background image

Administrator Tools

Settings

A

B

C

Address Book Management

R/W

R/W

N/A

Prgrm. /Change/Delete Group

R/W

R/W

N/A

Address Book:Print List

R/W

R/W

N/A

Display / Print Counter

R/W

R/W

N/A

Disp./Print User Counter

R/W

N/A

N/A

User Auth. Management

R/W

R

N/A

Admin.Auth.Management

R/W

N/A

N/A

Key Counter Management

R/W

R

N/A

Extended Security

R/W

R

N/A

Prog/Chnge/Del LDAP Server *6

R/W

R

N/A

LDAP Search

R/W

R

N/A

Prog./Change/Delete Realm

R/W

R

N/A

AOF(Always On)

R/W

R

N/A

Energy Saver Level

R/W

R

N/A

Service Mode Lock

R/W

R

N/A

Delete All Logs

R/W

R

N/A

Transfer log Setting

R/W

N/A

N/A

*6 Only the password can be specified.

System Settings

225

9

Содержание Aficio MP C2030

Страница 1: ...ccess to the Machine Enhanced Network Security Specifying the Extended Security Functions Troubleshooting Appendix 1 2 3 4 5 6 Read this manual carefully before you use this machine and keep it handy for future reference For safe and correct use be sure to read the Safety Information in About This Machine before using the machine Security Reference Operating Instructions ...

Страница 2: ......

Страница 3: ...ine be sure to read the section of this manual entitled Safety Information This manual introduces the machine s various functions It also explains the control panel preparation procedures for using the machine how to enter text how to install the CD ROMs provided and how to replace paper toner and other consumables Troubleshooting Provides a guide for resolving common usage related problems Copy R...

Страница 4: ... Reference Copy Guide Quick Reference Printer and Scanner Guide Quick Reference Fax Guide Manuals for DeskTopBinder Lite DeskTopBinder Lite Setup Guide DeskTopBinder Introduction Guide Auto Document Link Guide Manuals provided are specific to machine types The following software products are referred to using general names Product name General name DeskTopBinder Lite and DeskTopBinder Professional...

Страница 5: ...tication and Managing Users 18 Ensuring Information Security 18 Limiting and Controlling Access 19 Enhanced Network Security 20 2 Administrators Authentication and Its Application Administrators 21 User Administrator 21 Machine Administrator 22 Network Administrator 22 File Administrator 22 Supervisor 22 About Administrator Authentication 23 Enabling Administrator Authentication 24 Specifying Admi...

Страница 6: ...ation Information to Log on 54 Windows Authentication 58 Specifying Windows Authentication 59 LDAP Authentication 69 Specifying LDAP Authentication 70 Integration Server Authentication 78 Specifying Integration Server Authentication 78 Printer Job Authentication 87 If User Authentication is Specified 89 User Code Authentication Using the Control Panel 89 User Code Authentication Using a Printer Dr...

Страница 7: ...odification of Machine Settings 111 Menu Protect 113 Set up Menu Protect 113 Limiting Available Functions 117 Specifying Which Functions are Available 117 Managing Log Files 120 Using the Control Panel to Specify Log File Settings 120 Using Web SmartDeviceMonitor to Manage Log Files 123 Using Web Image Monitor to Manage Log Files 123 6 Enhanced Network Security Preventing Unauthorized Access 127 A...

Страница 8: ... the Extended Security Functions Specifying the Extended Security Functions 177 Changing the Extended Security Functions 177 Procedure for Changing the Extended Security Functions 177 Settings 178 Other Security Functions 183 Fax Function 183 Limiting Machine Operation to Customers Only 184 Settings 184 Specifying Service Mode Lock Preparation 184 Canceling Service Mode Lock 185 8 Troubleshooting ...

Страница 9: ...ings 210 System Settings 210 Settings via Web Image Monitor 210 User Administrator Settings 211 System Settings 211 Settings via Web Image Monitor 211 Settings via SmartDeviceMonitor for Admin 212 The Privilege for User Account Settings in the Address Book 213 User Settings Control Panel Settings 215 Copier Features 216 Printer Features 217 Facsimile Features 220 System Settings 222 User Settings ...

Страница 10: ...INDEX 245 8 ...

Страница 11: ...ges as a result of handling or operating the machine For good copy quality the supplier recommends that you use genuine toner from the supplier The supplier shall not be responsible for any damage or expense that might result from the use of parts other than genuine parts from the supplier with your office products 9 ...

Страница 12: ... and instructions on resolving user errors This symbol is located at the end of sections It indicates where you can find further relevant information Indicates the names of keys that appear on the machine s display panel Indicates the names of keys on the machine s control panel Display The display panel shows machine status error messages and function menus When you select or specify an item on t...

Страница 13: ...ppears in this manual press the center selection key When the instruction press Auto R E appears in this manual press the right selection key IP Address In this manual IP address covers both IPv4 and IPv6 environments Read the instructions that are relevant to the environment you are using Note Contents of this manual are subject to change without prior notice Colors on color keys or the color cir...

Страница 14: ...hecks passports driver s licenses The preceding list is meant as a guide only and is not inclusive We assume no responsibility for its completeness or accuracy If you have any questions concerning the legality of copying or printing certain items consult with your legal advisor This machine is equipped with a function that prevents making counterfeit bank bills Due to this function the original im...

Страница 15: ...k of security breaches by users 3 Before setting this machine s security features and to ensure appropriate operation by users administrators must read the Security Reference completely and thoroughly paying particular attention to the section entitled Before Using the Security Functions 4 Administrators must inform users regarding proper usage of the security functions 5 Administrators should rou...

Страница 16: ...e OK key 6 Specify IP Address 7 Connect the machine to the network 8 Start Web Image Monitor and then log on to the machine as the administrator 9 Install the device certificate 10 Enable secure sockets layer SSL 11 Enter the administrator s user name and password The administrator s default account user name admin password blank is unencrypted between steps 7 to 10 If acquired during this time th...

Страница 17: ... p 34 Using Web Image Monitor p 142 Protection Using Encryption p 26 Registering the Administrator Setting Up the Machine 15 1 ...

Страница 18: ... Access Limits Using authentication administrators manage the machine and its users To enable authentication information about both administrators and users must be registered in order to authenticate users via their login user names and passwords Four types of administrators manage specific areas of machine usage such as settings and user registration Access limits for each user are specified by ...

Страница 19: ... authenticated by a login user name and login password supplied by the user when specifying the machine s settings or accessing the machine over the network The user s login user name and password as well as such personal information items as facsimile number are stored in the machine s Address Book Personal information can be obtained from the Windows domain controller Windows authentication LDAP...

Страница 20: ...ecify the functions available to registered users By making this setting you can limit the functions available to users For information on how to specify which functions are available see Limiting Available Functions p 37 Authentication Setting Procedure p 46 Basic Authentication p 117 Limiting Available Functions Ensuring Information Security Preventing Unauthorized Copying Unauthorized Copy Prev...

Страница 21: ...ully You can use this information to help prevent data leaks To transfer the log data Web SmartDeviceMonitor is required For details about managing log files see Managing Log Files p 97 Preventing Unauthorized Copying p 101 Printing with Unauthorized Copy Prevention and Data Security for Copying p 99 Data Security for Copying p 103 Preventing Data Leaks Due to Unauthorized Transmission p 105 Prote...

Страница 22: ...ord for administrator authentication and user authentication For details about encrypting transmitted passwords see Encrypting Transmitted Passwords Safer Communication Using SSL SNMPv3 and IPsec Youcanencryptthismachine stransmissionsusingSSL SNMPv3 andIPsec Byencryptingtransmitted data and safeguarding the transmission route you can prevent sent data from being intercepted analyzed and tampered ...

Страница 23: ...functions such as copying and printing To use these functions the administrator must be authenticated as the user For instructions on registering the administrator see Registering the Administrator and for instructions on changing the administrator s password see Supervisor Operations For details on Users see Users If user authentication is not possible because of a problem with the network you ca...

Страница 24: ...t network settings such as the IP address can only be specified by the network administrator By making this setting you can prevent unauthorized users from changing the settings and disabling the machine and thus ensure correct network operation File Administrator This administrator can confirm the printer log information Supervisor The supervisor can delete an administrator s password and specify...

Страница 25: ...chine s default settings It is possible to enable only the machine administrator to set data security for copying log deletion and other defaults 3 Network Administrator This administrator manages the network settings You can set the machine so that network settings such as the IP address can be specified by the network administrator only 4 File Administrator This administrator can confirm the pri...

Страница 26: ...ted to managing themachine ssettingsandcontrollinguseraccess sotheycannotusefunctionssuchascopyingandprinting To use these functions the administrator must register as a user in the Address Book and then be authenticated as the user Specify administrator authentication and then specify user authentication For details about specifying authentication see Authentication Setting Procedure Administrato...

Страница 27: ...d login password If you do forget them a service representative will have to return the machine to its default state This will result in all data in the machine being lost and the service call may not be free of charge 1 Press the User Tools Counter key 2 Press System Settings using or and then press the OK key 3 Select Administrator Tools using or and then press the OK key 4 Press Admin Auth Mana...

Страница 28: ... Authentication p 111 Managing Access to the Machine Registering the Administrator If administrator authentication has been specified we recommend only one person take each administrator role The sharing of administrator tasks eases the burden on individual administrators while also limiting unauthorized operation by a single administrator You can register up to four login user names Administrator...

Страница 29: ...er key 2 Select System Settings using or and then press the OK key 3 Select Administrator Tools using or and then press the OK key 4 Select Program Change Admin using or and then press the OK key 5 Select Permissions using or and then press the OK key 6 Press or to scroll to the administrator whose access privileges you want to specify and then press the OK key Enabling Administrator Authenticatio...

Страница 30: ...xit 9 Select Admin Detailed Settings using or and then press the OK key 10 Select the setting you want to specify using or and then press the OK key 11 Select Login User Name using or and then press the OK key 12 Enter the login user name and then press the OK key 2 Administrators Authentication and Its Application 28 2 ...

Страница 31: ...ow the password policy to make the login password more secure 15 If a password reentry screen appears enter the login password and then press the OK key 16 Select Encryption Password using or and then press the OK key 17 Enter the encryption password and then press the OK key Enabling Administrator Authentication 29 2 ...

Страница 32: ...aditional Chinese Simplified Chinese or Hangul double byte characters when entering the login user name or password If you use multi byte characters when entering the login user name or password you cannot authenticate using Web Image Monitor p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Authentication p 177 Specifying the Extended Security Functions Loggi...

Страница 33: ...s an administrator enter the administrator s login user name and login password If you try to log on from an operating screen Privileges are required Administrator login is limited to setting changes only appears Press the User Tools Counter key to change the default Logging off Using Administrator Authentication If administrator authentication has been specified be sure to log off after completin...

Страница 34: ...istrator authority and user administrator authority to Administrator 1 press Administrator 1 in the lines for the machine administrator and the user administrator For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User Tools Counter key 2 Select System Settings u...

Страница 35: ... press the OK key 6 Select the administrator and then press the OK key 7 Select Administrator 1 Administrator 2 Administrator 3 or Administrator 4 using or and then press the OK key 8 Press Exit 9 Select Admin Detailed Settings using or and then press the OK key Enabling Administrator Authentication 33 2 ...

Страница 36: ...ails about Web Image Monitor see Web Image Monitor Help 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login 4 Enter the login name and p...

Страница 37: ...k to use the machine Users can be managed in the Address Book by the user administrator For details about administrator see Administrators For details about registering users in the Address Book see Administrator Tools General Settings Guide SmartDeviceMonitor for Admin Help or Web Image Monitor Help If user authentication is not possible because of a problem with the network you can use the machi...

Страница 38: ...hine such as copying and printing 2 Group A group performs normal operations on the machine such as copying and printing 3 Unauthorized User 4 Authentication Using a login user name and password user authentication is performed 5 This Machine 6 Access Limit Using authentication unauthorized users are prevented from accessing the machine 7 Authorized users and groups can use only those functions pe...

Страница 39: ...Authentication Authentication that requires external devices Windows Authentication See Windows Authentication LDAP Authentication See LDAP Authentication Integration Server Authentication See Integration Server Authentication To specify Basic Authentication Windows Authentication LDAP Authentication or Integration Server Authentication you must first specify administrator authentication You can s...

Страница 40: ... p 69 LDAP Authentication p 78 Integration Server Authentication 3 Users Authentication and Its Application 38 3 ...

Страница 41: ...method has switched fromUserCodeauthenticationtoBasicauthentication Windowsauthentication LDAPauthentication or Integration Server authentication In this case since the User Code authentication does not have a password the login password is set as blank When authentication switches to an external authentication method Windows authentication LDAP authentication or Integration Server authentication ...

Страница 42: ...ecifying the TWAIN driver user code see the TWAIN driver Help To control the use of DeskTopBinder for the delivery of files stored in the machine select Basic Authentication Windows Authentication LDAP Authentication or Integration Server Authentication Specifying User Code Authentication This can be specified by the machine administrator 1 Press the User Tools Counter key 2 Select System Settings...

Страница 43: ... using or and then press the key The box next to a selected item is checked To deselect the item press User Code Authentication will be applied to the selected functions Unselected functions will not be affected 8 Press the OK key 9 Select Printer Job Authentication using or and then press the OK key 10 Select the Printer Job Authentication level If you select Entire or Simple All proceed to Selec...

Страница 44: ...tication select Simple All or Simple Limitation If you select Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be...

Страница 45: ...or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be used by unauthorized users 1 Select Simple Limitation using or and then press the Range key Specify the range in which Simple Limitation is applied to Printer Job Authentication If you specify IPv4 addre...

Страница 46: ...s larger than that for Start IPv4 Address 5 Select Parallel Interface Sim using or and then press the OK key 6 Select Apply using or and then press the OK key 7 Select USB Sim using or and then press the OK key 8 Select Apply using or and then press the OK key 3 Users Authentication and Its Application 44 3 ...

Страница 47: ...9 Press Exit 10 Press the OK key 11 Press the User Tools Counter key User Code Authentication 45 3 ...

Страница 48: ...ing to configure the machine make sure that administrator authentication is properly configured under Administrator Authentication Management This can be specified by the machine administrator For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User Tools Counter ...

Страница 49: ...t using or and then press the key The box next to a selected item is checked To deselect the item press Basic Authentication will be applied to the selected functions Users can use the selected functions only 8 Press the OK key 9 Select Printer Job Authentication using or and then press the key 10 Select the Printer Job Authentication level If you select Entire or Simple All proceed to Selecting E...

Страница 50: ...ronment that does not support authentication select Simple All or Simple Limitation If you select Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require a...

Страница 51: ...r or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be used by unauthorized users 1 Select Simple Limitation using or and then press the Range key Specify the range in which Simple Limitation is applied to Printer Job Authentication If you specify IPv4 add...

Страница 52: ...rger than that for Start IPv4 Address Select 5 Select Parallel Interface Sim using or and then press the OK key 6 Select Apply using or and then press the OK key 7 Select USB Sim using or and then press the OK key 8 Select Apply using or and then press the OK key 3 Users Authentication and Its Application 50 3 ...

Страница 53: ... setting in the Address Book for each user Users must have a registered account in the Address Book in order to use the machine when User Authentication is specified For details about user registration see Registering Names General Settings Guide User authentication can also be specified via SmartDeviceMonitor for Admin or Web Image Monitor p 30 Logging on Using Administrator Authentication p 31 L...

Страница 54: ...and then press the OK key 5 Select Program Change using or and then press the OK key 6 Enter the registration number you want to program using the number keys or the Quick Dial keys and then press the OK key By pressing Search you can search by Name Display Destination List Registration No User Code and Fax Destination 3 Users Authentication and Its Application 52 3 ...

Страница 55: ...Auth Info using or and then press the OK key 10 Select Login Authent Info using or and then press the OK key 11 Select Login User Name using or and then press the OK key 12 Enter the login name and then Press the OK key Basic Authentication 53 3 ...

Страница 56: ...e OK key 16 Press the Escape key two times 17 Press End 18 Press the OK key 19 Press the User Tools Counter key Specifying Authentication Information to Log on The login user name and password specified in Address Book Management can be used as the login information for Folder Authentication and LDAP Authentication 3 Users Authentication and Its Application 54 3 ...

Страница 57: ...hen using Use Auth Info at Login for Folder Authentication or LDAP Authentication a user name other than other admin supervisor or HIDE must be specified The symbol represents any character 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Administrator Tools using or and then press the OK key 4 Select Address Book Management using or and then ...

Страница 58: ... key By pressing Search you can search by Name Display Destination List Registration No User Code and Fax Destination 7 Press the OK key 8 Press Details 9 Select Auth Info using or and then press the OK key 10 Select LDAP Authentication using or and then press the OK key 3 Users Authentication and Its Application 56 3 ...

Страница 59: ...o at Login in LDAP Authentication 12 Press the Escape key 13 Press End 14 Press the OK key 15 Press the User Tools Counter key When using Use Auth Info at Login for Folder Authentication or LDAP Authentication a user name other than other admin supervisor or HIDE must be specified The symbol represents any character p 51 Specifying Login User Name and Login Password Basic Authentication 57 3 ...

Страница 60: ...ystems listed below To obtain user information when running Active Directory use LDAP If SSL is being used a version of Windows that supports TLS v1 SSL v2 or SSL v3 is required Windows NT 4 0 Server Windows 2000 Server Windows Server 2003 Windows Server 2003 R2 Windows Server 2008 Operational Requirements for Kerberos authentication To specify Kerberos authentication the following requirements mu...

Страница 61: ...ur group and to you as an individual user Users who are registered in multiple groups can use all the functions available to those groups A user registered in two or more global groups can use all the functions available to members of those groups If the Guest account on the Windows server is enabled even users not registered in the domain controller can be authenticated When this account is enabl...

Страница 62: ...e OK key 7 Enter the name of the domain controller to be authenticated and then press the OK key If global groups have not been registered proceed to step 15 If global groups have been registered proceed to step 8 If global groups have been registered under Windows server you can limit the use of functions for each global group You need to create global groups in the Windows server in advance and ...

Страница 63: ...lable functions specified in Default Group If global groups are specified users not registered in global groups can use the available functions specified in Default Group By default all functions are available to Default Group members Specify the limitation on available functions according to user needs 8 Select Prgrm Change Delete Group using or and then press the OK key 9 Select Program Change u...

Страница 64: ...hentication will be applied to the selected functions Users can use the selected functions only 13 Press the OK key 14 Press the Escape key twice 15 Select SSL using or and then press the OK key 16 Select On using or and then press the OK key If you do not use secure sockets layer SSL for authentication press Off 17 Press Exit 3 Users Authentication and Its Application 62 3 ...

Страница 65: ...p 63 Selecting Entire or Simple All p 64 Selecting Simple Limitation p 87 Printer Job Authentication Selecting Entire or Simple All If you select Entire you cannot print using a printer driver or a device that does not support authentication To print in an environment that does not support authentication select Simple All or Simple Limitation If you select Simple All you can print even with unauth...

Страница 66: ...n you do not have to create a server certificate unless you want to automatically register user information such as fax numbers using SSL p 117 Limiting Available Functions Selecting Simple Limitation If you select Simple Limitation you can specify clients for which printer job authentication is not required Specify Parallel Interface Sim USB Sim and the clients IPv4 address range in which printer...

Страница 67: ...ify the range in which Simple Limitation is applied to Printer Job Authentication If you specify IPv4 address range proceed to step 2 If you specify Parallel Interface Sim proceed to step 5 If you specify USB Sim proceed to step 7 2 Select IPv4 Address 1 IPv4 Address 2 IPv4 Address 3 IPv4 Address 4 or IPv4 Address 5 using or and then press the OK key 3 Enter the Start IPv4 Address and then press t...

Страница 68: ...6 Select Apply using or and then press the OK key 7 Select USB Sim using or and then press the OK key 8 Select Apply using or and then press the OK key 9 Press Exit 10 Press the OK key 11 Press the User Tools Counter key 3 Users Authentication and Its Application 66 3 ...

Страница 69: ...ols and then click Next 3 On the Start menu select Run 4 Enter mmc and then click OK 5 On the Console select Add Remove Snap in 6 Click Add 7 Select Active Directory Schema and then click Add 8 Select Facsimile Telephone Number 9 Right click and then click Properties 10 Select Replicate this attribute and then click Apply Installing the Device Certificate Certificate Issued by a Certificate Author...

Страница 70: ...ck the radio button next to the number of the certificate you want to install 6 Click Install 7 Enter the contents of the device certificate 8 In the Certificate Request box enter the contents of the device certificate received from the certificate authority 9 Click OK Installed appears under Certificate Status to show that a device certificate for the machine has been installed 10 Click Logout 3 ...

Страница 71: ...ed in the LDAP server is automatically registered in the machine If user information on the server is changed information registered in the machine may be overwritten when authentication is performed Under LDAP authentication you cannot specify access limits for groups registered in the LDAP server Enter the user s login user name using up to 32 characters and login password using up to 128 charac...

Страница 72: ...e machine and can use the functions available under Available Functions during LDAP Authentication To limit the available functions for each user register each user and corresponding Available Functions setting in the Address Book or specify Available Functions for each registered user The Available Functions setting becomes effective when the user accesses the machine subsequently To enable Kerbe...

Страница 73: ... and then press the OK key 4 Select User Auth Management using or and then press the OK key 5 Select LDAP Auth using or and then press Details If you do not want to use user authentication management select Off 6 Select LDAP Server Authent using or and then press the OK key LDAP Authentication 71 3 ...

Страница 74: ...hen retrieve the user information from the LDAP server so it is transferred to the machine s address book The method for selecting the user name depends on the server environment Check the server environment and enter the user name accordingly 10 Select Unique Attribute using or and then press the OK key 11 Enter the unique attribute and then press the OK key Specify Unique Attribute on the machin...

Страница 75: ...ich of the machine s functions you want to permit using or and then press the key The box next to a selected item is checked To deselect the item press LDAP Authentication will be applied to the selected functions Users can use the selected functions only 14 Press the OK key 15 Select Printer Job Authentication using or and then press the key 16 Select the Printer Job Authentication level If you s...

Страница 76: ...ication select Simple All or Simple Limitation If you select Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be ...

Страница 77: ...ith a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be used by unauthorized users 1 Select Simple Limitation using or and then press the Range key Specify the range in which Simple Limitation is applied to Printer Job Authentication If y...

Страница 78: ...r than that for Start IPv4 Address 5 Select Parallel Interface Sim using or and then press the OK key 6 Select Apply using or and then press the OK key 7 Select USB Sim using or and then press the OK key 8 Select Apply using or and then press the OK key 9 Press Exit 3 Users Authentication and Its Application 76 3 ...

Страница 79: ...10 Press the OK key 11 Press the User Tools Counter key p 117 Limiting Available Functions LDAP Authentication 77 3 ...

Страница 80: ...server reliability and site certificate are checked every time you access the SSL server For details about specifying SSL using Web Image Monitor see Web Image Monitor Help During Integration Server Authentication the data registered in the server is automatically registered in the machine If user information on the server is changed information registered in the machine may be overwritten when au...

Страница 81: ...er Auth Management using or and then press the OK key 5 Select Integration Svr Auth using or and then press Details If you do not want to use User Authentication Management select Off 6 Select Server Name using or and then press the OK key Specify the name of the server for external authentication Integration Server Authentication 79 3 ...

Страница 82: ...cation system for external authentication using or and then press the OK key Select an available authentication system 10 Select Domain Name using or and then press the OK key 11 Enter the domain name and then press the OK key You cannot specify a domain name under an authentication system that does not support domain login 3 Users Authentication and Its Application 80 3 ...

Страница 83: ... the global group If you set Authentication Type to Notes you can use the Notes group If you set Authentication Type to Basic Integration Server you can use the groups created using the Authentication Manager 13 Select Prgrm Change Delete Group using or and then press the OK key 14 Select Program Change using or and then press the OK key 15 Select Not Programmed using or and then press the OK key ...

Страница 84: ...er Authentication will be applied to the selected functions Users can use the selected functions only 18 Press the OK key and then press the Escape key twice 19 Select SSL using or and then press the OK key 20 Select On using or and then press the OK key To not use secure sockets layer SSL for authentication press Off 21 Press Exit 3 Users Authentication and Its Application 82 3 ...

Страница 85: ...er Job Authentication Selecting Entire or Simple All If you select Entire you cannot print using a printer driver or a device that does not support authentication To print in an environment that does not support authentication select Simple All or Simple Limitation If you select Simple All you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print ...

Страница 86: ... Simple Limitation you can print even with unauthenticated printer drivers or devices Specify this setting if you want to print with a printer driver or device that cannot be identified by the machine or if you do not require authentication for printing However note that because the machine does not require authentication in this case it may be used by unauthorized users 1 Select Simple Limitation...

Страница 87: ...ey You can specify the IPv4 address range to which this setting is applied 4 Enter the End IPv4 Address and then press the OK key Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address 5 Select Parallel Interface Sim using or and then press the OK key 6 Select Apply using or and then press the OK key Integration Server Authentication 85 3 ...

Страница 88: ... USB Sim using or and then press the OK key 8 Select Apply using or and then press the OK key 9 Press Exit 10 Press the OK key 11 Press the User Tools Counter key 3 Users Authentication and Its Application 86 3 ...

Страница 89: ...on fails the print job is reset C Printing is possible if user authentication is successful and Driver Encryption Key for the printer driver and machine match X Printing is not possible regardless of user authentication and the print job is reset User Auth Management Specified Specified Specified Specified Off Printer Job Authentication Simple All Simple All Entire Entire Simple Encryption Off On ...

Страница 90: ... driver dialog box the Confirm authentication information when printing checkboxisselected InthePCLprinterdriverdialogbox the UserAuthentication and Encrypt check boxes are selected Personal authentication information is added to the printer job The printer driver applies simple encryption to login passwords For details about turning off Restrict Use of Simple Encryption and allowing the use of si...

Страница 91: ...ng an external device for user authentication see Authentication Using an External Device Consult the User Administrator about your login user name password and user code For user code authentication enter a number registered in the Address Book as User Code p 96 Authentication Using an External Device User Code Authentication Using the Control Panel When User Code Authentication is set the follow...

Страница 92: ...d then press the OK key 2 Enter a login password and then press the OK key When the user is authenticated the screen for the function you are using appears Log Off Using the Control Panel Follow the procedure below to log off when Basic Authentication Windows Authentication or LDAP Authentication is set 1 Press the User Tools Counter key 2 Press Logout 3 Press Yes 3 Users Authentication and Its Ap...

Страница 93: ...eb Image Monitor 1 Click Logout to log off Delete the cache memory in the Web Image Monitor after logging off User Lockout Function If an incorrect password is entered several times the User Lockout function prevents further login attempts under the same user name Even if the locked out user enters the correct password later authentication will fail and the machine cannot be used until the lockout...

Страница 94: ...ministrators with unlocking privileges are as follows Locked out User Unlocking administrator general user user administrator user administrator network administrator file administrator machine administrator supervisor supervisor machine administrator Specifying the User Lockout Function This can be specified by the machine administrator using Web Image Monitor 1 Open a Web browser 2 Enter http th...

Страница 95: ...can be unlocked by the administrator or supervisor with unlocking privileges using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Monitor appea...

Страница 96: ...to Logout For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Timer Settings using or and then press the OK key 4 Select Auto Logout Timer using or and then press the OK ke...

