INDEX
A
Access Control.....................................................203
Access permission for stored files......................105
Address Book access permission.......................129
Address Book privileges.....................................327
Administrator...................................................18, 25
Administrator authentication....................18, 27, 29
Administrator privileges........................................29
Administrator registration......................................32
AH Protocol.................................................230, 231
AH Protocol + ESP Protocol.......................230, 231
Authenticate Current Job....................................260
Authentication by IEEE802.1X...........................255
Authentication information to log in.....................52
Authentication using an external device..............94
authfree................................................................254
Auto Erase Memory............................................142
Auto logout............................................................92
Available functions..............................................158
B
Basic authentication..............................................47
C
Change Firmware Structure................................261
Copier / Document Server Features.................339
D
Data encryption (Address Book).......................130
Data encryption (hard disk)...............................133
Data overwrite.....................................................142
Data Security for Copying....................................96
Device Access Violation.....................................263
Device certificate creation.........................124, 221
Device certificate installation..............64, 125, 222
Device Settings....................................................356
Document Server file permissions......................325
Driver Encryption Key................................216, 258
E
E-mail encryption................................................120
Edit...............................................................325, 327
Edit / Delete...............................................325, 327
Electronic signature.............................................122
Enabling/disabling protocols............................204
Encrypt Address Book.........................................258
Encryption key.....................................................137
Encryption Key Auto Exchange Settings...232, 240
Encryption Key Manual Settings...............232, 245
Enhance File Protection.......................................259
Erase All Memory...............................................146
Error code............................................................279
Error message......................................................277
ESP Protocol.........................................................230
Extended security functions................................257
F
Facsimile Features...............................................351
Fax........................................................................372
File administrator..........................................26, 325
File administrator settings....................................323
File creator (owner)...............................................18
Firmware update...................................................14
Full Control..................................................325, 327
Functions that require options.............................382
G
Guarding Against Unauthorized Copying..........95
H
Hard disk data encryption settings....................133
How to read this manual.......................................12
I
Important................................................................11
Information for enhanced security.....................270
Integration Server authentication.........................75
Interface...............................................................375
Intermediate certificate........................65, 126, 223
IP address...............................................................12
IPP authentication password..............................217
IPsec.....................................................................230
IPsec settings........................................................232
IPsec telnet setting commands............................246
K
Kerberos authentication........................................54
385