Chapter 2 management, Chapter, Management – Muratec QUADACCESS MFX-2590 User Manual

Page 50

Advertising
background image

Chapter

2

Management

List of Machine Management Settings ..................................................................2-2
Setting Security Codes ..............................................................................................2-4

Setting the Administrator Password ......................................................................2-4
Setting the Protect Passcode ..................................................................................2-7

Closed Communication .............................................................................................2-9

Setting Closed Transmission ..................................................................................2-9
Setting Closed Reception ......................................................................................2-10
Setting Passcode Polling .......................................................................................2-11
Setting the Passcode .............................................................................................2-12
Communication and Range of Passcodes .............................................................2-14

Setting ID Check Transmission ............................................................................2-16
Confirming the Destination Before Transmission ............................................2-17

Setting the Destination Confirmation Function ..................................................2-17
Setting the Confirmation Dial Functions ............................................................2-18

Prohibiting Transmission to Multiple Destinations ........................................2-20
Security Reception ...................................................................................................2-21
Activating the PIN mask .........................................................................................2-23
Function Protect Settings ......................................................................................2-25

Setting Function Protection..................................................................................2-26
Using Function Protection ....................................................................................2-28

Setting Mode Protection .........................................................................................2-30
Setting User Authentication ..................................................................................2-32

Setting the Authentication Method ......................................................................2-32

Managing User Access/Cost Accounting .............................................................2-35

Setting the Currency Unit ....................................................................................2-35
Specifying the Charge Settings ............................................................................2-37
Erasing the Accounting Data ...............................................................................2-39

Specifying the Network Settings ..........................................................................2-40

Specifying the TCP/IP Settings ............................................................................2-43
Registering LDAP Servers ....................................................................................2-54
Specifying the Archive Settings ............................................................................2-65
Setting an E-mail Gateway ..................................................................................2-69
Setting the Automatic Logout Time .....................................................................2-71

Mirroring the Machine Settings ...........................................................................2-73

Mirroring Methods ................................................................................................2-73
Importing / Exporting Using USB Memory .........................................................2-74
Directly Copying Via the Network .......................................................................2-80

Advertising