Ricoh PG-C2 Operating Instructions Manual page 4

Table of Contents

Advertisement

❖ Security Reference
This manual is for administrators of the machine. It explains security func-
tions that you can use to prevent unauthorized use of the machine, data tam-
pering, or information leakage. For enhanced security, we recommend that
you first make the following settings:
• Install the Device Certificate.
• Enable SSL (Secure Sockets Layer) Encryption.
• Change the user name and password of the administrator using Web Im-
age Monitor.
For details, see "Setting Up the Machine", Security Reference.
Be sure to read this manual when setting the enhanced security functions, or
user and administrator authentication.
❖ PostScript 3 Supplement
Explains how to set up and use PostScript 3.
❖ UNIX Supplement
For "UNIX Supplement", please visit our Web site or consult an authorized
dealer.
This manual includes descriptions of functions and settings that might not be
available on this machine.
❖ Other manuals
• Quick Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
Note
❒ Manuals provided are specific to machine types.
❒ The following software products are referred to using general names:
DeskTopBinder Lite and DeskTopBinder Professional
ScanRouter EX Professional
*1
prise
*1
Optional
ii
Product name
*1
and ScanRouter EX Enter-
General name
DeskTopBinder
*1
the ScanRouter delivery software

Advertisement

Table of Contents
loading

This manual is also suitable for:

D045Aficio mp c1800Pegasus-c2Ld318cgSgc 1808Mp c1800

Table of Contents