Chapter 2 Management
List of Machine Management Settings ..................................................................2-2
Setting Security Codes ..............................................................................................2-4
Setting the Administrator Password ......................................................................2-4
Setting the Protect Passcode ..................................................................................2-7
Closed Communication ...........................................................................................2-10
Setting Closed Transmission ................................................................................2-10
Setting Closed Reception ......................................................................................2-11
Setting Passcode Polling .......................................................................................2-12
Setting the Passcode .............................................................................................2-14
Communication and Range of Passcodes .............................................................2-15
Setting ID Check Transmission ............................................................................2-17
Confirming the Destination Before Transmission ............................................2-19
Setting the Destination Confirmation Function ..................................................2-19
Setting the Confirmation Dial Functions ............................................................2-20
Prohibiting Transmission to Multiple Destinations ........................................2-23
Security Reception ...................................................................................................2-24
Activating the PIN mask .........................................................................................2-26
Function Protect Settings ......................................................................................2-28
Setting Function Protection..................................................................................2-29
Using Function Protection ....................................................................................2-31
Setting Mode Protection .........................................................................................2-33
Setting User Authentication ..................................................................................2-35
Setting the Authentication Method ......................................................................2-35
Managing User Access/Cost Accounting .............................................................2-38
Setting the Currency Unit ....................................................................................2-38
Specifying the Charge Settings ............................................................................2-40
Erasing the Accounting Data ...............................................................................2-42
Specifying the Network Settings ..........................................................................2-43
Specifying the TCP/IP Settings ............................................................................2-46
Registering LDAP Servers ....................................................................................2-57
Specifying the Archive Settings ............................................................................2-69
Setting an E-mail Gateway ..................................................................................2-73
Setting the Automatic Logout Time .....................................................................2-76
Mirroring the Machine Settings ...........................................................................2-78
Mirroring Methods ................................................................................................2-78
Importing / Exporting Using USB Memory .........................................................2-79
Directly Copying Via the Network .......................................................................2-84