TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................7
Notice..................................................................................................................................................................9
Important.........................................................................................................................................................9
How to Read This Manual...............................................................................................................................10
Symbols........................................................................................................................................................10
Name of Major Item....................................................................................................................................10
IP Address.....................................................................................................................................................10
Notes............................................................................................................................................................10
1. Getting Started
Before Using the Security Functions................................................................................................................11
Setting up the Machine....................................................................................................................................12
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................19
Using Authentication and Managing Users...............................................................................................19
Ensuring Information Security.....................................................................................................................19
Limiting and Controlling Access..................................................................................................................20
Enhancing Network Security......................................................................................................................21
2. Configuring Administrator Authentication
Administrators...................................................................................................................................................23
User Administrator.......................................................................................................................................23
Machine Administrator................................................................................................................................24
Network Administrator................................................................................................................................24
File Administrator.........................................................................................................................................24
Supervisor.....................................................................................................................................................24
About Administrator Authentication................................................................................................................25
Enabling Administrator Authentication...........................................................................................................26
Specifying Administrator Privileges............................................................................................................26
Registering the Administrator......................................................................................................................28
Logging in Using Administrator Authentication.........................................................................................30
Logging out Using Administrator Authentication.......................................................................................32
Changing the Administrator........................................................................................................................32
Changing the Administrator's User Name and Password........................................................................33
1