EasyManua.ls Logo

Ricoh DSm651 - Page 800

Ricoh DSm651
950 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
iv
Protection Using Encryption ..............................................................................40
SSL (Secure Sockets Layer) Encryption..................................................................41
User Settings for SSL (Secure Sockets Layer) ........................................................44
Setting the SSL / TLS Encryption Mode...................................................................45
SNMPv3 Encryption .................................................................................................47
5. Management Based on Authentication and Access Control
The Management Function .................................................................................49
Administrators and Users ...................................................................................50
Administrator ............................................................................................................50
User..........................................................................................................................51
Enabling Authentication......................................................................................52
Administrator Authentication ....................................................................................52
User Authentication..................................................................................................53
Authentication Information Stored in the Address Book.................................61
Specifying Authentication Information to Log on......................................................61
If User Authentication Has Been Specified .......................................................63
User Code Authentication (Using the Control Panel)...............................................63
User Code Authentication (Using a Printer Driver) ..................................................63
Login (Using the Control Panel) ...............................................................................63
Log Off (Using the Control Panel) ............................................................................64
Login (Using a Printer Driver)...................................................................................64
Login (Using Web Image Monitor) ...........................................................................64
Log Off (Using Web Image Monitor) ........................................................................65
Auto Logout..............................................................................................................65
Menu Protect ........................................................................................................66
Menu Protect............................................................................................................66
6. Specifying the Administrator/Security Functions
The Roles of Administrators...............................................................................69
Administrator Authentication .............................................................................71
Administrator Authentication ....................................................................................72
Registering the Administrator...................................................................................74
Logging on Using Administrator Authentication .......................................................75
Logging off Using Administrator Authentication .......................................................76
Changing the Administrator......................................................................................77
Specifying the Extended Security Functions....................................................78
Changing the Extended Security Functions .............................................................78
Settings ....................................................................................................................79
Limiting Machine Operation to Customers Only ..............................................82
Settings ....................................................................................................................82
7. Troubleshooting
Authentication Does Not Work Properly ...........................................................85
A Message Appears.................................................................................................85
Machine Cannot Be Operated.................................................................................. 87
MarC25_EN_SecRef_F_FM.book Page iv Monday, August 2, 2004 6:14 PM

Table of Contents

Related product manuals