Страница 97: ...imer select Off 7 Press the User Tools Counter key If a paper jam occurs or a print cartridge runs out of ink the machine might not be able to perform the Auto Logout function p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Authentication If User Authentication is Specified 95 3 ...

Страница 98: ...Authentication Using an External Device To authenticate using an external device see the device manual For details contact your sales representative 3 Users Authentication and Its Application 96 3 ...

Страница 99: ...er or multi function printer For more information see the information below Unauthorized Copy Prevention 1 Using the printer driver specify the printer settings for unauthorized copy prevention For details on how to specify settings for unauthorized copy prevention see Specifying Printer Settings for Unauthorized Copy Prevention Printer Driver Setting Data Security for Copying 1 Using the printer ...

Страница 100: ...ill not necessarily stop information leaks The embedded pattern cannot be guaranteed to be copied faxed or scanned properly Depending on the machine and scanner settings the embedded pattern may not be copied scanned or faxed BBK004S 1 Printed Documents Using the printer driver you can embed background images and pattern in a printed document for Unauthorized Copy Prevention 2 The document is copi...

Страница 101: ... copying documents when they are copied faxed or scanned the optional Copy Data Security Unit must be installed in the machine If a document with embedded pattern for data security for copying is copied faxed or scanned by a copier or multi function printer without the Copy Data Security Unit the embedded pattern appears conspicuously in the copy However character relief may differ depending on th...

Страница 102: ...itations on printing with unauthorized copy prevention and data security for copying Unauthorized copy prevention Data security for copying You can print using only the RPCS printer driver You cannot print at 200 dpi resolution You cannot partially embed pattern in the printed document You can only embed pattern that is entered in the text box of the printer driver Printing with embedding takes lo...

Страница 103: ...ized copy check box 3 Click Control Settings 4 In the text box in the Unauthorized copy prevention Pattern group enter the text to be embedded in the printed document Also specify Font Font style and Size 5 Click OK Specifying Printer Settings for Data Security for Copying Printer Driver Setting If a printed document using this function is copied by a copier or multi function printer the copy is g...

Страница 104: ...copy guarded is copied faxed or scanned the copy or stored file is not grayed out 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Administrator Tools using or and then press the OK key 4 Select Data Security for Copying using or and then press the OK key 5 Select the setting you want to change using or and then press the OK key If you do not ...

Страница 105: ...s you can restrict users from registering data in the Address Book If you set Restrict Adding of User Destinations to Off users can directly enter destination telephone numbers in Program Dest on the fax screens If you set Restrict Adding of User Destinations to On users can specify destinations directly but cannot use Program Dest to register data in the Address Book When this setting is made onl...

Страница 106: ...rict Use of Dest using or and then press the OK key 6 Select On using or and then press the OK key 7 Press the User Tools Counter key p 177 Specifying the Extended Security Functions p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Authentication 4 Protecting Document Data Information from Leaks 104 4 ...

Страница 107: ...l control or the user administrator You can specify who is allowed to access the data in the Address Book By making this setting you can prevent the data in the Address Book being used by unregistered users For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User ...

Страница 108: ... number keys or the Quick Dial keys and then press the OK key By pressing Search you can search by Name Display Destination List Registration No User Code and Fax Destination 7 Press the OK key 8 Press Details 9 Select Auth Protect using or and then press the OK key 4 Protecting Document Data Information from Leaks 106 4 ...

Страница 109: ...can select more than one user By pressing All you can select all the users 13 Press the OK key 14 Select the permission and then press the OK key Select the permission from Read only Edit Edit Delete or Full Control To register multiple users repeat steps 12 to 14 15 Press the User Tools Counter key Protecting the Address Book 107 4 ...

Страница 110: ...xtended security functions see Specifying the Extended Security Functions For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Administrator Tools using or and then press th...

Страница 111: ...you want to change using or and then press Enc Key 7 Enter the encryption key and then press the OK key Enter the encryption key using up to 32 alphanumeric characters 8 Re enter the encryption key and then press the OK key 9 Press the OK key 10 Press OK Protecting the Address Book 109 4 ...

Страница 112: ... is complete Exit appears If you press Stop during encryption the data is not encrypted If you press Stop during decryption the data stays encrypted 11 Press Exit 12 Press the User Tools Counter key If you register additional users after encrypting the data in the Address Book those users are also encrypted p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Aut...

Страница 113: ...min Auth management to prevent users from specifying certain settings Administrator type determines which machine settings can be modified The following administrator types are possible User Administrator For a list of settings that the user administrator can specify see User Administrator Settings Machine Administrator For a list of settings that the machine administrator can specify see Machine ...

Страница 114: ...User Administrator Settings p 200 Machine Administrator Settings p 207 Network Administrator Settings p 210 File Administrator Settings p 215 User Settings Control Panel Settings p 226 User Settings Web Image Monitor Settings 5 Managing Access to the Machine 112 5 ...

Страница 115: ... This can be specified by the machine administrator You can set menu protect to Off Level 1 or Level 2 If you set it to Off no menu protect limitation is applied To limit access to the fullest extent select Level 2 For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication p 30 Logg...

Страница 116: ...cify Menu Protect in Fax Features set Machine Management to On in Admin Auth Management in Administrator Tools in System Settings 1 Press the User Tools Counter key 2 Select Fax Features using or and then press the OK key 3 Select Administrator Tools using or and then press the OK key 4 Select Menu Protect using or and then press the OK key 5 Managing Access to the Machine 114 5 ...

Страница 117: ...Management to On in Admin Auth Management in Administrator Tools in System Settings 1 Press the User Tools Counter key 2 Select Printer Features using or and then press the OK key 3 Select Maintenance using or and then press the OK key 4 Select Menu Protect using or and then press the OK key 5 Select the menu protect level using or and then press the OK key Menu Protect 115 5 ...

Страница 118: ...6 Press the User Tools Counter key 5 Managing Access to the Machine 116 5 ...

Страница 119: ...ionsavailabletoregisteredusers Bymaking this setting you can limit the functions available to users For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Administrator Tools ...

Страница 120: ...ogram using the number keys or the Quick Dial keys and then press the OK key By pressing Search you can search by Name Display Destination List Registration No and Fax Destination 7 Press the OK key 8 Press Details 9 Select Auth Info using or and then press the OK key 5 Managing Access to the Machine 118 5 ...

Страница 121: ...ions you want to permit using or and then press the key 12 Press the OK key 13 Press the Escape key 14 Press End 15 Press the OK key 16 Press the User Tools Counter key p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Authentication Limiting Available Functions 119 5 ...

Страница 122: ...on By deleting the log stored in the machine you can free up space on the hard disk 3 Transferring log information You can transfer the log information which indicates who tried to gain access and at what time By transferring the log files you can check the history data and identify unauthorized access Using the Control Panel to Specify Log File Settings Transfer Log Setting The machine administra...

Страница 123: ...ing Administrator Authentication p 31 Logging off Using Administrator Authentication Specifying Delete All Logs This can be specified by the machine administrator For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication To delete all logs from the control panel you must use Web Sm...

Страница 124: ...using or and then press the OK key 4 Select Delete All Logs using or and then press the OK key A confirmation screen appears 5 Press Yes 6 Press Exit 7 Press the User Tools Counter key p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Authentication 5 Managing Access to the Machine 122 5 ...

Страница 125: ...g on Using Administrator Authentication p 31 Logging off Using Administrator Authentication Specify Log Collect Settings Specify collection log settings The collection log levels are listed below Job Log Collect Level Level 1 User Settings Access Log Collect Level Level 1 Level 2 User Settings 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When entering ...

Страница 126: ...he Access Log Collect setting value the more logs are collected Transfer Logs Select to disable log transfer When log transfer is inactive Inactive is displayed and this setting cannot be changed When log transfer is active log records can be transferred to the log collection system 1 Follow steps 1 to 4 in Specify Log Collect Settings 2 Select Inactive under Transfer Logs 3 Click OK 4 Click Logou...

Страница 127: ...tings 2 Click Delete under Delete All Logs 3 Click OK All job logs and device access log records are cleared 4 Click Logout On this page Delete All Logs does not appear if either Collect Job Logs or Collect Access Logs are not set to Active Managing Log Files 125 5 ...

Страница 128: ...5 Managing Access to the Machine 126 5 ...

Страница 129: ... SSH SFTP Bonjour SMB WSD Device WSD Printer IPP DIPRINT RHPP Web Image Monitor SmartDeviceMonitor for Client or DeskTopBinder You cannot limit the monitoring of SmartDeviceMonitor for Client You cannot limit access involving telnet or SmartDeviceMonitor for Admin when using the SNMPv1 monitoring 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When enteri...

Страница 130: ... Remote Maintenance by telnet Network Guide For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication Protocol Port Setting Method Disabled Condition IPv4 Control Panel Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor All applications that operate over I...

Страница 131: ...playedby making settings on the control panel using Restrict Display of User Information 1 telnet TCP 23 Web Image Monitor Commands using telnet are disabled HTTP TCP 80 Web Image Monitor telnet Functions that require HTTP cannot be used Cannot print using IPP on port 80 HTTPS TCP 443 Web Image Monitor telnet Functions that require HTTPS cannot be used Remote cannot be used You can also make setti...

Страница 132: ... are read only and cannot be edited SNMPv3 UDP 161 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor Functions that require SNMPv3 cannot be used You can also make settings to require SNMPv3 encrypted transmission and restrict the use of other transmission methods using the control panel Web Image Monitor or telnet RSH RCP TCP 514 Web Image Monitor telnet SmartDeviceMoni...

Страница 133: ...CP 631 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor IPP functions cannot be used SSDP UDP 1900 Web Image Monitor telnet Device discovery using UPnP from Windows cannot be used Bonjour UDP 5353 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor Bonjour functions cannot be used Remote TCP 7443 TCP 7444 telnet Remote cannot be used DIPRINT TCP...

Страница 134: ...vice functions cannot be used WSD Printer TCP 53001 variable Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor WSD Printer functions cannot be used WS Discovery UDP TCP 3702 Web Image Monitor telnet SmartDeviceMonitor for Admin Web SmartDeviceMonitor WSD Device Printer search function cannot be used RHPP TCP 59100 Web Image Monitor telnet Cannot print with RHPP 1 Restric...

Страница 135: ...on Making Settings Using the Control Panel 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Interface Settings using or and then press the OK key 4 Select Network using or and then press the OK key 5 Select Effective Protocol using or and then press the OK key Preventing Unauthorized Access 133 6 ...

Страница 136: ... to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login user name and login password 4 Click Configuration and then click Network Security under Security 5 Set the desired protocols to active inactive or open close 6 Click OK 7 Click OK 8 Click Logout For details about how to configure telnet see Using telnet Network and System G...

Страница 137: ... protect important information Use this setting if the machine is connected to the office local area network LAN Select Level 0 for easy use of all the features Use this setting when you have no information that needs to be protected from outside threats For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Usin...

Страница 138: ... 2 Enter http the machine s IP address or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login user name and login password 4 Click Configuration ...

Страница 139: ...ty Ciphertext Only SSL TLS Certificate Status None None None DIPRINT Active Active Inactive LPR Active Active Inactive FTP Active Active Active sftp Active Active Active ssh Active Active Active RSH RCP Active Active Inactive TELNET Active Inactive Inactive Bonjour Active Active Inactive SSDP Active Active Inactive SMB Active Active Inactive NetBIOS over TCP IPv4 Active Active Inactive WSD Device ...

Страница 140: ...Function Level 0 Level 1 Level 2 SNMP Active Active Active Permit Settings by SNMPv1 and v2 On Off Off SNMPv1 v2 Function Active Active Inactive SNMPv3 Function Active Active Active Permit SNMPv3 Communication Encryption Cleartext Encryption Only Encryption Only 6 Enhanced Network Security 138 6 ...

Страница 141: ...cation to DIGEST and then specify the IPP Authentication password set on the machine Youcanusetelnet orFTPtomanagepasswordsforIPPauthentication althoughitisnotrecommended Driver Encryption Key This can be specified by the network administrator Specify the driver encryption key on the machine By making this setting you can encrypt login passwords for transmission to prevent them from being analyzed...

Страница 142: ...haracters The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers Make sure to enter the same driver encryption key as that is specified on the machine 7 Press the OK key 8 Press the User Tools Counter key For details about specifying the encryption key on the printer driver see the printer driver Help For details abou...

Страница 143: ...he address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login user name and login password 4 Click Configuration under Security and then click IPP Authentication The IPP Authentication page appears 5 Select DIGEST from the Authentication list 6 Enter the user nam...

Страница 144: ...pecified by the network administrator To protect the communication path and establish encrypted communication create and install the device certificate There are two ways of installing a device certificate create and install a self signed certificate using the machine or request a certificate from a certificate authority and install it SSL Secure Sockets Layer BBC003S 1 To access the machine from ...

Страница 145: ...dure after creating the certificate depends on the certificate authority Follow the procedure specified by the certificate authority 2 Installing the device certificate Install the device certificate using Web Image Monitor 3 Enabling SSL Enable the SSL TLS setting using Web Image Monitor To confirm whether SSL configuration is enabled enter https the machine s IP address or host name in your Web ...

Страница 146: ...Certificate Status to show that a device certificate for the machine has been installed 11 Click Logout Click Delete to delete the device certificate from the machine Creating the Device Certificate Certificate Issued by a Certificate Authority Create the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Monitor Help This section ex...

Страница 147: ...eb Image Monitor you can create the contents of the device certificate but you cannot send the certificate application Click Cancel Request to cancel the request for the device certificate Installing the Device Certificate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Mon...

Страница 148: ...ued by a certificate authority 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login ...

Страница 149: ...by following the Certificate Import Wizard instructions For details about how to install the certificate and about where to store the certificate when accessing the machine using IPP see Web Image Monitor Help If a certificate issued by a certificate authority is installed in the machine confirm the certificate store location with the certificate authority Setting the SSL TLS Encryption Mode By sp...

Страница 150: ...g on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the User Tools Counter key 2 Select System Settings using or and then press the OK key 3 Select Interface Settings using or and then press the OK key 4 Select Network using or and then press the OK key 5 Select Permit SSL TLS Comm using or ...

Страница 151: ... off Using Administrator Authentication SNMPv3 Encryption This can be specified by the network administrator When using SmartDeviceMonitor for Admin or another application to make various settings you can encrypt the data transmitted By making this setting you can protect data from being tampered with For details about logging on and logging off with administrator authentication see Logging on Usi...

Страница 152: ...ncryption Key in SNMP Authentication Information in SmartDeviceMonitor for Admin in addition to specifying Permit SNMPv3 Communication on the machine For details about specifying Encryption Key in SmartDeviceMonitor for Admin see SmartDeviceMonitor for Admin Help If network administrator s Encryption Password setting is not specified the data for transmission may not be encrypted or sent For detai...

Страница 153: ... p 26 Registering the Administrator Protection Using Encryption 151 6 ...

Страница 154: ...figuration problems disable IPsec in System Settings on the control panel and then access Web Image Monitor For details about enabling and disabling IPsec using the control panel see System Settings General Settings Guide IPsec is not applied to data obtained through DHCP DNS or WINS IPsec compatible operating systems are Windows XP SP2 Windows Vista Mac OSX 10 4 and later RedHat Linux Enterprise ...

Страница 155: ...on algorithm and authentication key are specified automatically Some operating systems use the term Compliance in place of Authentication Encryption Key Auto Exchange Settings and Encryption Key Manual Settings This machine provides two key setting methods manual and auto exchange Using either of these methods agreements such as the IPsec algorithm and key must be specified for both sender and rec...

Страница 156: ...ins individual setting items Encryption Key Auto Exchange Manual Settings Shared Settings Setting Description Setting Value IPsec Specify whether to enable or disable IPsec Active Inactive Exclude HTTPS Transmission Specify whether to enable IPsec for HTTPS transmission Active Inactive Specify Active if you do not want to use IPsec for HTTPS transmission Encryption Key Manual Settings Specify whet...

Страница 157: ...as well as authenticate the transmission partner and prevent unauthorized packet tampering Packet encryption helps prevent eavesdropping attacks This level provides higher security than Authentication and Low Level Encryption The following table lists the settings that are automatically configured according to the security level Setting Authentication Only Authentication and Low Level Encryption A...

Страница 158: ... changes to the auto configured settings When you change an auto configured setting the security level switches automatically to User Setting Setting Description Setting Value Address Type Specify the address type for which IPsec transmission is used Inactive IPv4 IPv6 IPv4 IPv6 Default Settings only Local Address Specify the machine s address If you are using multiple addresses in IPv6 you can al...

Страница 159: ...transmit using IPsec or to allow cleartext transmission when IPsec cannot be established auto setting Use When Possible Always Require Authentication Method Specify the method for authenticating transmission partners auto setting PSK Certificate If you specify PSK you must then set the PSK text using ASCII characters If you specify Certificate the certificate for IPsec must be installed and specif...

Страница 160: ...Specify the security protocol to be used in Phase 2 To apply both encryption and authentication to sent data specify ESP or AH ESP To apply authentication data only specify AH auto setting ESP AH AH ESP Phase 2 Authentication Algorithm Specify the authentication algorithm to be used in phase 2 auto setting HMAC MD5 96 HMAC SHA1 96 Phase 2 Encryption Algorithm Permissions Specify the encryption alg...

Страница 161: ...lso specify an address range The machine s IPv4 or IPv6 address Ifyouarenotsettinganaddress range enter 32 after an IPv4 address or enter 128 after an IPv6 address Remote Address Specify the address of the IPsec transmission partner You can also specify an address range The IPsec transmission partner s IPv4 or IPv6 address Ifyouarenotsettinganaddress range enter 32 after an IPv4 address or enter 1...

Страница 162: ...P or AH ESP To apply authentication data only specify AH ESP AH AH ESP Authentication Algorithm Specify the authentication algorithm HMAC MD5 96 HMAC SHA1 96 Authentication Key Specify the key for the authentication algorithm Specify a value within the ranges shown below according to the encryption algorithm Hexadecimal value 0 9 a f A F If HMAC MD5 96 set 32 digits If HMAC SHA1 96 set 40 digits A...

Страница 163: ...igits 3DES set 48 digits AES 128 set 32 digits AES 192 set 48 digits AES 256 set 64 digits ASCII DES set 8 characters 3DES set 24 characters AES 128 set 16 characters AES 192 set 24 characters AES 256 set 32 characters Encryption Key Auto Exchange Settings Configuration Flow This section explains the procedure for specifying Encryption Key Auto Exchange Settings This can be specified by the networ...

Страница 164: ...nsmission has been established Specifying Encryption Key Auto Exchange Settings This can be specified using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page o...

Страница 165: ...can be specified by the network administrator Using Web Image Monitor select the certificate to be used for IPsec You must install the certificate before it can be used 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 ...

Страница 166: ...icate and generate a new key after every enter the same validity period in minutes that is specified on the machine in Encryption Key Auto Exchange Settings Phase 1 and then click Methods 11 Confirmthatthecombinationofhashalgorithm onWindowsXP Integrity theencryption algorithm onWindowsXP Encryption andtheDiffie Hellmangroupsettingsin Security method preference order match the settings specified o...

Страница 167: ...ings select Generate a new key every and enter the validity period in seconds that was specified on the machine in Encryption Key Auto Exchange Settings Phase 2 34 Click OK three times 35 Click Next 36 Click Finish 37 Click OK 38 Click Close The new IP security policy IPsec settings is specified 39 Select the security policy that was just created right click and then click Assign IPsec settings on...

Страница 168: ...erformed over the network AfterconfiguringIPsec youcanuse Ping commandtocheckiftheconnectionisestablishedcorrectly However you cannot use Ping command when ICMP is excluded from IPsec transmission Also because the response is slow during initial key exchange it may take some time to confirm that transmission has been established Specifying Encryption Key Manual Settings This can be specified using...

Страница 169: ...elnet Setting Commands YoucanusetelnettoconfirmIPsecsettingsandmakesettingchanges Thissectionexplainstelnetcommands for IPsec To log in as an administrator using telnet the default login user name is admin and the password is blank For details about logging in to telnet and telnet operations see Using telnet Network Guide If you are using a certificate as the authentication method in encryption ke...

Страница 170: ...ff ipsec exclude To display or specify protocols excluded by IPsec use the ipsec exclude command Display current settings msh ipsec exclude Displays the protocols currently excluded from IPsec transmission Specify protocols to exclude msh ipsec exclude https dns dhcp wins all on off Specify the protocol and then enter on to exclude it or off to include it for IPsec transmission Entering all specif...

Страница 171: ...any Security protocol setting msh ipsec manual 1 2 3 4 default proto ah esp dual Enter the separate setting number 1 4 or default and specify the security protocol To specify AH enter ah To specify ESP enter esp To specify AH and ESP enter dual Not specifying a protocol displays the current setting SPI value setting msh ipsec manual 1 2 3 4 default spi SPI input value SPI output value Enter the se...

Страница 172: ...nual 1 2 3 4 default encrypt null des 3des aes128 aes192 aes256 encryption key Enter the separate setting number 1 4 or default specify the encryption algorithm and then set the encryption key Ifyouaresettingahexadecimalnumber attach0xatthebeginning Ifyouhavesettheencryption algorithm to null enter an encryption key of arbitrary numbers 2 64 digits long If you are setting an ASCII character string...

Страница 173: ...ify the address type for the default setting To specify both ipv4 and ipv6 enter any Security policy setting msh ipsec ike 1 2 3 4 default proc apply bypass discard Enter the separate setting number 1 4 or default and specify the security policy for the address specified in the selected setting To apply IPsec to the relevant packets specify apply To not apply IPsec specify bypass If you specify di...

Страница 174: ...nning or ending address displays the current setting IKE partner authentication method setting msh ipsec ike 1 2 3 4 default auth psk rsasig Enter the separate setting number 1 4 or default and specify the authentication method Specify psk touseasharedkeyastheauthenticationmethod Specify rsasig touseacertificate at the authentication method You must also specify the PSK character string when you s...

Страница 175: ... andspecifytheISAKMPSA phase1 validity period Enter the validity period in seconds from 300 to 172800 Not specifying a validity period displays the current setting IPsec SA phase 2 authentication algorithm setting msh ipsec ike 1 2 3 4 default ph2 auth hmac md5 hmac sha1 Enter the separate setting number 1 4 or default and specify the IPsec SA phase 2 authentication algorithm Separate multiple enc...

Страница 176: ...setting msh ipsec ike 1 2 3 4 default ph2 lifetime validity period Enter the separate setting number 1 4 or default and specify the IPsec SA phase 2 validity period Enter the validity period in seconds from 300 to 172800 Not specifying a validity period displays the current setting Reset setting values msh ipsec ike 1 2 3 4 default all clear Enter the separate setting number 1 4 or default and res...

Страница 177: ...on control display and setting methods are explained below View Settings msh authfree If print job authentication exclusion is not specified authentication exclusion control is not displayed IPv4 address settings msh authfree ID range_addr1 range_addr2 IPv6 address settings msh authfree ID range6_addr1 range6_addr2 IPv6 address mask settings msh authfree ID mask6_addr1 masklen USB setting msh auth...

Страница 178: ...Authentication by IEEE802 1X IEEE802 1X enables authentication in an Ethernet environment For details see Using telnet Network and System Settings Guide 6 Enhanced Network Security 176 6 ...

Страница 179: ...ails about when to use each function see the corresponding chapters Changing the Extended Security Functions To change the extended security functions display the extended security screen as follows Administrators can change the extended security functions according to their role For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authe...

Страница 180: ...inistrator Encrypt the password transmitted when specifying user authentication If you register the encryption key specified with the machine in the driver passwords are encrypted For details see the printer driver Help LAN Fax driver Help or TWAIN driver Help Encrypt Address Book This can be specified by the user administrator Encrypt the data in the machine s Address Book For details on protecti...

Страница 181: ...ot available all personal information can be displayed as For example when someone not authenticated as an administrator checks the job history using SNMP in SmartDeviceMonitor for Admin personal information can be displayed as so that users cannot be identified Because information identifying registered users cannot be viewed unauthorized users are prevented from obtaining information about the r...

Страница 182: ...TLS see Setting the SSL TSL Encryption Mode If you select On specify the encryption setting using the printer driver On Off Transfer to Fax Receiver This can be specified by the machine administrator If you use Forwarding under the fax function files stored in the machine can be transferred or delivered To prevent stored files being transferred by mistake select Prohibit for this setting Prohibit ...

Страница 183: ...ing and Minimum Character No If you select Level 1 specify the password using a combination of two types of characters selected from upper case letters lower case letters decimal numbers and symbols such as If you select Level 2 specify the password using a combination of three types of characters selected from upper case letters lower case letters decimal numbers and symbols such as Level 2 Level...

Страница 184: ...ermissible or not by checking the firmware version displayed on the control panel screen If the firmware structure change is not permissible contact your service representative before logging in When Change Firmware Structure is set to Prohibit administrator authentication must be enabled After Prohibit is specified turn off administrator authentication once and the next time administrator authent...

Страница 185: ...n both the sending and receiving side For details about Not Displaying Destinations and Senders in Reports and Lists see Facsimile Settings Facsimile Reference Printing the Journal When making authentication settings for users to prevent personal information in transmission history being printed set the Journal to not be printed Also if more than 200 transmissions are made transmissions shown in t...

Страница 186: ... a service representative for inspection or repair If you set the service mode lock to On service mode cannot be used unless the machine administrator logs on to the machine and cancels the service mode lock to allow the servicerepresentativetooperatethemachineforinspectionandrepair Thisensuresthattheinspection and repair are done under the supervision of the machine administrator Specifying Servi...

Страница 187: ...tor Authentication Canceling Service Mode Lock For a service representative to carry out inspection or repair in service mode the machine administrator must log on to the machine and cancel the service mode lock For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the ...

Страница 188: ...ice Mode Lock using or and then press the OK key 5 Select Off using or and then press the OK key 6 Press the User Tools Counter key The service representative can switch to service mode p 30 Logging on Using Administrator Authentication p 31 Logging off Using Administrator Authentication 7 Specifying the Extended Security Functions 186 7 ...

Страница 189: ...ge appears deal with the problem according to the information contained in the message Messages Cause Solutions You do not have the privileges to use this function The authority to use the function is not specified If this appears when trying to use a function The function is not specified in the Address Book management setting as being available The user administrator must decide whether to autho...

Страница 190: ...word is incorrect Ask the user administrator for the correctloginusernameandlogin password Authentication failed Authentication failed because no more users can be registered The number of users registered in the Address Book has reached capacity Delete unnecessary user addresses Authentication failed Cannot access the authentication server when using Windows Authentication LDAP Authentication or ...

Страница 191: ...d with the LAN Fax driver The encryption key specified in the driver does not match the machine s driver encryption key Specify the driver encryption key registered in the machine See Driver Encryption Key Cannot perform the following Print with the printer driver Connect with the TWAIN driver Send with the LAN Fax driver The SNMPv3 account password and encryption algorithm do not match settings s...

Страница 192: ...dcertificateisnotinstalled in the computer Set Restrict Use of Simple Encryption to On Alternatively enable SSL TLS install the server certificate in the machine and then install the certificate in the computer See Setting the SSL TLS Encryption Mode Cannot access the machine using ScanRouter EX Professional V2 ScanRouter EX Professional V2 does not support user authentication ScanRouter EX Profes...

Страница 193: ...y user authentication in the printer driver For details see the printer driver Help If you try to interrupt a job while copying or scanning an authentication screen appears With this machine you can log off while copying or scanning If you try to interrupt copying or scanning after logging off an authentication screen appears Only the user who executed a copying or scanning job can interrupt it Wa...

Страница 194: ...8 Troubleshooting 192 8 ...

Страница 195: ...fy up to 32 alphanumeric characters and symbols Keep in mind that user names and passwords are case sensitive Be sure not to forget the supervisor login user name and login password If you do forget them a service representative will to have to return the machine to its default state This will result in all data in the machine being lost and the service call may not be free of charge You cannot sp...

Страница 196: ...or for the first time press the OK key without entering login password Logging off as the Supervisor If administrator authentication has been specified be sure to log off after completing settings This section describes how to log off after completing settings 1 Press Logout 2 Press Yes Changing the Supervisor This section describes how to change the supervisor s login name and password 9 Appendix...

Страница 197: ...Counter key 2 Press Login 3 Log on as the supervisor You can log on in the same way as an administrator 4 Select System Settings using or and then press the OK key 5 Select Administrator Tools using or and then press the OK key 6 Select Program Change Admin using or and then press the OK key 7 Select Admin Detailed Settings using or and then press the OK key Supervisor Operations 195 9 ...

Страница 198: ...en press the OK key 10 Enter the login user name and then press the OK key 11 Select Login Password using or and then press the OK key 12 Enter the login password and then press the OK key 13 If a password re entry screen appears enter the login password and then press the OK key 9 Appendix 196 9 ...

Страница 199: ...istrator s Password This section describes how to reset the administrators passwords For details about logging on and logging off as the supervisor see Supervisor Operations 1 Press the User Tools Counter key 2 Press Login 3 Log on as the supervisor You can log on in the same way as an administrator 4 Select System Settings using or and then press the OK key Supervisor Operations 197 9 ...

Страница 200: ... and then press the OK key 7 Select Admin Detailed Settings using or and then press the OK key 8 Select the administrator you wish to reset using or and then press the OK key 9 Select Login Password using or and then press the OK key 10 Enter the login password and then press the OK key 9 Appendix 198 9 ...

Страница 201: ...ry screen appears enter the login password and then press the OK key 12 Press Exit three times You will be automatically logged off 13 Press the User Tools Counter key p 193 Supervisor Operations Supervisor Operations 199 9 ...

Страница 202: ...Display Print Counter Print Counter List Display Clear Print Counter per User Print Counter List User Authentication Management You can specify which authentication to use You can also edit the settings for each function Administrator Authentication Management Machine Management Program Change Administrator Machine Administrator You can change the user name and the full control user s authority Ke...

Страница 203: ...ways On Energy Saver Level Service Mode Lock Firmware Version Delete All Logs Transfer Log Setting Data Security for Copying 1 Fixed USB Port 1 The Copy Data Security Unit option must be installed Copier Features The following settings can be specified General Features All the settings can be specified Reproduction Ratio All the settings can be specified Edit All the settings can be specified Mach...

Страница 204: ...Adjust All the settings can be specified Reception Settings All the settings can be specified Administrator Tools The following settings can be specified Print Journal Print TX Standby File List Forwarding Parameter Setting Program Special Sender Program Memory Lock ID G3 Analog Line Menu Protect Printer Features The following settings can be specified List Test Print All the settings can be speci...

Страница 205: ...aper Size Page Size Letterhead Setting Bypass Tray Setting Priority Edge To Edge Print Tray Switching Extended Auto Tray Switching Host Interface All the settings can be specified PCL Menu All the settings can be specified Settings via Web Image Monitor The following settings can be specified Top Page Reset Device Reset Printer Job Device Settings System Device Name Comment Machine Administrator S...

Страница 206: ... User Authentication Management All the settings can be specified Administrator Authentication Management Machine Administrator Authentication Available Settings for Machine Administrator Program Change Administrator You can specify the following administrator settings for the machine administrator Login User Name Login Password Encryption Password LDAP Server All the settings can be specified Fir...

Страница 207: ...x General Settings All the settings can be specified Administrator Tools All the settings can be specified Parameter Settings All the settings can be specified Interface Interface Settings Ethernet Security USB Pict Bridge Network SNMPv3 Security User Lockout Policy All the settings can be specified RC Gate Set up RC Gate Request No Update RC Gate Firmware RC Gate Proxy Server Webpage Download Hel...

Страница 208: ...r for Admin The following settings can be specified Device Properties Reset Device Reset Current Job Refresh User Management Tool The following settings can be specified User Counter Information Access Control List 9 Appendix 206 9 ...

Страница 209: ...Auth Management Network Management Program Change Admin Network Administrator You can specify the user name and change the full control user s authority Extended Security Driver Encryption Key Settings by SNMP V1 and V2 Simple Encryption Network Security Level Settings via Web Image Monitor The following settings can be specified Device Settings System Device Name Comment Location Administrator Au...

Страница 210: ... be specified NetWare All the settings can be specified SMB All the settings can be specified SNMP All the settings can be specified SNMPv3 All the settings can be specified SSDP All the settings can be specified Bonjour All the settings can be specified Security Network Security All the settings can be specified Access Control All the settings can be specified IPP Authentication All the settings ...

Страница 211: ... IPsec All the settings can be specified IEEE 802 1X WPA WPA2 All the settings can be specified Webpage All the settings can be specified Settings via SmartDeviceMonitor for Admin The following settings can be specified NIB Setup Tool All the settings can be specified Network Administrator Settings 209 9 ...

Страница 212: ... Administrator Extended Security Enhance File Protection Settings via Web Image Monitor The following settings can be specified Device Settings Administrator Authentication Management File Administrator Authentication Available Settings for File Administrator Program Change Administrator You can specify the following administrator settings for the file administrator Login User Name Login Password ...

Страница 213: ...ended Security Encrypt Address Book Restrict User of Dest Restrict Adding of User Dest Settings via Web Image Monitor The following settings can be specified Address Book All the settings can be specified Device Settings Administrator Authentication Management User Administrator Authentication Available Settings for User Administrator Program Change Administrator You can specify the following admi...

Страница 214: ...DeviceMonitor for Admin The following settings can be specified Address Management Tool All the settings can be specified User Management Tool Restrict Access To Device Reset User Counters Add New User Delete User User Properties 9 Appendix 212 9 ...

Страница 215: ... information registered in the Address Book and has a login password and user name Full Control This is a user granted full control Abbreviations in the table columns A You can view and change the setting B You can view the setting C You cannot view or specify the setting Settings Read only User Edit User Edit Delete User Full Control Registere d User User Admin Regist No B A A A A A Name B A A A ...

Страница 216: ...t Delete User Full Control Registere d User User Admin Register as B A A A A A Dest Protect Obj C C C A A A Dest Protect Permission C C C A A A Fax Settings Settings Read only User Edit User Edit Delete User Full Control Register ed User User Admin Fax Dest B A A A A A 9 Appendix 214 9 ...

Страница 217: ...ntication is specified The administrator s configuration of Menu Protect and Available Settings determines which functions and system settings are available to users If user authentication is specified system settings and functions are available to authorized users only who must log in to access them User Settings Control Panel Settings 215 9 ...

Страница 218: ...eading nor modifying the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 General Features Settings Off Level 1 Level 2 APS Auto R E Priority R W R R Auto Tray Switching R W R R Original Type Setting R W R W R Duplex Mode Priority R W R R Orientation R W R W R Max Number of Sets R W R R Or...

Страница 219: ...d modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 List Test Print Settings Off Level 1 Level 2 Multiple Lists R W R W R W Configuration Page R W R W R W Error Log R W R W R W Menu ...

Страница 220: ...Setting R W R R Bypass Tray Setting Priority R W R R Edge to Edge Print R W R R Tray Switching R W R R Extended Auto Tray Switching R W R R Host Interface Settings Off Level 1 Level 2 I O Buffer R W R R I O Timeout R W R R PCL Menu Settings Off Level 1 Level 2 Orientation R W R R Form Lines R W R R Font Source R W R R Font Number R W R R Point Size R W R R Font Pitch R W R R 9 Appendix 218 9 ...

Страница 221: ...Settings Off Level 1 Level 2 Symbol Set R W R R Courier Font R W R R Extend A4 Width R W R R Append CR to LF R W R R Resolution R W R R Printer Features 219 9 ...

Страница 222: ...g the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available Settings that are not in the list can only be viewed regardless of the menu protect level setting The default for Menu Protect is Off General Settings Adjust Settings Off Level 1 Level 2 Adjust Sound Volume R W R W R Program Fax Information R W R R On Hook Mode Release Time R W...

Страница 223: ...rnal R W R W R Print TX Standby File List R W R W R Memory Lock R W R W R Forwarding R W R R Parameter Setting R W R R Program Special Sender R W R R Program Memory Lock ID R W R R Select Dial Push Phone R W R R G3 Analog Line R W R R Facsimile Features 221 9 ...

Страница 224: ... Settings have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available General Features Settings A B C Prog Change Del User Text R W R N A Panel Key Sound R W R N A Warm up Beeper R W R N A Copy Count Display R W R N A F...

Страница 225: ...Priority Printer R W R N A Timer Settings Settings A B C Auto Off Timer R W R N A Panel Off Timer R W R N A System Auto Reset Timer R W R N A Copier Auto Reset Timer R W R N A Facsimile Auto Reset Timer R W R N A Printer Auto Reset Timer R W R N A Scanner Auto Reset Timer R W R N A Set Date R W R N A Set Time R W R N A Auto Logout Timer R W R N A Interface Settings Settings A B C Print I F Setting...

Страница 226: ...ective Protocol R W R N A NCP Delivery Protocol R W R N A NW Frame Type R W R N A SMB Computer Name R W N A N A SMB Work Group R W N A N A Ethernet Speed R W R N A IEEE 802 1X Auth Ethernet R W R N A Restr IEEE802 1X Auth Def R W R N A Ping Command R W R N A Permit SNMPv3 Communictn R W R N A Permit SSL TLS Comm R W R N A Host Name R W R N A Machine Name R W R N A 1 If you select Auto Obtain DHCP ...

Страница 227: ...er Auth Management R W R N A Admin Auth Management R W N A N A Key Counter Management R W R N A Extended Security R W R N A Prog Chnge Del LDAP Server 6 R W R N A LDAP Search R W R N A Prog Change Delete Realm R W R N A AOF Always On R W R N A Energy Saver Level R W R N A Service Mode Lock R W R N A Delete All Logs R W R N A Transfer log Setting R W N A N A 6 Only the password can be specified Sys...

Страница 228: ...ettings ThissectiondisplaystheusersettingsthatcanbespecifiedonWebImageMonitorwhenuserauthentication isspecified Settingsthatcanbespecifiedbytheuservaryaccordingtothemenuprotectlevelandavailable settings specifications 9 Appendix 226 9 ...

Страница 229: ...ed user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available System Settings A B C General Settings Device Name R W R N A General Settings Comment R W R N A General Settings Location R W R N A Paper Tray Priority Copier R W R N A Paper Tray Priority Fa...

Страница 230: ...3 Apply Auto Paper Select R W R N A Tray3 Apply Duplex R W R N A Tray4 Paper Size R W R N A Tray4 Custom Paper Size R W R N A Tray4 Paper Type R W R N A Tray4 Apply Auto Paper Select R W R N A Tray4 Apply Duplex R W R N A Bypass Tray Paper Size R W R N A Bypass Tray Custom Paper Size R W R N A Bypass Tray Paper Type R W R N A Date Time Settings A B C Set Date R W R N A Set Time R W R N A SNTP Serv...

Страница 231: ...to Reset Timer R W R N A Scanner Auto Reset Timer R W R N A Printer Auto Reset Timer R W R N A Auto Logout Timer R W R N A Logs Settings A B C Collect Job Logs R W R N A Job Log Collect Level R W R N A Collect Access Logs R W R N A Access Log Collect Level R W R N A Transfer Logs R R N A Encrypt Logs R R N A Classification Code R W R N A Delete All Logs R W N A N A Device Settings 229 9 ...

Страница 232: ...thentication R W R N A Windows Authentication Domain Name R W R N A Windows Authentication Realm Name R W R N A Windows Authentication Group Settings for Windows Authentication R W R N A LDAP Authentication Printer Job Authentication R W R N A LDAP Authentication LDAP Authentication R W R N A LDAP Authentication Login Name Attribute R W R N A LDAP Authentication Unique Attribute R W R N A LDAP Aut...

Страница 233: ... R W R N A Integration Server Authentication Domain Name R W R N A Integration Server Authentication Group Settings for Integration Server Authentication R W R N A LDAP Server Settings A B C LDAP Search R W N A N A Program Change Delete R W N A N A Device Settings 231 9 ...

Страница 234: ...Neither reading nor modifying the setting is available The default for Menu Protect is Level 2 Printer Basic Settings System Settings Off Level 1 Level 2 Print Error Report R W R N A Auto Continue R W R N A Memory Overflow R W R N A Rotate by 180 Degrees R W R N A Blank Page Print R W R N A Sub Paper Size R W R N A Letterhead Setting R W R N A Bypass Tray Setting Priority R W R N A Extended Auto T...

Страница 235: ...R Font Number R W R R Point Size R W R R Font Pitch R W R R Symbol Set R W R R Courier Font R W R R Extend A4 Width R W R R Append CR to LF R W R R Resolution R W R R Virtual Printer Settings Settings Off Level 1 Level 2 Details R W R N A Select Virtual Printer R W R W N A Printer 233 9 ...

Страница 236: ...t Applicable Neither reading nor modifying the setting is available The default for Menu Protect is Off Administrator Tools Settings Off Level 1 Level 2 Memory Lock Reception R W N A N A Program Memory Lock ID R W N A N A Select Extension Outside R W N A N A Outside Access No R W N A N A General Settings Settings Off Level 1 Level 2 Switch Reception Mode R W N A N A Fax Header R W N A N A Own Name...

Страница 237: ... N A Journal R W N A N A Immediate Transmission Result Report R W N A N A Communication Result Report R W N A N A Memory Storage Report R W N A N A SEP Code RX Result Report R W N A N A SEP Code RX Reserve Report R W N A N A LAN Fax Result Report R W N A N A Inclusion of Part of Image R W N A N A Fax 235 9 ...

Страница 238: ...e table heads A Authorized user when Available functions have not been specified B Authorized user when Available functions have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available Interface Settings Settings A B C E...

Страница 239: ...ailable functions have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available IPv4 Settings A B C Host Name R W R N A DHCP R W R N A Domain Name R W R N A IPv4 Address R W R N A Subnet Mask R W R N A DDNS R W R N A WINS...

Страница 240: ...N A RHPP R W R N A IPv6 Settings A B C IPv6 R W R N A Host Name R W R N A Domain Name R W R N A Stateless Address R W R N A Manual Configuration Address R W R N A DCHPv6 lite R W R N A DDNS R W R N A Default Gateway Address R W R N A DNS Server R W R N A LPR R W R N A RSH RCP R W R N A DIPRINT R W R N A FTP R W R N A sftp R W R N A 9 Appendix 238 9 ...

Страница 241: ...er Name R W R N A Logon Mode R W R N A File Server Name R W R N A NDS Tree R W N A N A NDS Context Name R W R N A Operation Mode R W R N A Remote Printer No R W N A N A Job Timeout R W N A N A Frame Type R W R N A Print Server Protocol R W R N A NCP Delivery Protocol R W R N A SMB Settings A B C SMB R W R N A Workgroup Name R W R N A Computer Name R W R N A Network 239 9 ...

Страница 242: ...gs A B C Comment R W R N A Notify Print Completion R W R N A Bonjour Settings A B C Bonjour R W R N A Computer Name R W R N A Location R W R N A DIPRINT R W R N A LPR R W R N A IPP R W R N A 9 Appendix 240 9 ...

Страница 243: ...able functions have not been specified B Authorized user when Available functions have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available Webpage Settings A B C Language 1 R W R N A Language 2 R W R N A URL 1 R W R ...

Страница 244: ...Functions That Require Options The following functions require certain options and additional functions Data security for copying function Copy Data Security Unit 9 Appendix 242 9 ...

Страница 245: ...is the registered trademark of Linus Torvalds in the U S and other countries RED HAT is a registered trademark of Red Hat Inc PowerPC is a trademark of International Business Machines Corporation in the United States other countries or both Other product names used herein are for identification purposes only and might be trademarks of their respective companies We disclaim any and all rights to th...

Страница 246: ...roduct names of Windows Server 2003 R2 are as follows Microsoft Windows Server 2003 R2 Standard Edition Microsoft Windows Server 2003 R2 Enterprise Edition Microsoft Windows Server 2003 R2 Datacenter Edition The product names of Windows Server 2008 are as follows Microsoft Windows Server 2008 Standard Microsoft Windows Server 2008 Enterprise Microsoft Windows Server 2008 Datacenter The product nam...

Страница 247: ...y Level 154 Encryption Key Auto Exchange Setting Items 156 Encryption Key Auto Exchange Settings Configuration Flow 161 Encryption Key Manual Settings Configuration Flow 166 Encryption Key Manual Settings Items 159 Encryption Technology 16 Enhance File Protection 179 Error Message 187 ESP Protocol 152 Extended Security Functions 177 Extended Security Supplement 244 F Facsimile Features 220 Fax 234...

Страница 248: ...icate 143 Service Mode Lock 184 Settings by SNMP v1 and v2 180 SNMPv3 149 SSL 146 SSL Secure Sockets Layer 142 SSL TLS Encryption 147 Supervisor 22 193 Symbols 10 System Settings 222 T telnet 175 Transfer Log Setting 120 Transfer to Fax Receiver 180 Transmitted Passwords 139 Type of Administrator 111 U Unauthorized Copy Prevention 98 Update Firmware 181 User 17 35 User Administrator 213 User Admin...

Страница 249: ...MEMO 247 ...

Страница 250: ...MEMO 248 GB GB EN USA AE AE D040 ...

Страница 251: ...Copyright 2008 ...

Страница 252: ...Operating Instructions Security Reference Type for MP C2030 Aficio MP C2030 Type for MP C2530 Aficio MP C2530 D040 7762 AE AE ...

Отзывы: