Страница 157: ...start the machine to enable the new settings Restarting can be slow when there is data to be carried over to the hard disk 1 Press the User Tools Counter key 2 Press System Settings 3 Press Administra...

Страница 158: ...achine settings data select File System Data Only To reset all of the data select Format All Data 7 Press OK 8 Press Exit 9 Press Exit 10 Press the User Tools Counter key 11 Turn off the power and the...

Страница 159: ...vent data leakage by automatically overwriting temporarily saved data Auto Erase Memory or overwriting all the data stored on the hard disk Erase All Memory For details see the manual supplied with th...

Страница 160: ...s in the hard disk as temporary data Auto Erase Memory erases the temporary data on the hard disk by writing over it Overwriting starts automatically once the job is completed The copier fax and print...

Страница 161: ...System Settings 3 Press Administrator Tools 4 Press Auto Erase Memory Setting If the setting to be specified does not appear press Next to scroll down to other settings Deleting Data on the Hard Disk...

Страница 162: ...times that you want to overwrite using the number keys and then press 8 Press OK Auto Erase Memory is set p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authe...

Страница 163: ...t can or cannot be overwritten by Auto Erase Memory Data overwritten by Auto Erase Memory Copier Copy jobs Printer Print Jobs Printer Sample Print Locked Print Stored Print Jobs 1 Printer Spool Printi...

Страница 164: ...Book 6 Image overlay data can be overwritten by Auto Erase Memory only if it is deleted in advance p 141 Protecting the Address Book Erase All Memory This can be specified by the machine administrato...

Страница 165: ...Press System Settings 4 Press Administrator Tools 5 Press Erase All Memory If the setting to be specified does not appear press Next to scroll down to other settings Deleting Data on the Hard Disk 163...

Страница 166: ...ne Before erasing the hard disk you can back up user codes counters for each user code and Address Book data using SmartDeviceMonitor for Admin For details see SmartDeviceMonitor for Admin Help If an...

Страница 167: ...3 Turn off the main power Before turning the power off see Turning On the Power About This Machine To resume overwriting turn on the main power Deleting Data on the Hard Disk 165 3...

Страница 168: ...3 Ensuring Information Security 166 3...

Страница 169: ...user name and password The administrator can also specify Available Settings in Admin Authentication to prevent users from specifying certain settings Administrator type determines which machine setti...

Страница 170: ...nitor Settings p 19 Administrators and Users p 27 Administrator Authentication p 295 User Administrator Settings p 277 Machine Administrator Settings p 288 Network Administrator Settings p 293 File Ad...

Страница 171: ...27 User Settings Web Image Monitor Settings Menu Protect You can set menu protect to Off Level 1 or Level 2 If you set it to Off no menu protect limitation is applied To limit access to the fullest ex...

Страница 172: ...n Facsimile Features set Machine Management to On in Administrator Authentication Management in Administrator Tools in System Settings 1 Press the User Tools Counter key 2 Press Facsimile Features 3 P...

Страница 173: ...er Functions To specify Menu Protect in Printer Features set Machine Management to On in Administrator Authentication Management in Administrator Tools in System Settings 1 Press the User Tools Counte...

Страница 174: ...To specify Menu Protect in Scanner Features set Machine Management to On in Administrator Authentication Management in Administrator Tools in System Settings 1 Press the User Tools Counter key 2 Press...

Страница 175: ...5 Select the menu protect level and then press OK 6 Press the User Tools Counter key Menu Protect 173 4...

Страница 176: ...colour and black white select Full Colour Two Colour Black White To print in both colour and black white select Full Colour Unless you select all items in the Copier or Printer setting the Auto Colour...

Страница 177: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user Limiting Available Functions 175 4...

Страница 178: ...he setting to be specified does not appear press Next to scroll down to other settings 8 Press OK 9 Press Exit 10 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p...

Страница 179: ...ng the Job Log function settings changing the Access Log function settings and changing the Log Encryption settings Service representative procedures include formatting the hard disk and specifying wh...

Страница 180: ...Off only if it is set to On You can check and change the transfer log setting This setting lets you transfer log files to the log server to check the history data and identify unauthorized access For...

Страница 181: ...Tools Counter key 2 Press System Settings 3 Press Administrator Tools 4 Press Transfer Log Setting If the setting to be specified does not appear press Next to scroll down to other settings Managing...

Страница 182: ...5 Press Off 6 Press OK 7 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication 4 Managing Access to the Machine 180 4...

Страница 183: ...nvolving LPR RCP RSH FTP IPP DIPRINT Web Image Monitor SmartDeviceMonitor for Client or DeskTopBinder You cannot limit the monitoring of SmartDeviceMonitor for Client You cannot limit access involving...

Страница 184: ...ntenance by telnet Network Guide To disable SMTP on Web Image Monitor in E mail settings set the protocol to anything other than SMTP For details see Web Image Monitor Help For details about logging o...

Страница 185: ...You can restrict personal information frombeing displayedby making settings on the control panel using Restrict Display of User Information 1 telnet TCP 23 Web Image Monitor Commands using telnet are...

Страница 186: ...OS designated functions on the WINS server cannot be used SNMPv1 v2 UDP 161 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor Functions that require SNMPv1 v2 cannot be used...

Страница 187: ...Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor LPR functions cannot be used You can restrict personal information frombeing displayedby making settings on the control pan...

Страница 188: ...CP 9100 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor DIPRINT functions cannot be used RFU TCP 10021 telnet You can attempt to update firmware via FTP NetWare IPX SPX Co...

Страница 189: ...lnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor WS Device Printer search function cannot be used RHPP TCP 59100 Web Image Monitor telnet Cannot print with RHPP 1 Restrict Display of User Info...

Страница 190: ...2 Press System Settings 3 Press Interface Settings 4 Press Effective Protocol 5 Enhanced Network Security 188 5...

Страница 191: ...address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web...

Страница 192: ...ct confidential information from outside threats Select Level 1 for moderate security to protect important information Use this setting if the machine is connected to the office local area network LAN...

Страница 193: ...on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Making Settings Using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host nam...

Страница 194: ...el 1 Level 2 TCP IP Available Available Available HTTP Port 80 open open open HTTP Port 443 open open open HTTP Port 631 open open closed HTTP Port 7443 7444 open open open IPP Port 80 open open open...

Страница 195: ...e SSL SSL TLS Encryption Mode Ciphertext Priority Ciphertext Priority Ciphertext Only Bonjour Available Available Unavailable SMB Available Available Unavailable WS MFP WS Device Available Available U...

Страница 196: ...use PDF direct print the optional PostScript 3 Unit must be installed Password for IPP Authentication To encrypt the IPP Authentication password on Web Image Monitor set Authentication to DIGEST and t...

Страница 197: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security Encrypting Transmitted Passwords 195 5...

Страница 198: ...t specifying the encryption key on the printer driver see the printer driver Help For details about specifying the encryption key on the TWAIN driver see the TWAIN driver Help p 35 Logging on Using Ad...

Страница 199: ...network administrator must give users the group password for PDF files that are already registered on the machine The users can then register it in DeskTopBinder on their computers For details see Des...

Страница 200: ...92 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login user name and login password 4 Click Configuration an...

Страница 201: ...ecified by the network administrator To protect the communication path and establish encrypted communication create and install the device certificate There are two ways of installing a device certifi...

Страница 202: ...procedure specified by the certificate authority 2 Installing the device certificate Install the device certificate using Web Image Monitor 3 Enabling SSL Enable the SSL TLS setting using Web Image M...

Страница 203: ...thority Create the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Monitor Help This section explains the use of a certificate issue...

Страница 204: ...ng the Device Certificate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image...

Страница 205: ...n the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page...

Страница 206: ...by following the Certificate Import Wizard instructions For details about how to install the certificate and about where to store the certificate when accessing the machine using IPP see Web Image Mo...

Страница 207: ...ng this setting you can change the security level For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Adm...

Страница 208: ...35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication SNMPv3 Encryption This can be specified by the network administrator When using SmartDeviceMonitor...

Страница 209: ...s System Settings 3 Press Interface Settings 4 Press Permit SNMPv3 Communication If the setting to be specified does not appear press Next to scroll down to other settings Protection Using Encryption...

Страница 210: ...mmunication on the machine For details about specifying Encryption Key in SmartDeviceMonitor for Admin see SmartDeviceMonitor for Admin Help If network administrator s Encryption Password setting is n...

Страница 211: ...s Web Image Monitor due to IPsec configuration problems disable IPsec in System Settings on the control panel and then access Web Image Monitor For details about enabling and disabling IPsec using the...

Страница 212: ...ing the IPsec SA the ISAKMPSA Phase 1 settings are auto configured After this the IPsec SA Phase 2 settings which allow actual IPsec transmission are auto configured Also for further security the SA c...

Страница 213: ...Encryption Key Auto Exchange Security Level When you select a security level certain security settings are automatically configured The following table explains security level features Security Level...

Страница 214: ...ble lists the settings that are automatically configured according to the security level Setting Authentication Only Authentication and Low Level Encryption Authentication and High Level Encryption Se...

Страница 215: ...evel you can still make changes to the auto configured settings When you change an auto configured setting the security level switches automatically to User Setting Setting Description Setting Value A...

Страница 216: ...sing IPsec or to allow cleartext transmission when IPsec cannot be established auto setting Use When Possible Always Require Authentication Method Specify the method for authenticating transmission pa...

Страница 217: ...ation Algorithm Specify the authentication algorithm to be used in phase 2 auto setting HMAC MD5 96 HMAC SHA1 96 Phase 2 Encryption Algorithm Permissions Specify the encryption algorithm to be used in...

Страница 218: ...y the address of the IPsec transmission partner You can also specify an address range The IPsec transmission partner s IPv4 or IPv6 address Ifyouarenotsettinganaddress range enter 32 after an IPv4 add...

Страница 219: ...uthentication algorithm HMAC MD5 96 HMAC SHA1 96 Authentication Key Specify the key for the authentication algorithm Specify a value within the ranges shown below according to the encryption algorithm...

Страница 220: ...48 digits AES 128 set 32 digits AES 192 set 48 digits AES 256 set 64 digits ASCII DES set 8 characters 3DES set 24 characters AES 128 set 16 characters AES 192 set 24 characters AES 256 set 32 charact...

Страница 221: ...ed Specifying Encryption Key Auto Exchange Settings This can be specified using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When enteri...

Страница 222: ...be specified by the network administrator Using Web Image Monitor select the certificate to be used for IPsec You must install the certificate before it can be used 1 Open a Web browser 2 Enter http t...

Страница 223: ...t response rule check box and then click Next 8 Select Edit properties and then click Finish 9 In the General tab click Advanced 10 In Authenticate and generate a new key after every enter the same va...

Страница 224: ...30 Click Add select the Custom check box and then click Settings 31 In Integrity algorithm select the authentication algorithm that was specified on the machine in Encryption Key Auto Exchange Setting...

Страница 225: ...h IPsec transmission Encryption Key Manual Settings Configuration Flow This section explains the procedure for specifying encryption key manual settings This can be specified by the network administra...

Страница 226: ...select the settings number and add settings 8 Click OK 9 Select Active for IPsec in IPsec 10 Set Exclude HTTPS Transmission to Active if you do not want to use IPsec for HTTPS communication 11 Click...

Страница 227: ...n key manual settings Specify encryption key manual settings msh ipsec manual_mode on off To enable encryption key manual settings set to on To disable settings set to off ipsec exclude To display or...

Страница 228: ...default ipv4 ipv6 any Specify the address type for the default setting To specify both IPv4 and IPv6 enter any Security protocol setting msh ipsec manual 1 2 3 4 default proto ah esp dual Enter the se...

Страница 229: ...ncryption algorithm and encryption key setting msh ipsec manual 1 2 3 4 default encrypt null des 3des aes128 aes192 aes256 encryption key Enter the separate setting number 1 4 or default specify the e...

Страница 230: ...ault ipv4 ipv6 any Specify the address type for the default setting To specify both ipv4 and ipv6 enter any Security policy setting msh ipsec ike 1 2 3 4 default proc apply bypass discard Enter the se...

Страница 231: ...nning or ending address displays the current setting IKE partner authentication method setting msh ipsec ike 1 2 3 4 default auth psk rsasig Enter the separate setting number 1 4 or default and specif...

Страница 232: ...ndspecifytheISAKMPSA phase1 validity period Enter the validity period in seconds from 300 to 172800 Not specifying a validity period displays the current setting IPsec SA phase 2 authentication algori...

Страница 233: ...setting msh ipsec ike 1 2 3 4 default ph2 lifetime validity period Enter the separate setting number 1 4 or default and specify the IPsec SA phase 2 validity period Enter the validity period in secon...

Страница 234: ...isplay and setting methods are explained below View Settings msh authfree If print job authentication exclusion is not specified authentication exclusion control is not displayed IPv4 address settings...

Страница 235: ...d how to specify them For details about when to use each function see the corresponding chapters Changing the Extended Security Functions To change the extended security functions display the extended...

Страница 236: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security 6 Specifying the Extended Security Functions 234 6...

Страница 237: ...the user administrator Encrypt the data in the machine s Address Book For details on protecting data in the Address Book see Protecting the Address Book On Off Restrict Use of Destinations This can b...

Страница 238: ...t be viewed unauthorized users are prevented from obtaining information about the registered files On Off Enhance File Protection This can be specified by the file administrator By specifying a passwo...

Страница 239: ...unction files stored in the machine can be transferred or delivered If you select Prohibit for this setting stored files cannot be transferred by Forwarding and Transfer Request Use this setting to pr...

Страница 240: ...etting and Minimum Character No If you select Level 1 specify the password using a combination of two types of characters selected from upper case letters lower case letters decimal numbers and symbol...

Страница 241: ...ermissible or not by checking the firmware version displayed on the control panel screen If the firmware structure change is not permissible contact your service representative before logging in When...

Страница 242: ...out Stored RX File User Setting see Facsimile Features General Settings Guide Printing the Journal When making authentication settings for users to prevent personal information in transmission history...

Страница 243: ...Code settings must be enabled and you must enter a code before you can turn the power back on Specifying the Weekly Timer Code This can be specified by the machine administrator 1 Press the User Tool...

Страница 244: ...y Timer Code 5 Press On Canceling Weekly Timer Code This can be specified by the machine administrator 1 Press the User Tools Counter key 2 Press System Settings 6 Specifying the Extended Security Fun...

Страница 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...

Страница 246: ...the machine administrator Service mode is used by a service representative for inspection or repair If you set the service mode lock to On service mode cannot be used unless the machine administrator...

Страница 247: ...ress On and then press OK A confirmation message appears 6 Press Yes 7 Press the User Tools Counter key p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authenti...

Страница 248: ...e mode lock For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the...

Страница 249: ...s Counter key The service representative can switch to service mode p 35 Logging on Using Administrator Authentication p 36 Logging off Using Administrator Authentication Limiting Machine Operation to...

Страница 250: ...6 Specifying the Extended Security Functions 248 6...

Страница 251: ...e appears deal with the problem according to the information contained in the message Messages Cause Solutions You do not have the privileges to use this function The authority to use the function is...

Страница 252: ...ntication has failed The entered login user name or login password is incorrect Ask the user administrator for the correctloginusernameandlogin password See the error codes below for possible solution...

Страница 253: ...owing tables list the error codes likely causes of the problems they indicate and what you can do to resolve those problems If the error code that appears is not on this table take a note and contact...

Страница 254: ...n on the System Settings screen where only the administrator has authentication ability Only the administrator has login privileges on this screen Log in as a general user from the application s login...

Страница 255: ...ame was not specified but a DeskTopBinder operation was performed Set the DeskTopBinder login user name correctly W0206 002 The user attempted authentication from an application on the System Settings...

Страница 256: ...functioning properly 2 Make sure that the security module is installed W0406 104 1 Cannot connect to the authentication server 1 Make sure that connection to the authentication server is possible Use...

Страница 257: ...cted because NTLMv2 is not supported 2 Make sure that the ports for the domain control firewall and the firewall on the machine to the domain control connection path are open If you are using a Window...

Страница 258: ...ill fail if the realm name is specified in lower case letters Make sure the realm name is specified in capital letters 4 Kerberos authentication will fail if automatic retrieval for KDC fails Ask your...

Страница 259: ...he machine If there is more than one DC make sure that a confidential relationship has been configured between each DC W0400 106 The domain name cannot be resolved Make sure that DNS WINS is specified...

Страница 260: ...tication settings 1 Delete the old duplicated name or change the login name 2 If the authentication server has just been changed delete the old name on the server W0607 001 An authentication error occ...

Страница 261: ...me was not specified but a DeskTopBinder operation was performed Set the DeskTopBinder login user name correctly L0206 002 A user attempted authentication from an application on the System Settings sc...

Страница 262: ...ccurring Notify the administrator of the screen message by e mail and check the system log for signs of an authentication attack L0406 201 Authenticationisdisabledinthe LDAP server settings Change the...

Страница 263: ...space colon or quotation mark If the login user name exceeds 128 bytes L0406 202 L0406 203 3 There is an error in the simple encryption method 1 Authentication will fail if the password is left blank...

Страница 264: ...n capital letters L0400 210 Failed to obtain user information in LDAP search The login attribute s search criteria might not be specified or the specified search information is unobtainable Make sure...

Страница 265: ...Do not use other admin supervisor or HIDE in general user accounts L0612 005 Authentication failed because no more users can be registered The number of users registered in the Address Book has reach...

Страница 266: ...ivileges on this screen Log in as a general user from the application s login screen I0206 003 An authentication error occurred because the user name contains a space colon or quotation mark Recreate...

Страница 267: ...ator If the situation does not return to normal contact your service representative I0511 000 The authentication server login name is the same as a user name already registered on the machine Names ar...

Страница 268: ...ication has been rejected Confirm the user name and login name with the administrator of the network in use if using Windows Authentication LDAP Authentication or Integration Server Authentication Con...

Страница 269: ...estrict Use of Simple Encryption to On Alternatively enable SSL TLS install the server certificate in the machine and then install the certificate in the computer See Setting the SSL TLS Encryption Mo...

Страница 270: ...been disabled while All Users is not specified Re enable user authentication and then enable All Users for the destinations that did not appear For details about enabling All Users see Protecting the...

Страница 271: ...p 194 Driver Encryption Key p 204 Setting the SSL TLS Encryption Mode p 116 Specifying Access Permission for Stored Files p 141 Protecting the Address Book Authentication Does Not Work Properly 269 7...

Страница 272: ...7 Troubleshooting 270 7...

Страница 273: ...specify up to 32 alphanumeric characters and symbols Keep in mind that user names and passwords are case sensitive Be sure not to forget the supervisor login user name and login password If you do fo...

Страница 274: ...2 Press the Login Logout key BBD002S 3 Press Login 4 Enter a login user name and then press OK When you assign the administrator for the first time enter supervisor 8 Appendix 272 8...

Страница 275: ...tion has been specified be sure to log off after completing settings This section describes how to log off after completing settings 1 Press the Login Logout key BBD002S 2 Press Yes Changing the Super...

Страница 276: ...2 Press System Settings 3 Press Administrator Tools 4 Press Program Change Administrator 5 Under Supervisor press Change 8 Appendix 274 8...

Страница 277: ...twice 12 Press the User Tools Counter key Resetting an Administrator s Password This section describes how to reset the administrators passwords For details about logging on and logging off as the sup...

Страница 278: ...wish to reset 8 Press Change for the login password 9 Enter the login password and then press OK 10 If a password reentry screen appears enter the login password and then press OK 11 Press OK twice 12...

Страница 279: ...ngs can be specified Interface Settings The following settings can be specified Network DNS Configuration You can perform a connection test Parallel Interface Parallel Timing Parallel Communication Sp...

Страница 280: ...sword NCP User Name NCP Password Program Change Delete E mail Message Fax E mail Account Administrator Tools Display Print Counter Print Counter List Display Clear Print Counter per User Display Count...

Страница 281: ...Structure Program Change Delete LDAP Server Name Server Name Search Base Port Number Use Secure Connection SSL Authentication User Name Password Connection Test Search Conditions Search Options LDAP S...

Страница 282: ...The following settings can be specified General Features All the settings can be specified Reproduction Ratio All the settings can be specified Edit All the settings can be specified Stamp All the se...

Страница 283: ...ing Reception File Setting SMTP RX File Delivery Settings 2 Sided Print Checkered Mark Centre Mark Print Reception Time Reception File Print Quantity Paper Tray Specify Tray for Lines Folder Transfer...

Страница 284: ...Colour Graphic Mode System Print Error Report Auto Continue Memory Overflow Job Separation Rotate by 180 Degrees Initial Print Job List Memory Usage Duplex Copies Blank Page Print Spool Image Reserved...

Страница 285: ...eneral Settings All the settings can be specified Scan Settings All the settings can be specified Send Settings Compression Black White Compression Gray Scale Full Colour High Compression PDF Level In...

Страница 286: ...Slip Sheet Tray Designation Sheet 1 Tray Designation Sheet 2 Tray Separation Sheet Tray Paper All the settings can be specified Date Time All the settings can be specified Timer All the settings can b...

Страница 287: ...e settings can be specified Firmware Update All the settings can be specified Program Change Realm All the settings can be specified Printer System All the settings can be specified Host Interface All...

Страница 288: ...gs All the settings can be specified Scanner General Settings All the settings can be specified Scan Settings All the settings can be specified Send Settings All the settings can be specified Initial...

Страница 289: ...via SmartDeviceMonitor for Admin The following settings can be specified Device Information Reset Device Reset Current Job Reset All Jobs User Management Tool The following settings can be specified U...

Страница 290: ...specified File Transfer SMTP Server Server Name Port No E mail Communication Port E mail Reception Interval Max Reception E mail Size E mail Storage in Server Auto Specify Sender Name Scanner Resend...

Страница 291: ...IP Settings Program Change Delete Gateway Scanner Features The following settings can be specified Send Settings Max E mail Size Divide Send E mail Settings via Web Image Monitor The following setting...

Страница 292: ...Password Change Encryption Password Fax Send Reception Settings Maximum E mail Size Divide Send E mail IP Fax Settings All the settings can be specified IP Fax Gateway Settings All the settings can b...

Страница 293: ...he settings can be specified SSDP All the settings can be specified Bonjour All the settings can be specified Security Network Security All the settings can be specified Access Control All the setting...

Страница 294: ...he settings can be specified S MIME All the settings can be specified Webpage Download Help file Settings via SmartDeviceMonitor for Admin The following settings can be specified NIB Setup Tool All th...

Страница 295: ...Program Change Administrator File Administrator Extended Security Enhance File Protection Auto Delete File in Document Server Delete All Files in Document Server Facsimile Features The following sett...

Страница 296: ...ngs Auto E mail Notification Select groups to notify Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator Program Change Administrator Yo...

Страница 297: ...Edit Title Address Book Switch Title Back Up Restore Address Book Display Clear Print Counter per User Clear All Users Clear per User Administrator Authentication Management User Management Program C...

Страница 298: ...rator The user administrator settings that can be specified are as follows Login User Name Login Password Change Encryption Password Webpage Download Help File Settings via SmartDeviceMonitor for Admi...

Страница 299: ...Owner This is a user who can store files in the machine and authorize other users to view edit or delete those files File Administrator This is the file administrator A Granted authority to operate N...

Страница 300: ...Settings Read only Edit Edit Delete Full Control Owner File Admin Unlocking Files A 1 This setting can be specified by the owner 8 Appendix 298 8...

Страница 301: ...on registered in the Address Book and has a login password and user name Full Control This is a user granted full control Abbreviations in the table columns A You can view and change the setting B You...

Страница 302: ...ser Edit Delete User Full Control Registere d User User Admin Use Name as B B B B A A Protection Code C C C C A 1 A 1 Protection Object B B B B A A Protect Dest Permissions for Users Groups C C C A A...

Страница 303: ...l Control Register ed User User Admin E mail Address B A A A A A Tab Name Folder Destination Settings Read only User Edit User Edit Delete User Full Control Register ed User User Admin SMB FTP NCP B A...

Страница 304: ...tion displays the user settings that can be specified on the machine when user authentication is specified Settings that can be specified by the user vary according to the menu protect level and avail...

Страница 305: ...y be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 General Features Settings Off Level 1 Level 2 Auto Image Density Priority R W R R Original Photo Type P...

Страница 306: ...ack Margin Left Right R W R R Front Margin Top Bottom R W R R Back Margin Top Bottom R W R R 1 Sided 2 Sided Auto Margin T to T R W R R 1 Sided 2 Sided Auto Margin T to B R W R R Creep Setting for Mag...

Страница 307: ...s Off Level 1 Level 2 Stamp Language R W R W R Stamp Priority R W R W R Stamp Colour COPY R W R R Stamp Colour URGENT R W R R Stamp Colour PRIORITY R W R R Stamp Colour For Your Info R W R R Stamp Col...

Страница 308: ...be adjusted but not specified User Stamp Settings Off Level 1 Level 2 Program Delete Stamp R W R W R Stamp Format 1 R W R W R Stamp Format 2 R W R W R Stamp Format 3 R W R W R Stamp Format 4 R W R W R...

Страница 309: ...tamp on Designating Slip Sheet R W R W R Stamp Position P1 P2 1 R W R W R Stamp Position 1 5 2 5 1 R W R W R Stamp Position 1 2 1 R W R W R Stamp Position P 1 P 2 1 R W R W R Stamp Position 1 2 1 R W...

Страница 310: ...Copy Eject Face Method in Bypass Mode R W R R Memory Full Auto Scan Restart R W R R Insert Separation Sheet R W R R Letterhead Setting R W R W R Staple Position R W R W R Punch Type R W R W R Simplifi...

Страница 311: ...mns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available Settings that are not in the l...

Страница 312: ...the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 List Test Print Settings Off Level 1...

Страница 313: ...d Print Jobs R W R R Initial Print Job List R W R R Memory Usage R W R R Duplex R W R R Copies R W R R Blank Page Print R W R R Spool Image R W R R Reserved Job Waiting Time R W R R Printer Language R...

Страница 314: ...urce R W R R Font Number R W R R Point Size R W R R Font Pitch R W R R Symbol Set R W R R Courier Font R W R R Extend A4 Width R W R R Append CR to LF R W R R Resolution R W R R PS Menu 1 Settings Off...

Страница 315: ...ngs Off Level 1 Level 2 Change PDF Password R W R R PDF Group Password R W R R Resolution R W R R Colour Setting R W R R Colour Profile R W R R 1 The PostScript 3 Unit option must be installed Printer...

Страница 316: ...can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 General Settings Settings Off Level 1 Level 2 Switch Title R W R R Update Delivery Server Desti...

Страница 317: ...l 2 Compression Black White R W R W R Compression Gray Scale Full Colour R W R W R High Compression PDF Level R W R W R Max E mail Size R R R Divide Send E mail R R R Insert Additional E mail Info R W...

Страница 318: ...er reading nor modifying the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Off General Settings...

Страница 319: ...ram Special Sender Print List R W N A N A Forwarding R W R R Reception File Setting R W R R Stored Reception File User Setting R W R R SMTP RX File Delivery Setting R W R R 2 Sided Print R W R W R Che...

Страница 320: ...Code R W R N A Program Memory Lock ID R W R N A Internet Fax Settings R W R R Select Dial Push Phone R W R R Program Fax Information R W R R Enable H 323 Settings R W R R Enable SIP R W R R H 323 Set...

Страница 321: ...ns in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available General Fe...

Страница 322: ...Paper Size Tray 1 3 R W R N A Paper Type Bypass Tray R W R N A Paper Type Tray 1 3 R W R N A Paper Type LCT R W R N A Front Cover Sheet Tray R W R N A Back Cover Sheet Tray R W R N A Slip Sheet Tray...

Страница 323: ...eekly Timer Code Monday R W R N A Weekly Timer Code Tuesday R W R N A Weekly Timer Code Wednesday R W R N A Weekly Timer Code Thursday R W R N A Weekly Timer Code Friday R W R N A Weekly Timer Code Sa...

Страница 324: ...otocol R W R N A NW Frame Type R W R N A SMB Computer Name R W N A N A SMB Work Group R W N A N A Ethernet Speed R W R N A LAN Type R W R N A Ping Command R W R N A Permit SNMPv3 Communication R W R N...

Страница 325: ...ng R W R N A Ad hoc Channel R W R N A Security Method R W R N A Restore Factory Defaults R W N A N A 3 The Wireless LAN interface unit option must be installed WEP Encryption Settings Settings A B C W...

Страница 326: ...hange Delete E mail Message R W R W N A Auto Specify Sender name R W R N A Fax E mail Account R W R N A Scanner Resend Interval Time R W R N A Number of Scanner Resends R W R N A 5 Only the Main Deliv...

Страница 327: ...A Auto Delete File in Document Server R W R N A Delete All Files in Document Server R W N A N A Capture Priority 7 R R N A Capture Delete All Unsent Files 7 R R N A Program Change Delete LDAP Server...

Страница 328: ...ly the password can be specified 7 The File Format Converter option must be installed 8 The DataOverwriteSecurity Unit option must be installed 9 The Copy Data Security Unit option must be installed 1...

Страница 329: ...iondisplaystheusersettingsthatcanbespecifiedonWebImageMonitorwhenuserauthentication isspecified Settingsthatcanbespecifiedbytheuservaryaccordingtothemenuprotectlevelandavailable settings specification...

Страница 330: ...ite Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available System Settings A B C General Settings Device Nam...

Страница 331: ...A Slip Sheet Tray Display Time R W R N A Designation Sheet 1 Tray Tray to set R W R N A Designation Sheet 1 Tray Apply Duplex R W R N A Designation Sheet 1 Tray Display Time R W R N A Designation She...

Страница 332: ...er Select R W R N A Tray3 Apply Duplex R W R N A Tray4 Paper Size R W R N A Tray4 Custom Paper Size R W R N A Tray4 Paper Type R W R N A Tray4 Paper Thickness R W R N A Tray4 Apply Auto Paper Select R...

Страница 333: ...rgy Saver Timer R W R N A Panel Off Timer R W R N A System Auto Reset Timer R W R N A Copier Document Server Auto Reset Timer R W R N A Facsimile Auto Reset Timer R W R N A Scanner Auto Reset Timer R...

Страница 334: ...R W R N A Transfer Logs R R N A Encrypt Logs R R N A Delete All Logs R R N A E mail Settings A B C Administrator E mail Address R W R N A Reception Protocol R W R N A E mail Reception Interval R W R...

Страница 335: ...tion Port No R W R N A IMAP4 Reception Port No R W R N A Fax E mail Address R W R N A Receive Fax E mail R W N A N A Fax E mail User Name R W N A N A Fax E mail Password R W N A N A E mail Notificatio...

Страница 336: ...rror R R N A Duplex Unit Error R R N A Replacement Required PCU R R N A Add Staples R R N A Service Call Successful R R N A Hole Punch Receptacle is Full R R N A File Storage Memory Full Soon R R N A...

Страница 337: ...R N A File Transfer Settings A B C SMB User Name R W N A N A SMB Password R W N A N A FTP User Name R W N A N A FTP Password R W N A N A NCP User Name R W N A N A NCP Password R W N A N A User Authent...

Страница 338: ...W R N A LDAP Authentication Login Name Attribute R W R N A LDAP Authentication Unique Attribute R W R N A LDAP Authentication Available Function R W R N A Integration Server Authentication Printer Jo...

Страница 339: ...thentication R R N A Available Settings for Machine Administrator R R N A Network Administrator Authentication R R N A Available Settings for Network Administrator R R N A File Administrator Authentic...

