INDEX
A
Access Control.....................................................145
Access permission for stored files.........................75
Address Book access permission.........................96
Address Book Privileges.....................................252
Adjustment Settings for Operators...........236, 240,
246, 249, 272
Adjustment Settings for Skilled Operators.........240
Administrator...................................................17, 23
Administrator authentication....................17, 25, 26
Administrator privileges........................................26
Administrator registration......................................28
AH Protocol.................................................166, 167
AH Protocol + ESP Protocol.......................166, 167
Authenticate Current Job....................................193
Authentication by IEEE802.1X...........................190
Authentication information to log in.....................44
Authentication using an external device..............73
Auto Erase Memory............................................109
Auto logout............................................................71
Available Functions.............................................122
B
Basic authentication..............................................41
C
Change Firmware Structure................................194
Copier / Document Server Features.................262
D
Data encryption (Address Book)..........................97
Data encryption (hard disk)...............................100
Data overwrite.....................................................109
Device certificate creation...........................92, 159
Device certificate installation.................52, 93, 160
Device Settings....................................................275
Document Server File Permissions......................251
Driver Encryption Key................................155, 192
E
E-mail encryption...................................................89
Edit...............................................................251, 252
Edit / Delete...............................................251, 252
Electronic signature...............................................91
Enabling/disabling protocols............................146
Encrypt Address Book.........................................192
Encryption key.....................................................104
Encryption Key Auto Exchange Settings..........168,
176
Encryption Key Manual Settings...............168, 181
Enhance File Protection.......................................193
Erase All Memory...............................................112
Error code............................................................211
Error message......................................................209
ESP Protocol.........................................................166
Extended security functions................................191
F
File administrator...................................................24
File Administrator.................................................251
File administrator settings....................................249
File creator (owner)...............................................17
Full Control..................................................251, 252
H
Hard disk data encryption settings....................100
How to read this manual.......................................10
I
Important..................................................................9
Information for enhanced security.....................202
Integration Server authentication.........................59
Interface...............................................................283
IP address...............................................................10
IPsec.....................................................................166
IPsec settings........................................................168
IPsec telnet setting commands............................182
K
Kerberos authentication........................................46
L
LDAP authentication..............................................54
Log file management-Web Image Monitor......124
Log in (administrator)............................................30
Log information....................................................131
Log out (administrator)..........................................32
Login.......................................................................17
Logout.....................................................................17
291