Table Of Contents - Ricoh Aficio MP W5100 Operating Instructions Manual

Security reference
Hide thumbs Also See for Aficio MP W5100:
Table of Contents

Advertisement

TABLE OF CONTENTS

Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................9
Symbols...........................................................................................................................................................9
IP Address.......................................................................................................................................................9
Before Using the Security Functions................................................................................................................11
Setting Up the Machine...................................................................................................................................12
Enhanced Security............................................................................................................................................14
Glossary............................................................................................................................................................15
Security Measures Provided by this Machine................................................................................................16
Using Authentication and Managing Users...............................................................................................16
Ensuring Information Security.....................................................................................................................16
Limiting and Controlling Access..................................................................................................................18
Enhanced Network Security.......................................................................................................................18
Administrators and Users.................................................................................................................................21
Administrators...............................................................................................................................................21
User...............................................................................................................................................................22
The Management Function..............................................................................................................................24
About Administrator Authentication............................................................................................................24
About User Authentication..........................................................................................................................25
Enabling Authentication...................................................................................................................................27
Authentication Setting Procedure...............................................................................................................27
Administrator Authentication...........................................................................................................................29
Specifying Administrator Privileges............................................................................................................29
Registering the Administrator......................................................................................................................32
Logging on Using Administrator Authentication........................................................................................37
Logging off Using Administrator Authentication........................................................................................39
Changing the Administrator........................................................................................................................40
Using Web Image Monitor.........................................................................................................................42
Using Web Printing Tool.............................................................................................................................43
User Authentication..........................................................................................................................................44
User Code Authentication...............................................................................................................................45
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents