Ricoh SP C250DN Operating Instructions - Page 10

Differences in Functions between Different Models, Note to Administrator, Password, User Restriction

Page 10 highlights

Differences in Functions between Different Models The differences in main functions between different models are as follows: Type Restrictions on available functions User Restriction Locked Print Notification to replace a component (Fusing unit, Transfer roller, Intermediate transfer belt) SP C250DN Type 1 Not available Not available Not available Not available SP C252DN Type 2 Available Available Available Available Note to Administrator Password Certain configurations of this machine can be password-protected to prevent unauthorized modifications by others. We strongly recommend you to create your own password immediately. The following are the operations that can be password-protected: • Configuring the [System Settings], [Restrict Available Functions], [Network Settings], [IPsec Settings], or [Administrator Tools] menu using Web Image Monitor By default, the access to the machine via Web Image Monitor is not password-protected. The setting for configuring the password can be found in [Administrator Settings]. • For details about setting a password, see page 126 "Configuring the Administrator Settings". User Restriction You can restrict the use of certain functions of this machine to users with proper authentication. Using Web Image Monitor, you can select the functions you want to restrict, and register the users who can use that function upon authentication. • For details about creating passwords and configuring the user restriction settings, see page 37 "Restricting Machine Functions According to User". 8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Differences in Functions between Different Models
The differences in main functions between different models are as follows:
SP C250DN
SP C252DN
Type
Type 1
Type 2
Restrictions on available functions
Not available
Available
User Restriction
Not available
Available
Locked Print
Not available
Available
Notification to replace a component
(Fusing unit, Transfer roller, Intermediate transfer belt)
Not available
Available
Note to Administrator
Password
Certain configurations of this machine can be password-protected to prevent unauthorized modifications
by others. We strongly recommend you to create your own password immediately.
The following are the operations that can be password-protected:
Configuring the [System Settings], [Restrict Available Functions], [Network Settings], [IPsec
Settings], or [Administrator Tools] menu using Web Image Monitor
By default, the access to the machine via Web Image Monitor is not password-protected.
The setting for configuring the password can be found in [Administrator Settings].
For details about setting a password, see page 126 "Configuring the Administrator Settings".
User Restriction
You can restrict the use of certain functions of this machine to users with proper authentication.
Using Web Image Monitor, you can select the functions you want to restrict, and register the users who
can use that function upon authentication.
For details about creating passwords and configuring the user restriction settings, see page 37
"Restricting Machine Functions According to User".
8