Table Of Contents - Ricoh PRO C900 Operating Instructions Manual

Security reference
Hide thumbs Also See for PRO C900:
Table of Contents

Advertisement

TABLE OF CONTENTS

Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................7
Symbols...........................................................................................................................................................7
IP Address.......................................................................................................................................................7
Before Using the Security Functions..................................................................................................................9
Setting Up the Machine...................................................................................................................................10
Enhanced Security............................................................................................................................................12
Glossary............................................................................................................................................................13
Security Measures Provided by this Machine................................................................................................14
Using Authentication and Managing Users...............................................................................................14
Ensuring Information Security.....................................................................................................................14
Limiting and Controlling Access..................................................................................................................15
Enhanced Network Security.......................................................................................................................15
Administrators and Users.................................................................................................................................17
Administrators...............................................................................................................................................17
User...............................................................................................................................................................18
The Management Function..............................................................................................................................19
About Administrator Authentication............................................................................................................19
About User Authentication..........................................................................................................................20
Enabling Authentication...................................................................................................................................22
Authentication Setting Procedure...............................................................................................................22
Administrator Authentication...........................................................................................................................24
Specifying Administrator Privileges............................................................................................................24
Registering the Administrator......................................................................................................................27
Logging on Using Administrator Authentication........................................................................................32
Logging off Using Administrator Authentication........................................................................................34
Changing the Administrator........................................................................................................................35
Using Web Image Monitor.........................................................................................................................37
User Authentication..........................................................................................................................................39
User Code Authentication...............................................................................................................................40
Specifying User Code Authentication........................................................................................................40
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents