TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................9
Symbols...........................................................................................................................................................9
IP Address.......................................................................................................................................................9
Enhanced Security............................................................................................................................................11
Glossary.......................................................................................................................................................11
Setting Up the Machine...............................................................................................................................12
Ensuring Information Security.....................................................................................................................15
Enhanced Network Security.......................................................................................................................18
Administrators and Users.................................................................................................................................19
Administrators...............................................................................................................................................19
User...............................................................................................................................................................20
The Management Function..............................................................................................................................22
About User Authentication..........................................................................................................................23
Enabling Authentication...................................................................................................................................25
Administrator Authentication...........................................................................................................................27
Registering the Administrator......................................................................................................................30
Changing the Administrator........................................................................................................................37
Using Web Image Monitor.........................................................................................................................38
User Authentication..........................................................................................................................................40
User Code Authentication...............................................................................................................................41
Basic Authentication.........................................................................................................................................46
3