TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................7
Symbols...........................................................................................................................................................7
IP Address.......................................................................................................................................................7
Setting Up the Machine...................................................................................................................................10
Enhanced Security............................................................................................................................................12
Glossary............................................................................................................................................................13
Ensuring Information Security.....................................................................................................................14
Enhanced Network Security.......................................................................................................................15
Administrators and Users.................................................................................................................................17
Administrators...............................................................................................................................................17
User...............................................................................................................................................................18
The Management Function..............................................................................................................................19
About User Authentication..........................................................................................................................20
Enabling Authentication...................................................................................................................................22
Administrator Authentication...........................................................................................................................24
Registering the Administrator......................................................................................................................27
Changing the Administrator........................................................................................................................35
Using Web Image Monitor.........................................................................................................................37
User Authentication..........................................................................................................................................39
User Code Authentication...............................................................................................................................40
3