Table Of Contents - Ricoh Pro C720s Operating Instructions Manual

Hide thumbs Also See for Pro C720s:
Table of Contents

Advertisement

TABLE OF CONTENTS

Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
IP Address.......................................................................................................................................................8
Before Using the Security Functions..................................................................................................................9
Setting Up the Machine...................................................................................................................................10
Enhanced Security............................................................................................................................................12
Glossary............................................................................................................................................................13
Security Measures Provided by this Machine................................................................................................14
Using Authentication and Managing Users...............................................................................................14
Ensuring Information Security.....................................................................................................................14
Limiting and Controlling Access..................................................................................................................15
Enhanced Network Security.......................................................................................................................16
Administrators and Users.................................................................................................................................17
Administrators...............................................................................................................................................17
User...............................................................................................................................................................18
The Management Function..............................................................................................................................20
About Administrator Authentication............................................................................................................20
About User Authentication..........................................................................................................................21
Enabling Authentication...................................................................................................................................23
Authentication Setting Procedure...............................................................................................................23
Administrator Authentication...........................................................................................................................25
Specifying Administrator Privileges............................................................................................................25
Registering the Administrator......................................................................................................................28
Logging on Using Administrator Authentication........................................................................................33
Logging off Using Administrator Authentication........................................................................................35
Changing the Administrator........................................................................................................................36
Using Web Image Monitor.........................................................................................................................38
User Authentication..........................................................................................................................................40
User Code Authentication...............................................................................................................................41
Specifying User Code Authentication........................................................................................................41
3

Advertisement

Table of Contents
loading

Table of Contents