EasyManua.ls Logo

Fuji Xerox DocuCentre-V C2265

Fuji Xerox DocuCentre-V C2265
771 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
9
Preparations .................................................................................................................................401
System Requirements for the Machine ................................................................................................................401
Installation Procedure ..............................................................................................................402
Installation Overview ...................................................................................................................................................402
Step 1 Fax Settings .......................................................................................................................................................402
Step 2 Setting the Server Fax Feature ..................................................................................................................403
13 Encryption and Digital Signature Settings ...............................405
Encryption and Digital Signature Overview......................................................................406
Types of Certificate.......................................................................................................................................................406
Certificate Conditions ..................................................................................................................................................407
Encryption Features for Communication.............................................................................................................408
Encryption and Digital-Signature Features for Scan Files.............................................................................409
Configuration of HTTP Communications Encryption ....................................................410
Installation Overview ...................................................................................................................................................410
Step1 Configuration on the Machine....................................................................................................................410
Step2 Configuration on the Computer.................................................................................................................412
Configuration of Encryption using IPsec............................................................................413
Installation Overview ...................................................................................................................................................413
Step1 Import and Configuration of a Certificate.............................................................................................413
Step2 Configuration on the Machine (Configuration of IPsec)..................................................................414
Step3 Configuration on the Computer.................................................................................................................415
Configuration of E-mail Encryption/Digital Signature..................................................416
Installation Overview ...................................................................................................................................................416
Step1 Configuration on the Machine....................................................................................................................417
Step2 Configuration on Sender and Recipient..................................................................................................417
Configuration of PDF/DocuWorks/XPS Signature ..........................................................420
Installation Overview ...................................................................................................................................................420
Step1 Configuration on the Machine....................................................................................................................420
Step2 Configuration on the Computer.................................................................................................................422
14 Authentication and Accounting Features.................................423
Overview of Authentication and Accounting Feature...................................................424
Types of User...................................................................................................................................................................424
User Roles and Authorization Groups....................................................................................................................424
Access Control .................................................................................................................................................................426
Types of Authentication .............................................................................................................................................426
Account Administration ..............................................................................................................................................428
Services Controlled by Authentication................................................................................432
Overview............................................................................................................................................................................432
Combination of Authentication and Account Administration types........................................................432
Authentication for Job Flow Sheets and Folders ............................................................435
Creating / Using Job Flow Sheet..............................................................................................................................435
Creating / Using Folder................................................................................................................................................437
Configuration for Authentication.........................................................................................439

Table of Contents

Other manuals for Fuji Xerox DocuCentre-V C2265

Related product manuals