Savin 4800WD Operating Manual
Hide thumbs Also See for 4800WD:
Table of Contents

Advertisement

Quick Links

Manuals for This Machine

The following manuals describe the operational procedures of this machine. For
particular functions, see the relevant parts of the manual.
Note
❒ Manuals provided are specific to machine type.
❒ Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as
a PDF file
❒ Two CD-ROMs are provided:
• CD-ROM 1 "Operating Instructions"
• CD-ROM 2 "Scanner Driver and Utilities"
❖ ❖ ❖ ❖ General Settings Guide
Provides an overview of the machine and describes System Settings (such as
Tray Paper Settings), Document Server functions, and troubleshooting.
Refer to this manual for Address Book procedures such as registering e-mail
addresses and user codes.
❖ ❖ ❖ ❖ Security Reference (this manual)
This manual is for administrators of this machine. It describes security func-
tions that the administrators can use to protect data from being tampered, or
prevent the machine from unauthorized use. Also refer to this manual for the
procedures for registering administrators, as well as setting user and admin-
istrator authentication.
❖ ❖ ❖ ❖ Network Guide (PDF file - CD-ROM1)
Provides information about configuring and operating the scanner (Type 480
) in a network environment.
For details about network settings of the scanner (RW480) and printer
(RW480), see the manual that comes with the related option.
❖ ❖ ❖ ❖ Copy Reference
Describes operations, functions, and troubleshooting for the machine's copier
function.
❖ ❖ ❖ ❖ Scanner Reference (Scanner Unite Type 480) (PDF file - CD-ROM1)
Describes operations, functions, and troubleshooting for the machine's scan-
ner function.
i

Advertisement

Table of Contents
loading

Summary of Contents for Savin 4800WD

  • Page 1: Manuals For This Machine

    Manuals for This Machine The following manuals describe the operational procedures of this machine. For particular functions, see the relevant parts of the manual. Note ❒ Manuals provided are specific to machine type. ❒ Adobe Acrobat Reader / Adobe Reader is necessary to view the manuals as a PDF file ❒...
  • Page 2 ❖ ❖ ❖ ❖ Manuals for DeskTopBinder Lite DeskTopBinder Lite is a utility included on the CD-ROM labeled “Scanner Driver and Utilities”. • DeskTopBinder Lite Setup Guide (PDF file - CD-ROM2) Describes installation of, and the operating environment for DeskTop- Binder Lite in detail.
  • Page 3: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 1. Getting Started Enhanced Security....................3 Glossary ........................4 Security Measures Provided by this Machine.............5 Preventing Information Leaks ..................5 Preventing Unauthorized Operation ................6 Enhanced Network Security..................7 2.
  • Page 4 5. Management Based on Authentication and Access Control The Management Function ................. 47 Administrators and Users ................... 48 Administrator ......................48 User.......................... 49 Enabling Authentication..................50 Administrator Authentication ..................50 User Authentication....................51 Authentication Information Stored in the Address Book......... 59 Specifying Authentication Information to Log on............
  • Page 5 8. Appendix Operations by the Supervisor................87 Logging on as the Supervisor .................. 87 Logging off as the Supervisor .................. 88 Changing the Supervisor..................88 Resetting an Administrator’s Password ..............89 Machine Administrator Settings................. 91 System Settings ....................... 91 Copier/Document Server Features ................93 Scanner Features.....................
  • Page 7: How To Read This Manual

    How to Read This Manual Symbols The following set of symbols is used in this manual. R WARNING: This symbol indicates a potentially hazardous situation that might result in death or serious injury when you misuse the machine without following the in- structions under this symbol.
  • Page 9: Getting Started

    1. Getting Started Enhanced Security This machine's security function can be enhanced through the management of the machine and its users using the improved authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
  • Page 10: Glossary

    Getting Started Glossary ❖ ❖ ❖ ❖ Administrator Administrators manage a specific area of machine usage, such as settings or user registration. There are four types of administrator: user administrator, network adminis- trator, machine administrator, and file administrator. One person can act as more than one type of administrator.
  • Page 11: Security Measures Provided By This Machine

    Security Measures Provided by this Machine Security Measures Provided by this Machine Preventing Information Leaks ❖ ❖ ❖ ❖ Protecting Stored Files from Unauthorized Access You can specify who is allowed to use and access scanned files and the files in Document Server.
  • Page 12: Preventing Unauthorized Operation

    Getting Started ❖ ❖ ❖ ❖ Overwriting the Data on the Hard Disk You can overwrite data on the hard disk. Reference For details, see p.22 “Overwriting the Data on the Hard Disk”. Preventing Unauthorized Operation ❖ ❖ ❖ ❖ Preventing Modification or Deletion of Stored Data You can specify who is allowed to access stored scan files and files stored in Document Server.
  • Page 13: Enhanced Network Security

    Security Measures Provided by this Machine Enhanced Network Security ❖ ❖ ❖ ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set- tings.
  • Page 14 Getting Started...
  • Page 15: Preventing Information Leaks

    2. Preventing Information Leaks Specifying Access Permission for Stored Files You can specify who is allowed to access stored scan files and files stored in the Document Server. You can prevent activities such as the sending of stored files by unauthorized users. ❖...
  • Page 16: Assigning Users And Access Permission For Stored Files

    Preventing Information Leaks Assigning Users and Access Permission for Stored Files This can be specified by the file creator (owner) or file administrator. Specify the users and their access permissions for each stored file. By making this setting, only users granted access permission can access stored files.
  • Page 17: Assigning The User And The Access Permission For The User's Stored Files

    Specifying Access Permission for Stored Files G G G G Select the users or groups you want to assign permission to. You can select more than one users. By pressing [All Users], you can select all the users. H H H H Press [Exit].
  • Page 18 Preventing Information Leaks A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [System Settings]. C C C C Press [Administrator Tools]. D D D D Press [Address Book Management]. If it does not appear, press [T T T T Next].
  • Page 19 Specifying Access Permission for Stored Files I I I I Select the users or groups to register. You can select more than one users. By pressing [All Users], you can select all the users. J J J J Press [Exit]. K K K K Select the user who you want to assign an access permission to, and then select the permission.
  • Page 20: Specifying Passwords For The Stored Files

    Preventing Information Leaks Specifying Passwords for the Stored Files This can be specified by the file creator (owner) or file administrator. Specify passwords for the stored files. Provides increased protection against unauthorized use of files. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 21: Unlocking Files

    Specifying Access Permission for Stored Files Unlocking Files If you specify “Enhance File Protection”, the file will be locked and become in- accessible if an invalid password is entered ten times. This section explains how to unlock files. Only the file administrator can unlock files. For details about “Enhance File Protection”, see p.76 “Specifying the Extended Security Functions”.
  • Page 22: Preventing Data Leaks Due To Unauthorized Transmission

    Preventing Information Leaks Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on can be designated as the sender to prevent unauthorized access. You can also limit the direct entry of destinations to prevent files from being sent to destinations not registered in the address book.
  • Page 23 Preventing Data Leaks Due to Unauthorized Transmission E E E E Press [On] for “Restrict Use of Destinations”. Note ❒ If you set “Restrict Use of Destinations” to [Off], “Permit Adding of Desti- nations” appears. ❒ If you set “Permit Adding of Destinations” to [On], the user can register destinations by entering them directly.
  • Page 24: Protecting The Address Book

    Preventing Information Leaks Protecting the Address Book You can specify who is allowed to access the data in the address book. By mak- ing this setting, you can prevent the data in the address book being used by un- registered users. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
  • Page 25 Protecting the Address Book E E E E Select the user or group. F F F F Press [Protection]. G G G G Under "Protect Destination", press [Program/Change/Delete] for "Permissions for Users/Groups". H H H H Press [New Program]. I I I I Select the users or groups to register.
  • Page 26: Encrypting The Data In The Address Book

    Preventing Information Leaks M M M M Press [OK]. N N N N Press [Exit]. O O O O Press the { { { { User Tools/Counter} } } } key. Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book.
  • Page 27 Protecting the Address Book C C C C Press [Administrator Tools]. D D D D Press [Extended Security]. E E E E Press [On] for “Encrypt Address Book”. F F F F Press [Change] for [Encryption Key]. G G G G Enter the encryption key, and then press [OK].
  • Page 28: Overwriting The Data On The Hard Disk

    Preventing Information Leaks Overwriting the Data on the Hard Disk To use this function, the optional DataOverwriteSecurity unit must be installed. You can overwrite data on the hard disk. Note ❒ Depending on the hard disk capacity and the method of erasing the data, this action may take a few hours.
  • Page 29 Overwriting the Data on the Hard Disk Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”. For details about logging off with administrator authentication, see p.74 “Logging off Using Administrator Authentication”. A A A A Press the { { { { User Tools/Counter} } } } key.
  • Page 30 Preventing Information Leaks Note ❒ Should the main power switch of the machine be turned off before over- writing is completed, the temporary data will remain on the hard disk un- til the main power switch is next turned on and overwriting is resumed. ❒...
  • Page 31: Erase All Memory

    Overwriting the Data on the Hard Disk “Erase All Memory” This can be specified by the machine administrator. You can erase all the data on the hard disk by writing over it. This is useful if you relocate or dispose of your machine. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 32 Preventing Information Leaks F F F F Select the method of erasing the data. Select the method of erasing the data from [NSA], [DoD], or [Random Numbers]. When you select “Random Numbers” A Press [Change]. B Enter the number of times that you want to overwrite using the number keys, and then press [#].
  • Page 33: Preventing Unauthorized Use Of Functions And Settings

    3. Preventing Unauthorized Use of Functions and Settings Preventing Modification of Machine Settings The machine settings that can be modified depend on the type of administrator. Users cannot change the administrator settings. Register the administrators before using the machine. ❖ ❖ ❖ ❖ Type of Administrator Register the administrator on the machine, and then authenticate the admin- istrator using the administrator’s login user name and login password.
  • Page 34: Limiting Available Functions

    Preventing Unauthorized Use of Functions and Settings Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ ❖ ❖ ❖ Available Functions Specify the available functions from the copier, Document Server, and scan- ner functions.
  • Page 35 Limiting Available Functions F F F F Press [Auth. Info]. G G G G In [Available Functions], select the functions you want to specify. If the setting to be specified does not appear, press [T T T T Next]. H H H H Press [OK].
  • Page 36 Preventing Unauthorized Use of Functions and Settings...
  • Page 37: Enhanced Network Security

    4. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator. Specify whether to enable or disable the function for each protocol.
  • Page 38: Access Control

    Enhanced Network Security E E E E Press [Invalid] for the protocol you want to disable. F F F F Press [OK]. G G G G Press the { { { { User Tools/Counter} } } } key. Reference Advanced network settings can be specified using Web Image Monitor. For details, see the Web Image Monitor Help.
  • Page 39 Preventing Unauthorized Access F F F F Click [Apply]. Access control is set. G G G G Log off from the machine. Reference For details, see the Web Image Monitor Help.
  • Page 40: Encrypting Transmitted Passwords

    Enhanced Network Security Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user au- thentication. ❖ ❖ ❖ ❖ Driver Encryption Key To encrypt the login password, specify the driver encryption key for the driv- er used for the machine and the user’s computer.
  • Page 41 Encrypting Transmitted Passwords C C C C Press [Administrator Tools]. D D D D Press [Extended Security]. E E E E For [Driver Encryption Key], press [Change]. F F F F Enter the driver encryption key, and then press [OK]. Enter the driver encryption key using up to 32 alphanumeric characters.
  • Page 42: Ipp Authentication Password

    Enhanced Network Security IPP Authentication Password This can be specified by the network administrator. Specify the IPP authentication passwords for the machine using Web Image Monitor. By making this setting, you can encrypt IPP authentication passwords for trans- mission to prevent them from being analyzed. A A A A Open a Web browser.
  • Page 43: Protection Using Encryption

    Protection Using Encryption Protection Using Encryption When you access the machine using a Web browser or IPP, you can establish en- crypted communication using SSL. When you access the machine using an ap- plication such as SmartDeviceMonitor for Admin, you can establish encrypted communication using SNMPv3 or SSL.
  • Page 44: Ssl (Secure Sockets Layer) Encryption

    Enhanced Network Security SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator. To protect the communication path and establish encrypted communication, create and install the server certificate. There are two ways of installing a server certificate: create and install a self-cer- tificate using the machine, or request a certificate from a certificate authority and install it.
  • Page 45 Protection Using Encryption D D D D Click [Configuration], click [Security], and then click [Certificates]. E E E E Click [Create]. F F F F Make the necessary settings. Reference For details about the displayed items and selectable items, see Web Image Monitor Help.
  • Page 46 Enhanced Network Security G G G G Click [OK]. [Requesting] appears for [Certificate Status] in the [Certificates] area. Use the data in the [Certificate Request Contents:] dialog box to apply to the cer- tificate authority. H H H H Log off from the machine. I I I I Apply to the certificate authority for the server certificate.
  • Page 47 Protection Using Encryption G G G G Click [OK]. [Installed] appears under [Certificate Status] to show that a server certificate for the machine has been installed. H H H H Log off from the machine. Enabling SSL After installing the server certificate in the machine, enable the SSL setting. This procedure is used for a self-signed certificate or a certificate issued by a cer- tificate authority.
  • Page 48: User Settings For Ssl (Secure Sockets Layer)

    Enhanced Network Security User Settings for SSL (Secure Sockets Layer) If you have installed a server certificate and enabled SSL (Secure Sockets Layer), you need to install the certificate on the user’s computer. The network administrator must explain the procedure for installing the certifi- cate to users.
  • Page 49 Protection Using Encryption Setting the SSL / TLS Encryption Mode This can be specified by the network administrator or machine administrator. After installing the server certificate, specify the SSL/TLS encrypted communi- cation mode. By making this setting, you can change the security level. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 50: Snmpv3 Encryption

    Enhanced Network Security SNMPv3 Encryption This can be specified by the network administrator. When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Preparation For details about logging on with administrator authentication, see p.73 “Logging on Using Administrator Authentication”.
  • Page 51 Protection Using Encryption Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for speci- fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMP V3 Communication] on the machine.
  • Page 52 Enhanced Network Security...
  • Page 53: Management Based On Authentication And Access Control

    5. Management Based on Authentication and Access Control The Management Function The machine has an authentication function requiring a login user name and login password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you can not only limit the machine’s available functions but also protect the machine settings and files and data stored in the machine.
  • Page 54: Administrators And Users

    Management Based on Authentication and Access Control Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access.
  • Page 55: User

    Administrators and Users User Users are managed using the personal information registered in the machine’s address book. By enabling user authentication, you can allow only people registered in the ad- dress book to use the machine. Users can be registered in the address book by the user administrator or registered user.
  • Page 56: Enabling Authentication

    Management Based on Authentication and Access Control Enabling Authentication To control administrators’ and users’ access to the machine, perform administra- tor authentication and user authentication using login user names and login passwords. To perform authentication, the authentication function must be en- abled.
  • Page 57: User Authentication

    Enabling Authentication F F F F Set "Admin. Authentication" to [On]. [Available Settings] appears. G G G G Select the settings to manage from "Available Settings". Note ❒ To specify administrator authentication for more than one category, repeat steps H H H H Press [OK].
  • Page 58 Management Based on Authentication and Access Control User Code Authentication This is an authentication method for limiting access to functions according to the user code. The same user code can be used by more than one user. For details about specifying user codes, see General Settings Guide. Limitation ❒...
  • Page 59 Enabling Authentication G G G G Press [OK]. H H H H Press the { { { { User Tools/Counter} } } } key. Basic Authentication Specify this authentication when using the machine’s address book to authenti- cate for each user. Using basic authentication, you can not only manage the ma- chine’s available functions but also limit access to stored files and to the personal data in the address book.
  • Page 60 Management Based on Authentication and Access Control Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis- tered in the directory server.
  • Page 61 Enabling Authentication Specifying Windows Authentication Note ❒ Under Windows authentication, the machine and domain controller commu- nicate using SSL, so you need to create a server certificate for the domain con- troller. For details about creating the certificate, see p.56 “Creating the Server Certificate”.
  • Page 62: Creating The Server Certificate

    Management Based on Authentication and Access Control You also need to register in the machine the functions available to the global group members. If global groups are not specified, users can use the available functions spec- ified in [Default Group]. If global groups are specified, users not registered in global groups can use the available functions specified in [Default Group].
  • Page 63 Enabling Authentication LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be downloaded to the machine, enabling user authentica- tion without first using the machine to register individual settings in the address book.
  • Page 64 Management Based on Authentication and Access Control E E E E Select [LDAP Authentication]. Note ❒ If you do not want to use user authentication management, select [Off]. F F F F Select the LDAP server to be used for LDAP authentication. G G G G Enter the login name attribute in the [Login Name Attribute] box.
  • Page 65: Authentication Information Stored In The Address Book

    Authentication Information Stored in the Address Book Authentication Information Stored in the Address Book In [User Authentication Management], specify the login user name and password. The login user name and password specified in [User Authentication Management] can be used as the login information for “SMTP Authentication”, “Folder Au- thentication”, and “LDAP Authentication”.
  • Page 66 Management Based on Authentication and Access Control F F F F Press [Auth. Info]. G G G G Specify the login user name and password. H H H H In “Available Functions”, select the functions available to the user. Reference For details about limiting available functions, see p.28 “Limiting Available Functions”.
  • Page 67: If User Authentication Has Been Specified

    If User Authentication Has Been Specified If User Authentication Has Been Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, or LDAP Authentication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, opera- tions are not possible with the machine.
  • Page 68: Log Off (Using The Control Panel)

    Management Based on Authentication and Access Control E E E E Press [Login]. When the user is authenticated, the screen for the function you are using ap- pears. Log Off (Using the Control Panel) Follow the procedure below to log off when Basic Authentication, Windows Au- thentication, or LDAP Authentication is set.
  • Page 69: Auto Logout

    If User Authentication Has Been Specified Auto Logout When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called “Auto Logout”. Specify how long the machine is to wait before perform- ing Auto Logout.
  • Page 70: Menu Protect

    Management Based on Authentication and Access Control Menu Protect The administrator can also limit users’ access permission to the machine’s set- tings. The machine’s System Settings menu can be locked so they cannot be changed. This function is also effective when management is not based on user authentication.
  • Page 71 Menu Protect F F F F Press the { { { { User Tools/Counter} } } } key. Scanner Functions Note ❒ To specify [Menu Protect] in [Scanner Features], set [Machine Management] to [On] in [Administrator Authentication Management] in [Administrator Tools] in [System Settings].
  • Page 72 Management Based on Authentication and Access Control...
  • Page 73: Specifying The Administrator/Security Functions

    6. Specifying the Administrator/Security Functions The Roles of Administrators By limiting the functions available to each user, you can protect the data in the machine from leaks and from being tampered with or deleted. The administra- tors each manage the access limits to the functions they are responsible for. There are four types of administrator, as shown below.
  • Page 74 Specifying the Administrator/Security Functions ❖ ❖ ❖ ❖ User Administrator This is the administrator who manages personal information in the address book. A user administrator can register/delete users in the address book or change users’ personal information. Users registered in the address book can also change and delete their own in- formation.
  • Page 75: Administrator Authentication

    Administrator Authentication Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name and login password already registered in the address book. Windows Authentica- tion and LDAP Authentication are not performed for an administrator, so an ad- ministrator can log on even if the server is unreachable because of a network problem.
  • Page 76: Administrator Authentication

    Specifying the Administrator/Security Functions Administrator Authentication To specify administrator authentication, set Administrator Authentication Man- agement to [On]. You can also specify whether or not to manage the items in Sys- tem Settings as an administrator. If you have not registered any administrator, you can obtain each administra- tor’s authority with the “Administrator 1”...
  • Page 77 Administrator Authentication Specifying Machine Management Authentication A Press [Machine Management], and then press [On]. B Press the item for which you want to specify management. Specifying Network Management Authentication A Press [Network Management], and then press [On]. B Press the item for which you want to specify management. Specifying File Management Authentication A Press [File Management], and then press [On].
  • Page 78: Registering The Administrator

    Specifying the Administrator/Security Functions Registering the Administrator To specify the administrators separately when only “Administrator 1” has been specified, log on using the “Administrator 1” login user name and login pass- word. To register an administrator, you need to specify the authority of one of the administrators.
  • Page 79: Logging On Using Administrator Authentication

    Administrator Authentication G G G G Enter the login user name, and then press [OK]. H H H H Press [Change] for the login password. I I I I Enter the login password, and then press [OK]. J J J J If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 80: Logging Off Using Administrator Authentication

    Specifying the Administrator/Security Functions A A A A Press the { { { { User Tools/Counter} } } } key. B B B B Press [Login]. C C C C Press [Enter] next to “Login User Name”. D D D D Enter the login user name, and then press [OK].
  • Page 81: Changing The Administrator

    Administrator Authentication Changing the Administrator Change the administrator’s login user name and login password. You can also assign each administrator’s authority to the login user names “Administrator 1” to “Administrator 4” To combine the authorities of multiple administrators, as- sign multiple administrators to a single administrator. For example, to assign machine administrator authority and user administrator authority to [Administrator 1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
  • Page 82: Specifying The Extended Security Functions

    Specifying the Administrator/Security Functions Specifying the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in- stance, encrypting transmitted data and data in the address book. If you need ex- tended security, specify the machine’s extended security functions before using the machine.
  • Page 83: Settings

    Specifying the Extended Security Functions F F F F Press [OK]. G G G G Press the { { { { User Tools/Counter} } } } key. Settings ❖ ❖ ❖ ❖ Driver Encryption Key This can be specified by the network administrator. Encrypt the password transmitted when specifying user authentication.
  • Page 84 Specifying the Administrator/Security Functions ❖ ❖ ❖ ❖ Permit Adding of Destinations This can be specified by the user administrator. When “Restrict Use of Destinations” is set to [Off]. After directly entering a scanner destination, you can register it in the address book by pressing [ProgDest].
  • Page 85 Specifying the Extended Security Functions ❖ ❖ ❖ ❖ Permit Settings by SNMP V1 and V2 This can be specified by the network administrator. When the machine is ac- cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed.
  • Page 86: Limiting Machine Operation To Customers Only

    Specifying the Administrator/Security Functions Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator au- thentication. The machine can be set to prohibit operation without administrator authentica- tion and also prohibit remote registration in the address book by a service rep- resentative.
  • Page 87 Limiting Machine Operation to Customers Only D D D D Press [Service Mode Lock]. E E E E Press [On] and then [OK]. A confirmation message appears. F F F F Press [Yes]. G G G G Press the { { { { User Tools/Counter} } } } key. Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the ma- chine administrator must log onto the machine and cancel the service mode lock.
  • Page 88 Specifying the Administrator/Security Functions...
  • Page 89: Troubleshooting

    7. Troubleshooting Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 90 Troubleshooting Messages Causes Solutions The entered login user name Inquire the user administrator Authentication has or login password is not cor- for the correct login user name failed. rect and login password. The number of users regis- Delete unnecessary user ad- tered in the address book has dresses.
  • Page 91: Machine Cannot Be Operated

    Authentication Does Not Work Properly Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cause Solution Cannot connect using the The encryption key specified Specify the driver encryption TWAIN driver.
  • Page 92 Troubleshooting Condition Cause Solution Cannot access the machine us- ScanRouter EX Professional V2 does not support user authen- ing ScanRouter EX Profes- tication. sional V2. [ProgDest] does not appear on [Permit Adding of Destinations] is Registration must be done by the scanner’s screen for speci- set to [Off] in [Restrict Use of the user administrator.
  • Page 93: Appendix

    8. Appendix Operations by the Supervisor The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super- visor’s user name and password, you cannot use normal functions or specify de- faults.
  • Page 94: Logging Off As The Supervisor

    Appendix D D D D Enter a login user name, and then press [OK]. Note ❒ When you assign the administrator for the first time, enter “supervisor”. E E E E Press [Enter] for [Login Password]. F F F F Enter a login password, and then press [OK].
  • Page 95: Resetting An Administrator's Password

    Operations by the Supervisor E E E E Under “Supervisor”, click [Change]. F F F F Press [Change] for the login user name. G G G G Enter the login user name, and then press [OK]. H H H H Press [Change] for the login password.
  • Page 96 Appendix G G G G Press [Change] for the administrator you wish to reset. H H H H Press [Change] for the login password. I I I I Enter the login password, and then press [OK]. J J J J If a password reentry screen appears, enter the login password, and then press [OK].
  • Page 97: Machine Administrator Settings

    Machine Administrator Settings Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ General Features All the settings can be specified. ❖ ❖ ❖ ❖ Tray Paper Settings All the settings can be specified.
  • Page 98 Appendix ❖ ❖ ❖ ❖ Administrator Tools • User Authentication Management You can specify which authentication to use. You can also edit the settings for each function. • Administrator Authentication Management Machine Management • Program / Change Administrator Machine Administrator You can change the user name and the full-control user’s authority.
  • Page 99: Copier/Document Server Features

    Machine Administrator Settings Copier/Document Server Features The following settings can be specified. ❖ ❖ ❖ ❖ General Features All the settings can be specified. ❖ ❖ ❖ ❖ Reproduction Ratio All the settings can be specified. ❖ ❖ ❖ ❖ Edit All the settings can be specified.
  • Page 100: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ ❖ ❖ ❖ Top Page • Reset Device ❖ ❖ ❖ ❖ Device Settings • System Device Name Output Tray Paper Tray Priority • Paper All the settings can be specified. •...
  • Page 101: Settings Via Smartdevicemonitor For Admin

    Machine Administrator Settings Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ ❖ ❖ ❖ Device Information • Reset Device • Reset Current Job • Reset All Jobs ❖ ❖ ❖ ❖ User Management Tool The following settings can be specified. •...
  • Page 102: Network Administrator Settings

    Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ Interface Settings • Network All the settings can be specified. • IEEE 1394 All the settings can be specified.
  • Page 103: Scanner Features

    Network Administrator Settings Scanner Features The following settings can be specified. ❖ ❖ ❖ ❖ Send Settings • Max. E-mail Size • Divide & Send E-mail Settings via Web Image Monitor The following settings can be specified. ❖ ❖ ❖ ❖ Device Settings •...
  • Page 104 Appendix The IEEE802.11b interface unit option must be installed. The IEEE1394 interface board option must be installed. ❖ ❖ ❖ ❖ Network • Protocol All the settings can be specified. • TCP/IP All the settings can be specified. • NetWare All the settings can be specified.
  • Page 105: Settings Via Smartdevicemonitor For Admin

    Network Administrator Settings Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ ❖ ❖ ❖ NIB Setup Tool All the settings can be specified.
  • Page 106: File Administrator Settings

    Appendix File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ Administrator Tools • Administrator Authentication Management File Management • Program / Change Administrator File Administrator •...
  • Page 107: User Administrator Settings

    User Administrator Settings User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ ❖ ❖ ❖ Administrator Tools • Administrator Authentication Management User Management • Program / Change Administrator User Administrator •...
  • Page 108: Settings Via Smartdevicemonitor For Admin

    Appendix Settings via SmartDeviceMonitor for Admin The following settings can be specified. ❖ ❖ ❖ ❖ Address Management Tool All the settings can be specified. ❖ ❖ ❖ ❖ User Management Tool • Restrict Access To Device • Add New User •...
  • Page 109: The Available Functions For Using The Files Stored In Document Server

    The Available Functions for Using the Files Stored in Document Server The Available Functions for Using the Files Stored in Document Server The authorities for using the files stored in Document Server are as follows: The authority designations in the list indicate users with the following authori- ties.
  • Page 110: Settings That Can Be Specified In The Address Book

    Appendix Settings That Can Be Specified In the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned “Read-only” authority. •...
  • Page 111 The Available Functions for Using the Files Stored in Document Server Settings User User Ad- Registered Full Con- ministra- User trol Read- Edit Edit / De- only lete ❍ ❍ ❍ ❍ ❍ Registration No. ❍ ❍ ❍ ❍ ❍ Key Display ❍...
  • Page 112 Appendix Settings User User Ad- Registered Full Con- ministra- User trol Read- Edit Edit / De- only lete ❍ ❍ ❍ ❍ Folder SMB/FTP Destina- ❍ ❍ ❍ ❍ SMB: Path tion FTP: ❍ ❍ ❍ ❍ Server Name ❍ ❍...
  • Page 113: User Settings

    User Settings User Settings If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. ❍ =You can view and change the setting. U =You can view the setting.
  • Page 114 Appendix Tab Names Settings Menu Protect Level 1 Level 2 ❍ ❍ Stamp Back- Size ground Density Num- ❍ ❍ bering ❍ ❍ Preset Stamp Position: COPY Stamp ❍ ❍ Stamp Position: URGENT ❍ ❍ Stamp Position: PRIORITY ❍ ❍ Stamp Position: For Your Info.
  • Page 115: Scanner Features

    User Settings Tab Names Settings Menu Protect Level 1 Level 2 ❍ ❍ Stamp Page Stamp Format Num- ❍ ❍ Font bering ❍ ❍ Size ❍ ❍ Page Numbering in Combine ❍ ❍ Stamp Position: P1, P2… ❍ ❍ Stamp Position: 1/5, 2/5… ❍...
  • Page 116: System Settings

    Appendix System Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Tab Names Settings Admin-...
  • Page 117 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication “Availa- has not “Availa- ble Set- been ble Set- tings” speci- tings” has not fied. has been been speci- speci- fied. fied. ❍ ❍ Inter- Network IP Address face ❍...
  • Page 118 Appendix Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication “Availa- has not “Availa- ble Set- been ble Set- tings” speci- tings” has not fied. has been been speci- speci- fied. fied. ❍ ❍ Inter- IEEE Communication Mode face 802.11b...
  • Page 119 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication “Availa- has not “Availa- ble Set- been ble Set- tings” speci- tings” has not fied. has been been speci- speci- fied. fied. ❍ ❍ Administrator User Authentication Management Tools ❍...
  • Page 120: Web Image Monitor Setting

    Appendix Web Image Monitor Setting ❖ ❖ ❖ ❖ Device Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Admin-...
  • Page 121 User Settings Category Settings Admin- Administrator istrator authentication authen- has been speci- tication fied. has not “Avail “Avail been able able speci- Set- Set- fied. tings” tings” has not been been speci- speci- fied. fied. ❍ ❍ E-mail Administrator E-mail Address ❍...
  • Page 122 Appendix ❖ ❖ ❖ ❖ Interface The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Admin-...
  • Page 123 User Settings ❖ ❖ ❖ ❖ Network The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not “Available Settings” has been specified. Category Settings Admin-...
  • Page 124 Appendix Category Settings Admin- Administrator istrator authentication authen- has been speci- tication fied. has not “Avail “Avail been able able speci- Set- Set- fied. tings” tings” has not been been speci- speci- fied. fied. ❍ ❍ TCP/IP Host Name ❍ ❍...
  • Page 125 User Settings Category Settings Admin- Administrator istrator authentication authen- has been speci- tication fied. has not “Avail “Avail been able able speci- Set- Set- fied. tings” tings” has not been been speci- speci- fied. fied. ❍ ❍ NetWare NetWare ❍ ❍...
  • Page 126: Functions That Require Options

    Appendix Functions That Require Options The following functions require certain options and additional functions. • Hard Disk overwrite erases function DataOverwriteSecurity unit • Data Encryption Scanner option...
  • Page 127: Index

    INDEX Access Control , 32 Input / Output , 93 Access Permission , 9 Interface , 116 Address Book , 101 Interface Settings , 91 , 96 , 97 Address Management Tool , 102 Administrator , 4 Administrator Authentication , 4 Login , 4 Administrator Tools , 92 , 93 , 96 , 100 , 101 Logout , 4...
  • Page 128 Scan Settings , 93 Security , 98 Send Settings , 93 , 97 Service Mode Lock , 80 SMB , 98 SNMP , 98 SNMPv3 , 98 SSL (Secure Sockets Layer) , 37 Stamp , 93 Supervisor , 67 , 68 System Settings , 96 TCP/IP , 98 Timer Settings , 91...

Table of Contents