
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................9
Symbols...........................................................................................................................................................9
IP Address.......................................................................................................................................................9
1. Getting Started
Enhanced Security............................................................................................................................................11
Glossary.......................................................................................................................................................11
Setting Up the Machine...............................................................................................................................12
Security Measures Provided by this Machine................................................................................................15
Using Authentication and Managing Users...............................................................................................15
Ensuring Information Security.....................................................................................................................15
Limiting and Controlling Access..................................................................................................................17
Enhanced Network Security.......................................................................................................................18
2. Authentication and its Application
Administrators and Users.................................................................................................................................19
Administrators...............................................................................................................................................19
User...............................................................................................................................................................20
The Management Function..............................................................................................................................22
About Administrator Authentication............................................................................................................22
About User Authentication..........................................................................................................................23
Enabling Authentication...................................................................................................................................25
Authentication Setting Procedure...............................................................................................................25
Administrator Authentication...........................................................................................................................27
Specifying Administrator Privileges............................................................................................................27
Registering the Administrator......................................................................................................................30
Logging on Using Administrator Authentication........................................................................................35
Logging off Using Administrator Authentication........................................................................................36
Changing the Administrator........................................................................................................................37
Using Web Image Monitor.........................................................................................................................38
User Authentication..........................................................................................................................................40
User Code Authentication...............................................................................................................................41
Specifying User Code Authentication........................................................................................................41
Basic Authentication.........................................................................................................................................46
3
Содержание C6055
Страница 12: ...10...
Страница 47: ...5 Press OK 6 Press Exit 7 Press the User Tools Counter key User Code Authentication 45 2...
Страница 53: ...4 Press Address Book Management 5 Select the user or group 6 Press Auth Info Basic Authentication 51 2...
Страница 57: ...p 50 Specifying Login User Name and Login Password Basic Authentication 55 2...
Страница 126: ...4 Press Address Book Management 5 Select the user or group 6 Press Protection 3 Ensuring Information Security 124 3...
Страница 168: ...3 Ensuring Information Security 166 3...
Страница 175: ...5 Select the menu protect level and then press OK 6 Press the User Tools Counter key Menu Protect 173 4...
Страница 177: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user Limiting Available Functions 175 4...
Страница 190: ...2 Press System Settings 3 Press Interface Settings 4 Press Effective Protocol 5 Enhanced Network Security 188 5...
Страница 197: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security Encrypting Transmitted Passwords 195 5...
Страница 245: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 243 6...
Страница 250: ...6 Specifying the Extended Security Functions 248 6...
Страница 272: ...7 Troubleshooting 270 7...
Страница 359: ...Windows Authentication Operational Requirements for NTLM authentication 56 357...
Страница 360: ...MEMO 358...
Страница 361: ...MEMO 359...
Страница 362: ...MEMO 360 EN USA D015 7902...