Konica Minolta bizhub c280 User Manual page 7

Hide thumbs Also See for bizhub c280:
Table of Contents

Advertisement

7.4
Restricting users of this machine (NDS over IPX/SPX) ............................................................. 7-19
7.4.1
[External Server Settings]................................................................................................................. 7-19
7.4.2
[Authentication Method]................................................................................................................... 7-20
7.4.3
[Default Function Permission] .......................................................................................................... 7-20
7.4.4
[NetWare Settings] ........................................................................................................................... 7-21
7.5
Restricting users of this machine (NDS over TCP/IP) ............................................................... 7-22
7.5.1
[TCP/IP Settings].............................................................................................................................. 7-22
7.5.2
[External Server Settings]................................................................................................................. 7-23
7.5.3
[Authentication Method]................................................................................................................... 7-24
7.5.4
[Default Function Permission] .......................................................................................................... 7-24
7.6
Restricting users of this machine (LDAP)................................................................................... 7-25
7.6.1
[TCP/IP Settings].............................................................................................................................. 7-25
7.6.2
[External Server Settings]................................................................................................................. 7-26
7.6.3
[Authentication Method]................................................................................................................... 7-27
7.6.4
[Default Function Permission] .......................................................................................................... 7-27
7.6.5
LDAP over SSL ................................................................................................................................ 7-28
[External Server Settings]................................................................................................................. 7-28
[Setting Up LDAP] ............................................................................................................................ 7-28
[Certificate Verification Setting]........................................................................................................ 7-29
8
8.1
Registering the certificate of this machine for SSL communications ....................................... 8-3
8.1.1
[Device Certificate Setting]................................................................................................................. 8-4
8.1.2
[Create and install a self-signed Certificate] ...................................................................................... 8-5
8.1.3
[Request a Certificate]........................................................................................................................ 8-6
8.1.4
[Install a Certificate]............................................................................................................................ 8-7
8.1.5
[Import a Certificates]......................................................................................................................... 8-8
8.1.6
[SSL Setting] ...................................................................................................................................... 8-8
8.1.7
[Remove a Certificate]........................................................................................................................ 8-9
8.2
Using device certificates depending on protocol ...................................................................... 8-10
8.2.1
[Device Certificate Setting]............................................................................................................... 8-11
8.2.2
[Protocol Setting] ............................................................................................................................. 8-11
8.3
Managing a device certificate...................................................................................................... 8-12
8.3.1
[Device Certificate Setting]............................................................................................................... 8-12
8.3.2
[Export Certificate] ........................................................................................................................... 8-12
8.4
Registering a user certificate in this machine............................................................................ 8-14
8.4.1
[E-mail] ............................................................................................................................................. 8-15
8.4.2
[Automatically Obtain Certificates]................................................................................................... 8-16
8.4.3
Certificate validation ........................................................................................................................ 8-17
[Certificate Verification Level Settings] ............................................................................................ 8-17
[Certificate Verification Setting]........................................................................................................ 8-17
8.5
8.5.1
[TCP/IP Settings].............................................................................................................................. 8-20
8.5.2
User Authentication ......................................................................................................................... 8-20
8.5.3
[Scan to Authorized Folder Settings] ............................................................................................... 8-20
8.5.4
[Client Setting].................................................................................................................................. 8-20
8.5.5
[WINS Setting].................................................................................................................................. 8-20
8.5.6
[Direct Hosting Setting] .................................................................................................................... 8-20
8.5.7
[LLMNR Setting]............................................................................................................................... 8-20
8.6
via SSL ........................................................................................................................................... 8-21
8.6.1
[TCP/IP Settings].............................................................................................................................. 8-21
8.6.2
[Device Certificate Setting]............................................................................................................... 8-21
8.6.3
[Web Service Common Settings] ..................................................................................................... 8-21
bizhub C360/C280/C220
Contents-5

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub c360Bizhub c220

Table of Contents