INDEX
A
Access Control.....................................................127
Address Book Access Permission.......................105
Address Book Privileges.....................................213
Administrator..........................................................17
Administrator Authentication...................17, 23, 24
Administrator Privileges.........................................24
AH Protocol.........................................................153
AH Protocol + ESP Protocol................................153
Authenticate Current Job....................................180
Authentication and Access Limits..........................16
Authentication Information....................................54
authfree................................................................175
Auto Logout............................................................94
Available Functions.............................................117
B
Basic Authentication..............................................46
C
Change Firmware Structure................................182
Copier Features...................................................216
Creating the Device Certificate (Certificate Issued
by a Certificate Authority)..................................144
D
Data Security for Copying....................................99
Device Settings....................................................227
Display...................................................................10
Driver Encryption Key................................139, 178
E
Edit........................................................................213
Edit / Delete........................................................213
Enabling/Disabling Protocols............................128
Encrypt Address Book.........................................178
Encrypting the Data in the Address Book..........108
Encryption Key Auto Exchange / Manual Settings
- Shared Settings.................................................154
Encryption Key Auto Exchange Security Level........
..............................................................................154
Encryption Key Auto Exchange Setting Items..........
..............................................................................156
Encryption Key Auto Exchange Settings
Configuration Flow.............................................161
Encryption Key Manual Settings Configuration
Flow......................................................................166
Encryption Key Manual Settings Items..............159
Encryption Technology.........................................16
Enhance File Protection.......................................179
Error Message.....................................................187
ESP Protocol.........................................................152
Extended Security Functions...............................177
Extended Security Supplement..........................244
F
Facsimile Features...............................................220
Fax........................................................................234
File Administrator...................................................22
File Administrator Settings..................................210
Full Control..........................................................213
G
Group Password for PDF files............................141
Guarding Against Unauthorized Copying..........97
I
Installing the Device Certificate (Certificate Issued
by a Certificate Authority)..................................145
Integration Server Authentication.........................78
Interface...............................................................236
IP Address..............................................................11
IPP Authentication Password..............................141
IPsec.....................................................................152
IPsec Settings.......................................................154
IPsec telnet Setting Commands..........................167
L
Laws and Regulations...........................................12
LDAP Authentication..............................................69
LDAP Authentication - Operational Requirements
for LDAP Authentication........................................69
Log off (Administrator)..........................................31
Log on (Administrator)..........................................30
Login.......................................................................17
Logout.....................................................................17
M
Machine Administrator.........................................22
Machine Administrator Settings.........................200
245