Table Of Contents - Aficio C6055 Operating Instructions Manual

Security reference
Table of Contents

Advertisement

TABLE OF CONTENTS

Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................9
Symbols...........................................................................................................................................................9
IP Address.......................................................................................................................................................9
Enhanced Security............................................................................................................................................11
Glossary.......................................................................................................................................................11
Setting Up the Machine...............................................................................................................................12
Security Measures Provided by this Machine................................................................................................15
Using Authentication and Managing Users...............................................................................................15
Ensuring Information Security.....................................................................................................................15
Limiting and Controlling Access..................................................................................................................17
Enhanced Network Security.......................................................................................................................18
Administrators and Users.................................................................................................................................19
Administrators...............................................................................................................................................19
User...............................................................................................................................................................20
The Management Function..............................................................................................................................22
About Administrator Authentication............................................................................................................22
About User Authentication..........................................................................................................................23
Enabling Authentication...................................................................................................................................25
Authentication Setting Procedure...............................................................................................................25
Administrator Authentication...........................................................................................................................27
Specifying Administrator Privileges............................................................................................................27
Registering the Administrator......................................................................................................................30
Logging on Using Administrator Authentication........................................................................................35
Logging off Using Administrator Authentication........................................................................................36
Changing the Administrator........................................................................................................................37
Using Web Image Monitor.........................................................................................................................38
User Authentication..........................................................................................................................................40
User Code Authentication...............................................................................................................................41
Specifying User Code Authentication........................................................................................................41
Basic Authentication.........................................................................................................................................46
3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ld260cLd275cC7570Mp c6000Mp c7500

Table of Contents