TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................8
Notice................................................................................................................................................................11
Important......................................................................................................................................................11
How to Read This Manual...............................................................................................................................12
Symbols........................................................................................................................................................12
IP Address.....................................................................................................................................................12
Notes............................................................................................................................................................12
1. Getting Started
Before Using the Security Functions................................................................................................................13
Setting up the Machine....................................................................................................................................14
Enhanced Security............................................................................................................................................17
Glossary............................................................................................................................................................18
Security Measures Provided by this Machine................................................................................................20
Using Authentication and Managing Users...............................................................................................20
Ensuring Information Security.....................................................................................................................20
Limiting and Controlling Access..................................................................................................................22
Enhancing Network Security......................................................................................................................23
2. Configuring Administrator Authentication
Administrators...................................................................................................................................................25
User Administrator.......................................................................................................................................25
Machine Administrator................................................................................................................................26
Network Administrator................................................................................................................................26
File Administrator.........................................................................................................................................26
Supervisor.....................................................................................................................................................26
About Administrator Authentication................................................................................................................27
Enabling Administrator Authentication...........................................................................................................29
Specifying Administrator Privileges............................................................................................................29
Registering the Administrator......................................................................................................................32
Logging in Using Administrator Authentication.........................................................................................35
Logging out Using Administrator Authentication.......................................................................................36
Changing the Administrator........................................................................................................................36
Changing the Administrator's User Name and Password........................................................................37
1