Ricoh C2828 Function Manual page 587

Scanner reference
Hide thumbs Also See for C2828:
Table of Contents

Advertisement

TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................8
Notice................................................................................................................................................................10
Important......................................................................................................................................................10
How to Read This Manual...............................................................................................................................11
Symbols........................................................................................................................................................11
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Laws and Regulations......................................................................................................................................12
Legal Prohibition..........................................................................................................................................12
Before Using the Security Functions................................................................................................................13
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................18
Using Authentication and Managing Users...............................................................................................18
Ensuring Information Security.....................................................................................................................18
Limiting and Controlling Access..................................................................................................................20
Enhanced Network Security.......................................................................................................................21
Administrators...................................................................................................................................................23
User Administrator.......................................................................................................................................23
Machine Administrator................................................................................................................................24
Network Administrator................................................................................................................................24
File Administrator.........................................................................................................................................24
Supervisor.....................................................................................................................................................24
About Administrator Authentication................................................................................................................25
Enabling Administrator Authentication...........................................................................................................27
Specifying Administrator Privileges............................................................................................................27
Registering the Administrator......................................................................................................................30
Logging on Using Administrator Authentication........................................................................................34
Logging off Using Administrator Authentication........................................................................................35
Changing the Administrator........................................................................................................................35
1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents