INDEX
A
Access Control.....................................................171
Access permission for stored files.........................95
Address Book access permission.......................117
Address Book privileges.....................................283
Administrator...................................................16, 23
Administrator authentication....................16, 25, 27
Administrator privileges........................................27
Administrator registration......................................30
AH Protocol.................................................195, 196
AH Protocol + ESP Protocol.......................195, 196
Authenticate Current Job....................................223
Authentication by IEEE802.1X...........................220
Authentication information to log in.....................50
Authentication using an external device..............88
authfree................................................................219
Auto Erase Memory............................................128
Auto logout............................................................86
Available functions..............................................143
B
Basic authentication..............................................45
C
Change Firmware Structure................................225
Copier / Document Server Features.................294
D
Data encryption (Address Book).......................118
Data encryption (hard disk)...............................121
Data overwrite.....................................................128
Device certificate creation.........................113, 188
Device certificate installation..............62, 114, 189
Device Settings....................................................305
Document Server file permissions......................281
Driver Encryption Key................................183, 222
E
E-mail encryption................................................109
Edit...............................................................281, 283
Edit / Delete...............................................281, 283
Electronic signature.............................................111
Enabling/disabling protocols............................172
Encrypt Address Book.........................................222
Encryption key.....................................................123
Encryption Key Auto Exchange Settings..........197,
205
Encryption Key Manual Settings...............197, 210
Enhance File Protection.......................................223
Erase All Memory...............................................132
Error code............................................................239
Error message......................................................237
ESP Protocol.........................................................195
Extended security functions................................221
F
File administrator..........................................24, 281
File administrator settings....................................279
File creator (owner)...............................................16
Firmware update...................................................12
Full Control..................................................281, 283
H
Hard disk data encryption settings....................121
How to read this manual.......................................10
I
Important..................................................................9
Information for enhanced security.....................230
Integration Server authentication.........................72
Interface...............................................................316
IP address...............................................................10
IPP authentication password..............................184
IPsec.....................................................................195
IPsec settings........................................................197
IPsec telnet setting commands............................211
K
Kerberos authentication........................................52
L
LDAP authentication..............................................64
Locked Print............................................................89
Log file management-Control panel..................145
Log file management-Web Image Monitor......147
Log in (administrator)............................................33
Log information....................................................155
Log out (administrator)..........................................34
Login.......................................................................16
325