o_secnotes_Notes for Security Functions.pdf
(
2450 KB
)
Pobierz
Notes for Security Functions
Read this manual carefully before you use this product and keep it handy for future reference.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be li-
able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper-
ating the machine.
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Modifications For Improved Operational
Security
To improve the operational security of this machine, we have modified the ma-
chine's security-related specifications. This booklet explains those modifications
and contains errata for the manuals provided with the machine. Before using the
machine, be sure to read carefully the manuals provided in conjunction with this
booklet.
❖
How to use this booklet
• When referring to the "Security Reference" manual, refer also to the errata
contained in this booklet. The errata for this manual can be found on p.2
“Security Reference Errata”, p.18 “Setting Up the Machine”, and in subse-
quent sections of this booklet.
• When referring to the "Copy and Document Server Reference" manual, re-
fer also to the errata contained in this booklet. The errata for this manual
can be found on p.14 “Copy and Document Server Reference Errata” of
this booklet.
• When referring to the "Network and System Settings Guide" manual, refer
also to the errata contained in this booklet. The errata for this manual can
be found on p.15 “Network and System Settings Guide Errata” of this
booklet.
• When referring to the "Facsimile Reference" manual, refer also to the errata
contained in this booklet. The errata for this manual can be found on p.16
“Facsimile Reference Errata” of this booklet.
• When referring to the "Scanner Reference" manual, refer also to the errata
contained in this booklet. The errata for this manual can be found on p.17
“Scanner Reference Errata” of this booklet.
1
Security Reference Errata
This chapter corrects errors in the supplied Security Reference. Please refer to it
when reading the Security Reference.
Topic
Getting Started >Be-
fore Using the Securi-
ty Functions
Additional Description
{Error}
Important
❒
If the security settings are not specified, the machine may be dam-
aged by malicious attackers.
{Corrections}
Important
❒
If the security settings are not configured, the data in the machine
is vulnerable to attack.
{Error}
2. Purchasers of this machine must make sure that people who use it do
so appropriately, in accordance with operations determined by the ma-
chine administrator. If the administrator does not make the required
security settings, there is a risk of security breaches by users.
{Corrections}
2. Purchasers of this machine must make sure that people who use it do
so appropriately, in accordance with operations determined by the ma-
chine administrator and supervisor. If the administrator or supervisor
does not make the required security settings, there is a risk of security
breaches by users.
Getting Started >Set-
ting Up the Machine
Some details in this section have been changed. Replace this section
with p.18 “Setting Up the Machine” in this booklet.
2
Topic
Administrators/Au-
thentication and its
Application >Ena-
bling Administrator
Authentication >Reg-
istering the Adminis-
trator
Additional Description
Delete the following:
Note
❒
Do not use Japanese, Traditional Chinese, Simplified Chinese, or
Hangul double-byte characters when entering the login user name
or password. If you use multi-byte characters when entering the
login user name or password, you cannot authenticate using Web
Image Monitor.
{Error}
Note
❒
You can use up to 32 alphanumeric characters and symbols when
registering login user names and login passwords. Keep in mind
that passwords are case-sensitive.
❒
User names cannot contain numbers only, a space, colon (:), or quo-
tation mark ("), nor can they be left blank.
{Corrections}
Note
❒
When registering login user names and login passwords, you can
specify up to 32 alphanumeric characters and symbols. Keep in
mind that user names and passwords are case-sensitive. User
names cannot contain numbers only, a space, colon (:), or quotation
mark ("), nor can they be left blank. For details about what charac-
ters the password can contain, see p.12 “Characters that can be used
in passwords” in this booklet.
Administrators/Au-
thentication and its
Application >Ena-
bling Administrator
Authentication >Log-
ging on Using Ad-
ministrator
Authentication
{Error}
Note
❒
If you log on using a login user name with the authority of more
than one administrator, "Administrator" appears.
{Corrections}
Note
❒
If the user name entered at login has multiple administrator privi-
leges, any administrator name with administrator privileges will be
displayed.
Administrators/Au-
thentication and its
Application >Ena-
bling Administrator
Authentication >Log-
ging on Using Ad-
ministrator
Authentication
Step
D
Add the following:
When the administrator is making settings for the first time, a pass-
word is not required; the administrator can simply press
[OK]
to pro-
ceed.
3
Plik z chomika:
ahaahm
Inne pliki z tego folderu:
05a_net.pdf
(3371 KB)
05a_ps3.pdf
(2756 KB)
Aficio MP C3300 series.pdf
(308 KB)
Aficio MPC5000 series Point-to-point Diagram_p2p_apc2.pdf
(2531 KB)
Aficio MPC5000 series Service Manual_f_mp5000.pdf
(15165 KB)
Inne foldery tego chomika:
Pliki dostępne do 01.06.2025
AFICIO MP C3002
Dokumenty
Galeria
MP C2003_C2011
Zgłoś jeśli
naruszono regulamin