Страница 340: ...r modifying the setting is available The default for Menu Protect is Level 2 Printer Basic Settings System Settings Off Level 1 Level 2 Print Error Report R W R N A Auto Continue R W R N A Memory Over...

Страница 341: ...guage R W R N A Tray Switching R W R N A List Test Print Lock R R N A Virtual Printer R W R N A Host Interface Settings Off Level 1 Level 2 I O Buffer R R R I O Timeout R R R PCL Menu Settings Off Lev...

Страница 342: ...it option must be installed PDF Menu 1 Settings Off Level 1 Level 2 Resolution R R R Color Setting R R R Color Profile R R R 1 The PostScript 3 Unit option must be installed Virtual Printer Settings S...

Страница 343: ...New PDF Group Password R W N A N A Confirm PDF Group Password R W N A N A 1 The PostScript 3 Unit option must be installed PDF Fixed Password 1 Settings Off Level 1 Level 2 Current PDF Fixed Password...

Страница 344: ...e default for Menu Protect is Level 2 General Settings Settings Off Level 1 Level 2 Switch Title R W N A N A Search Destination R W N A N A TWAIN Standby Time R W N A N A Destination List Display Prio...

Страница 345: ...Compression PDF Level R W N A N A Max E mail Size R W N A N A Divide Send E mail R W N A N A Insert Additional E mail Info R W N A N A No of Digits for Single Page Files R W N A N A Stored File E mail...

Страница 346: ...lt for Menu Protect is Off Initial Settings Settings Off Level 1 Level 2 Closed Network Code R W N A N A Internet Fax R W N A N A Program Memory Lock ID R W N A N A Fax Information Fax Header R W N A...

Страница 347: ...N A Own Fax No R W N A N A Enable SIP R W N A N A Enable Server R W N A N A User Name R W N A N A Server IP Address Proxy Server Addr Main R W N A N A Server IP Address Proxy Server Addr Sub R W N A...

Страница 348: ...N A N A Communication Result Report R W N A N A Memory Storage Report R W N A N A SEP Code RX Result Report R W N A N A SEP Code RX Reserve Report R W N A N A Confidential File Report R W N A N A LAN...

Страница 349: ...n specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor mo...

Страница 350: ...ethod R W R N A WEP Authentication R W R N A WEP Key Number R W R N A WEP Key R W R N A WPA Encryption Method R W R N A WPA Authentication Method R W R N A WPA PSK WPA2 PSK R W R N A WPA WPA2 Settings...

Страница 351: ...vailable functions have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applic...

Страница 352: ...R N A RHPP R W R N A IPv6 Settings A B C IPv6 Address R W R N A Host Name R W R N A Domain Name R W R N A Link local Address R W R N A Stateless Address R W R N A Manual Configuration Address R W R N...

Страница 353: ...C NetWare R W R N A Print Server Name R W R N A Logon Mode R W R N A File Server Name R W R N A NDS Tree R W N A N A NDS Context Name R W R N A Operation Mode R W R N A Remote Printer No R W N A N A...

Страница 354: ...B R W R N A Protocol R R N A Workgroup Name R W R N A Computer Name R W R N A Comment R W R N A Share Name R R N A Notify Print Completion R W R N A Bonjour Settings A B C Bonjour R W R N A Local Host...

Страница 355: ...bpage Settings A B C Language 1 R W R N A Language 2 R W R N A URL 1 R W R N A URL 2 R W R N A Set Help URL Target R W R N A WS Device UPnP Setting R W R N A Download Help Page R W R W N A Network 353...

Страница 356: ...options and additional functions Hard Disk overwrite erase function DataOverwriteSecurity Unit Data security for copying function Copy Data Security Unit PDF direct print function Postscript 3 Unit H...

Страница 357: ...Address Book 235 Encrypting Data on the Hard Disk 147 Encrypting the Data in the Address Book 144 Encryption Key Auto Exchange Manual Settings Shared Settings 211 Encryption Key Auto Exchange Security...

Страница 358: ...Restrict Display of User Information 236 Restrict Use of Destinations 235 Restrict Use of Simple Encryption 237 Restrictions on Destinations 130 S S MIME 133 Scanner 342 Scanner Features 314 Security...

Страница 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...

Страница 360: ...MEMO 358...

Страница 361: ...MEMO 359...

Страница 362: ...MEMO 360 EN USA D015 7902...

Страница 363: ...orporation in the United States other countries or both Other product names used herein are for identification purposes only and might be trademarks of their respective companies We disclaim any and a...

Страница 364: ...Security Reference Operating Instructions Type for C6055 MP C6000 LD260c Aficio MP C6000 D015 7902 EN USA Type for C7570 MP C7500 LD275c Aficio MP C7500...

Отзывы: