Ricoh C2828 Function Manual page 918

Scanner reference
Hide thumbs Also See for C2828:
Table of Contents

Advertisement

LDAP Authentication..............................................
LDAP Authentication - Operational Requirements
for LDAP Authentication........................................
Locked Print............................................................
Log off (Administrator)..........................................
Log on (Administrator)..........................................
Login.......................................................................
Logout.....................................................................
M
Machine Administrator.........................................
Machine Administrator Settings.........................
Menu Protect...............................................
N
Network Administrator..........................................
Network Security Level.......................................
O
Operational Issues..............................................
Overwriting Data on the Hard Disk...................
Owner..................................................................
P
Password for Stored Files...................................
Password Policy...................................................
Print & Delete Scanner Journal...........................
Printer...................................................................
Printer Job Authentication.....................................
Printer Job Authentication Levels..........................
Printer Job Types....................................................
Printing the Encryption Key.................................
R
Read-only....................................................
Registered User.............................................
Registering the Administrator................................
Remote Service....................................................
Restrict Adding of User Destinations..................
Restrict Display of User Information...................
Restrict Use of Destinations.................................
Restrict Use of Simple Encryption.......................
Restrictions on Destinations................................
332
65
S
S/MIME..............................................................
65
Scanner................................................................
97
Scanner Features.................................................
35
Security Functions................................................
34
Self-Signed Certificate........................................
17
Service Mode Lock.............................................
17
Settings by SNMP v1 and v2.............................
SNMPv3..............................................................
24
SSL........................................................................
253
SSL (Secure Sockets Layer)................................
143, 145
SSL / TLS Encryption...........................................
Stored RX File User Setting.................................
Supervisor......................................................
24
Symbols..................................................................
264
System Settings....................................................
165
T
telnet.....................................................................
244
Transfer Log Setting.............................................
135
Transfer to Fax Receiver.....................................
273
Transmitted Passwords........................................
Type of Administrator..........................................
103
U
213
Unauthorized Copy Prevention............................
215
310
User..................................................................
285
User Administrator...............................................
80
80
81
User Code Authentication.....................................
131
User Lockout Function...........................................
273, 275
..............................................................................
17, 275
W
30
213
Webpage............................................................
211
Windows Authentication.......................................
211
Windows
Requirements for Kerberos...................................
210
Windows
212
Requirements for NTLM Authentication...............
115
17, 38, 41, 83
Authentication
-
Authentication
-
117
314
290
215
175
217
211
181
178
174
179
215
24, 249
11
295
206
152
212
169
143
91
213
17, 37
275
271
42
85
278
302
325
53
Operational
53
Operational
53

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents