TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
Notice................................................................................................................................................................10
Important......................................................................................................................................................10
How to Read This Manual...............................................................................................................................11
Symbols........................................................................................................................................................11
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Laws and Regulations......................................................................................................................................12
Legal Prohibition..........................................................................................................................................12
1. Getting Started
Before Using the Security Functions................................................................................................................13
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................18
Using Authentication and Managing Users...............................................................................................18
Ensuring Information Security.....................................................................................................................18
Limiting and Controlling Access..................................................................................................................20
Enhanced Network Security.......................................................................................................................21
2. Administrators/Authentication and Its Application
Administrators...................................................................................................................................................23
User Administrator.......................................................................................................................................23
Machine Administrator................................................................................................................................24
Network Administrator................................................................................................................................24
File Administrator.........................................................................................................................................24
Supervisor.....................................................................................................................................................24
About Administrator Authentication................................................................................................................25
Enabling Administrator Authentication...........................................................................................................27
Specifying Administrator Privileges............................................................................................................27
Registering the Administrator......................................................................................................................30
Logging on Using Administrator Authentication........................................................................................34
Logging off Using Administrator Authentication........................................................................................35
Changing the Administrator........................................................................................................................35
3