TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................8
Notice................................................................................................................................................................10
Important......................................................................................................................................................10
How to Read This Manual...............................................................................................................................11
Symbols........................................................................................................................................................11
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Laws and Regulations......................................................................................................................................12
Legal Prohibition..........................................................................................................................................12
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Ensuring Information Security.....................................................................................................................18
Enhanced Network Security.......................................................................................................................21
Administrators...................................................................................................................................................23
User Administrator.......................................................................................................................................23
Machine Administrator................................................................................................................................24
Network Administrator................................................................................................................................24
File Administrator.........................................................................................................................................24
Supervisor.....................................................................................................................................................24
Registering the Administrator......................................................................................................................30
Changing the Administrator........................................................................................................................35
1