Konica Minolta magicolor 8650DN User Manual

Magicolor 8650 security operations
Hide thumbs Also See for magicolor 8650DN:
Table of Contents

Advertisement

User's Guide [Security Operations]
2008. 1
Ver. 1.00

Advertisement

Table of Contents
loading

Summary of Contents for Konica Minolta magicolor 8650DN

  • Page 1 User’s Guide [Security Operations] 2008. 1 Ver. 1.00...
  • Page 2: Table Of Contents

    Contents Contents Security Introduction ............................1-2 Compliance with the ISO15408 Standard ....................1-2 Operating Precautions..........................1-2 INSTALLATION CHECKLIST ........................1-3 Security Functions ..........................1-4 1.2.1 Check Count Clear Conditions .........................1-4 Data to be Protected ..........................1-5 Precautions for Operation Control...................... 1-6 Roles and Requirements of the Administrator..................1-6 Password Usage Requirements .......................1-6 Network Connection Requirements for the Machine ................1-6 Security function operation setting operating requirements ..............1-6...
  • Page 3 Contents 2.8.3 Setting the Encryption Key (encryption word) ..................2-27 <Setting can be made only from the control panel> ................2-27 2.8.4 Changing the Encryption Key .........................2-30 <Setting can be made only from the control panel> ................2-30 2.8.5 Making Overwrite Priority Setting ......................2-32 <Setting can be made only from the control panel>...
  • Page 4 Contents PageScope Data Administrator......................4-2 4.1.1 Gaining access from PageScope Data Administrator ................4-2 <From the PC> ............................4-2 4.1.2 SNMP Setting Function ..........................4-4 <Changing the auth-password and priv-password>................4-4 4.1.3 NetWare Setting Function ........................4-6 <Making the NetWare Setting> ........................4-6 4.1.4 SMB Setting Function..........................4-7 <Making the NetBIOS Name Setting>......................4-7 4.1.5 AppleTalk Setting Function ........................4-8...
  • Page 5 Contents 8650...
  • Page 6: Security

    Security...
  • Page 7: Introduction

    Security Security Introduction Thank you for purchasing our product. This User’s Guide contains the operating procedures and precautions to be used when using the security functions offered by the magicolor 8650 machine. To ensure the best possible performance and effective use of the machine, read this manual thoroughly before using the security functions.
  • Page 8: Installation Checklist

    Security INSTALLATION CHECKLIST This Installation Checklist contains items that are to be check by the Service Engineer installing this machine. The Service Engineer should check the following items, then explain each checked item to the Administrator of the machine. To Service Engineer Make sure that each of these items is properly carried out by checking the box on the right of each item.
  • Page 9: Security Functions

    Security Security Functions Setting the EnhancedSecurity to [ON] will validate the security function of this machine. For details of the settings of different security functions to be changed by turning [ON] the EnhancedSecurity, see "Enhancing the Security Function" on page 2-6.
  • Page 10: Data To Be Protected

    Security Data to be Protected The underlying concept of this machine toward security is "to protect data that can be disclosed against the intention of users." The following types of image files that have been stored in the machine and made available for use by its users are protected while the machine is being used.
  • Page 11: Precautions For Operation Control

    Security Precautions for Operation Control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. Roles and Requirements of the Administrator The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improp- er operations are performed.
  • Page 12: Operation And Control Of The Machine

    Security Operation and control of the machine The Administrator of the machine should perform the following operation control. The Administrator of the machine should log off from the Admin. Settings whenever the operation in the Admin. Settings is completed. The Administrator of the machine should also make sure that each indi- vidual user makes it a rule to quit each session whenever it is completed, including those of the Secure Document file, Public User Box, and Public User Box file.
  • Page 13: Miscellaneous

    Security Miscellaneous Password Rules According to certain Password Rules, registration of a password consisting of a string of a single character or change of a password to one consisting of a string of a single character is rejected for the Administrator Password, Public User Box Password, Secure Print Password, HDD Lock Password, and Encryption Key.
  • Page 14: Ipp Printing

    Security Note No algorithms can be selected during generation of encryption keys. SSL v3 is automatically selected for the SSL setting according to the application and browser. Do not therefore change the setting manually to SSL v2. Use the following browsers to ensure SSL encryption communication with appropriate strength. Use of any of the following browsers achieves SSL encryption communication that ensures confidentiality of the image data transmitted and received.
  • Page 15: Types Of Data Cleared By Overwrite All Area Function

    Security <Installing printer driver> To perform IPP printing, the printer driver must be installed. From "Add Printer Wizard," select "Connect to a printer on the Internet or on your intranet" and type the URL of this machine in the following format in the "URL"...
  • Page 16: Administrator Operations

    Administrator Operations...
  • Page 17: Accessing The Admin. Settings

    Administrator Operations Administrator Operations Accessing the Admin. Settings This machine implements authentication of the user of the Admin. Settings function through the 8-digit Administrator Password that verifies the identity as the Administrator of the person who accesses the function. During the authentication procedure, the Administrator Password entered for the authentication purpose appears as "*"...
  • Page 18: From The Control Panel

    Administrator Operations <From the Control Panel> Press the [Menu/Select] key. Press the [,] key to select [Admin. Settings]. Is it possible to gain access to the Admin. Settings while a job is being executed? % The machine does not accept access to the Admin. Settings while a job is being executed. Wait until the execution of the job is completed before attempting to access the Admin.
  • Page 19: From Pagescope Web Connection

    Administrator Operations <From PageScope Web Connection> Start the Web browser. Enter the IP address of the machine in the address bar. Press the [Enter] key to start PageScope Web Connection. Click [Logout] and [OK]. You log off from the Public User mode. Click the Administrator radio button and [Login].
  • Page 20 Administrator Operations Click the [OK]. What happens if a wrong Administrator Password is entered? % If a wrong Administrator Password has been entered, the machine gives a message that tells that authentication has not been successful. In this case, click [OK] and enter the correct Administrator Password in the "Password"...
  • Page 21: Enhancing The Security Function

    Administrator Operations Enhancing the Security Function When access to the Administrator of the machine by the Admin. Settings via the control panel is authenticat- ed, the machine enables setting of the EnhancedSecurity that allows settings for enhancing each of different security functions to be converted all at once.
  • Page 22: Items Cleared By Hdd Format

    Administrator Operations Function Name Factory Setting When EnhancedSecurity is set to [ON] Administrator Password Enabled Restrict (not to be changed) Change Via Network Release Time settings 5 min. The setting value should be 5 min. or more (no value less than 5 can be set) Admin.
  • Page 23: Setting The Enhancedsecurity

    Administrator Operations 2.2.2 Setting the EnhancedSecurity Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 24 Administrator Operations Press the [Menu/Select] key. – The following screen appears if the previously required settings are yet to be made by the Administrator of the machine. Make the necessary settings according to the corresponding set procedure. – The following screen appears if the previously required settings are yet to be made by the Service Engineer.
  • Page 25: Setting Can Be Made Only From The Control Panel

    Administrator Operations HDD Installation When access by the Administrator of the machine through the Admin. Settings via the control panel is authenticated, the machine enables setting of HDD Installation. The following types of data are cleared when the setting for HDD Installation is changed from [Installed] to [Not Installed]. If the HDD Installation is later changed back from [Not Installed] to [Installed], be sure again to make the settings for the types of data that have been cleared.
  • Page 26 Administrator Operations Press the [,] key to select [HDD Installation]. Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to select [Installed] or [Not Installed]. Press the [Menu/Select] key. Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch.
  • Page 27: Preventing Unauthorized Access

    Administrator Operations Preventing Unauthorized Access When access by the Administrator of the machine through the Admin. Settings via the control panel is authenticated, the machine enables setting of the operation of ProhibitFunctions. The machine then takes a count of the number of unsuccessful accesses to the Admin. Settings, SNMP authentication, Secure Print authentication, and Public User Box authentication to prohibit the authentication operation.
  • Page 28: Setting Can Be Made Only From The Control Panel

    Administrator Operations <Setting can be made only from the control panel> For the procedure to call the Security Settings menu to the display, see steps 1 through 3 of "Setting the EnhancedSecurity" on page 2-8. Call the Security Settings to the screen from the control panel. Press the [,] key to select [Security Details].
  • Page 29 Administrator Operations Press the [,] key to select [#of Auth Attempts]. Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to set the check count. Press the [Menu/Select] key. Press the [,] key to select [Release Time]. Press the [Menu/Select] or [)] key.
  • Page 30: Canceling The Operation Prohibited State

    Administrator Operations Canceling the Operation Prohibited State When access to the Administrator of the machine by the Admin. Settings via the control panel is authenticated, the machine enables the operation of Release Setting performed for canceling the state of ProhibitFunctions (access lock state) as a result of unauthorized access. Release Setting clears the unauthorized access check count for all SNMP authentication, all Secure Print authentication, and all Public User Box authentication, resetting it to zero.
  • Page 31: User Box Function

    Administrator Operations User Box Function When access to the Administrator of the machine by the Admin. Settings is authenticated, the machine enables the User Box. It also allows the User Box Password to be changed. User Box prepares a User Box in the HDD as a space for saving image files. The Administrator of the machine is allowed to register a Public User Box that is shared among registered users.
  • Page 32 Administrator Operations Are there any precautions to be used when making settings? % Be sure to enter the User Box Number., User Box Name, User Box Password, and Retype User Box Password. % A User Box Number that has been registered cannot be registered anew. Click the [OK].
  • Page 33: Using User Box Attribute Change

    Administrator Operations 2.6.2 Using User Box Attribute Change The Administrator of the machine can change User Box Attributes including the User Box Name and User Box Password of a Public User Box previously registered. Note Do not leave the machine with the setting screen of Admin Mode left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode.
  • Page 34 Administrator Operations Click the [User Box Setting]. What steps should be performed to delete a User Box? % To delete a User Box, click [Delete User Box]. A message will then appear for confirming whether the specific User Box can definitely be deleted. Click [OK] to delete the specified User Box. Make the necessary settings.
  • Page 35: Changing The Administrator Password

    Administrator Operations Changing the Administrator Password When access to the Administrator of the machine from the control panel by the Admin. Settings is authenticated, the machine enables the operation of changing the Administrator Password required for accessing the Admin. Settings. The Administrator Password entered for the authentication purpose appears as "*"...
  • Page 36 Administrator Operations Press the [Menu/Select] key. What if an Administrator Password different from that is currently registered is mistakenly entered? % If there is a mismatch between the currently registered Administrator Password and the Administrator Password entered, a message appears that tells that there is a mismatch in the Administrator Passwords.
  • Page 37: Protecting Data In The Hdd

    Administrator Operations Protecting Data in the HDD When access by the Administrator of the machine from the control panel through the Admin. Settings is authenticated, the machine enables the operation for setting and changing the HDD Lock Password. If the machine is equipped with the optional Security Kit SC-503, it enables the operation for setting and changing the Encryption Key and the operation for setting the Overwrite Priority Setting function.
  • Page 38: Setting The Hdd Lock Password

    Administrator Operations 2.8.1 Setting the HDD Lock Password Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 39 Administrator Operations Press the [Menu/Select] key. What happens if the HDD Lock Password entered does not meet the requirements of Password Rules? % The HDD Lock Password entered will be cleared if it does not meet the requirements of the Password Rules.
  • Page 40: Setting Can Be Made Only From The Control Panel

    Administrator Operations 2.8.2 Changing the HDD Lock Password Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 41 Administrator Operations To prevent entry of a wrong password, press the [+] and/or [,] key to enter the 20-digit HDD Lock Password once again. – Press the [*] key to delete the last character entered. Press the [Menu/Select] key. What happens if there is a mismatch in the HDD Lock Passwords? % If there is a mismatch in the HDD Lock Passwords, the HDD Lock Password entered the second time is cleared.
  • Page 42: Setting Can Be Made Only From The Control Panel

    Administrator Operations 2.8.3 Setting the Encryption Key (encryption word) Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 43 Administrator Operations To prevent entry of a wrong Encryption Key, press the [+] and/or [,] key to enter the 20-digit Encryption Key once again. – Press the [*] key to delete the last character entered. Press the [Menu/Select] key. What if there is a mismatch in the Encryption Keys? % If there is a mismatch in the Encryption Keys, the Encryption Key entered the second time is cleared.
  • Page 44 Administrator Operations Press the [+] and/or [,] key to select [Start]. Press the [Menu/Select] key. What happens when Format HDD is executed? % Executing Format HDD erases data in the HDD. It is recommended that important data be saved in a backup medium in advance.
  • Page 45: Setting Can Be Made Only From The Control Panel

    Administrator Operations 2.8.4 Changing the Encryption Key Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 46 Administrator Operations To prevent entry of a wrong Encryption Key, press the [+] and/or [,] key to enter the 20-digit Encryption Key once again. – Press the [*] key to delete the last character entered. Press the [Menu/Select] key. What if there is a mismatch in the Encryption Keys? % If there is a mismatch in the Encryption Keys, the Encryption Key entered the second time is cleared.
  • Page 47: Setting Can Be Made Only From The Control Panel

    Administrator Operations 2.8.5 Making Overwrite Priority Setting Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 48 Administrator Operations Press the [+] and/or [,] key to select [OverwritePriority]. Press the [Menu/Select] key. Press the [+] and/or [,] key to select [Yes]. Press the [Menu/Select] key. Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch.
  • Page 49 Administrator Operations Press the [,] key to select [Format HDD]. Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to select [Start]. Press the [Menu/Select] key. What happens when Format HDD is executed? % Executing Format HDD erases data in the HDD. It is recommended that important data be saved in a backup medium in advance.
  • Page 50: Setting Can Be Made Only From The Control Panel

    Administrator Operations Overwrite All Area Function When access to the Admin. Settings by the Administrator of the machine via the control panel is authenticated, the machine enables setting of the operation of the Overwrite All Area function. When the machine is to be discarded, or use of a leased machine is terminated at the end of the leasing contract, the Overwrite All Area function overwrites and erases all data stored in all spaces of the HDD.
  • Page 51 Administrator Operations Press the [+] and/or [,] key to select the desired mode. Press the [Menu/Select] key. Press the [+] and/or [,] key to select [Start]. Press the [Menu/Select] key. Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch.
  • Page 52: Ssl Setting Function

    Administrator Operations 2.10 SSL Setting Function When access to the Administrator of the machine by the Admin. Settings is authenticated, the machine enables the setting of encryption of image data transmitted and received between the PC and the machine. 2.10.1 Setting the SSL Note Do not leave the machine with the Admin Mode setting screen left shown on the display.
  • Page 53 Administrator Operations Select [Create a self-signed Certificate] and click [OK]. Select the Encryption Strength. Select "Admin. Mode and User Mode" for "Mode using SSL/TLS." 8650 2-38...
  • Page 54 Administrator Operations Make the necessary settings. What if data entered for each item does not meet the requirements? % If data entered for each item does not meet the requirements, a message appears that tells that the data entered is wrong. Click the [OK].
  • Page 55: Setting Can Be Made Only From Pagescope Web Connection

    Administrator Operations 2.10.2 Changing the Encryption Strength Setting Note Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode. For encryption strength, select the strong "DES, RC4-40, RC4-128, 3DES-168, or AES- 256."...
  • Page 56: Setting Can Be Made Only From Pagescope Web Connection

    Administrator Operations 2.10.3 Changing the Mode Using SSL Note Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode. Select "Admin.
  • Page 57: Setting Can Be Made Only From Pagescope Web Connection

    Administrator Operations 2.10.4 Removing a Certificate Note Do not leave the machine with the Admin Mode setting screen left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Admin Mode. <Setting can be made only from PageScope Web Connection>...
  • Page 58: Snmp Setting Function

    Administrator Operations 2.11 SNMP Setting Function When access to the Administrator of the machine by the System Settings is authenticated, the machine enables changing of the SNMP v3 Write User Password (auth-password, priv-password) required for accessing the MIB object over the network using the SNMP from the PC. In PageScope Web Connection, import/export of the Device Setting is enabled, allowing the setting for Security Level of SNMP v3 Setting to be saved or the saved backup data to be restored.
  • Page 59 Administrator Operations Press the [,] key to select [Network Settings]. Press the [Menu/Select] or [)] key. Press the [,] key to select [SNMP]. Press the [Menu/Select] or [)] key. Press the [,] key to select [SNMP v3 Setting]. Press the [Menu/Select] or [)] key. Press the [,] key to select [WriteUserSettings].
  • Page 60 Administrator Operations Press the [,] key to select [Security Level]. Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to select [Auth-password] or [Auth/Priv-password]. Press the [Menu/Select] key. Press the [,] key to select [Auth-password]. Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to enter the new 8-digit-more auth-password.
  • Page 61 Administrator Operations Press the [,] key to select [Priv-password]. Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to enter the new 8-digit-or-more priv-password. – Press the [*] key to delete the last character entered. Press the [Menu/Select] key. What happens if the priv-password entered does not meet the requirements of Password Rules? % If the priv-password entered does not meet the requirements of the Password Rules, the [Menu/Select] key cannot be pressed.
  • Page 62: From Pagescope Web Connection

    Administrator Operations <From PageScope Web Connection> For the procedure to call the Admin Mode to the display, see "Accessing the Admin. Settings" on page 2-2. Start PageScope Web Connection and access the Admin Mode. Click the [Network] tab. Click the [SNMP Setting] menu. Enter the auth-password and priv-password in the boxes marked by the rectangle, that is, the Write side SNMP v3 Setting.
  • Page 63: Snmp Access Authentication Function

    Administrator Operations 2.11.2 SNMP access authentication function If the settings of the Admin. Settings are to be changed using SNMP from the PC, the user attempting to gain access is authenticated to be the Administrator of the machine by using the Write User Name and SNMP Password (auth-password, priv-password) of the SNMP v3 Write settings made in this machine.
  • Page 64: Tcp/Ip Setting Function

    Administrator Operations 2.12 TCP/IP Setting Function When access to the Administrator of the machine by the System Settings is authenticated, the machine enables setting of the IP Address. 2.12.1 Setting the IP Address Note Do not leave the machine with the setting screen of System Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the System Settings.
  • Page 65: From Pagescope Web Connection

    Administrator Operations <From PageScope Web Connection> For the procedure to call the Network menu to the display, see steps 1 and 2 of "Changing the auth- password and priv-password" on page 2-43. Start the PageScope Web Connection and call the Network menu to the display. Click the [TCP/IP Setting] menu.
  • Page 66: Netware Setting Function

    Administrator Operations 2.13 NetWare Setting Function When access to the Administrator of the machine by the System Settings is authenticated, the machine enables registration as the Print Server. 2.13.1 Making the NetWare Setting Note Do not leave the machine with the setting screen of System Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the System Settings.
  • Page 67: Smb Setting Function

    Administrator Operations 2.14 SMB Setting Function When access to the Administrator of the machine by the System Settings is authenticated, the machine enables setting of the NetBIOS Name. 2.14.1 Setting the NetBIOS Name Note Do not leave the machine with the setting screen of System Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the System Settings.
  • Page 68: Appletalk Setting Function

    Administrator Operations 2.15 AppleTalk Setting Function When access to the Administrator of the machine by the System Settings is authenticated, the machine enables making of the AppleTalk Settings. 2.15.1 Making the AppleTalk Setting Note Do not leave the machine with the setting screen of System Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the System Settings.
  • Page 69 Administrator Operations 8650 2-54...
  • Page 70: User Operations

    User Operations...
  • Page 71: Secure Print Document Function

    User Operations User Operations Secure Print Document Function The Secure Print Document function allows a Secure Print Document specified by a corresponding password from the PC to be used in the condition registered in the machine. To access a Secure Print Document file, authentication is performed through an 8-digit password that verifies an authenticated user of the Secure Print Document file.
  • Page 72 User Operations Press the [Menu/Select] or [)] key. Press the [+] and/or [,] key to enter the Secure Print ID. – Press the [*] or [)] key to move the cursor (digit). Press the [Menu/Select] key. Press the [+] and/or [,] key to select the desired Secure Print Document. –...
  • Page 73 User Operations Press the [+] and/or [,] key to select the target Secure Print Document. Press the [Menu/Select] or [)] key. – Go to step 16 if [All Documents] has been selected in step 12. Press the [+] and/or [,] key to select [Print]. –...
  • Page 74: User Box Function

    User Operations User Box Function The machine enables the operation of registering and changing the Public User Box for all users. It also enables the operation of printing image files saved in the Public User Box. User Box creates a User Box in the HDD as a space for storing an image file. User Box is available in one type, i.e., the Public User Box that is shared among registered users.
  • Page 75 User Operations Click the [OK]. What happens if the User Box Password entered does not meet the requirements of Password Rules? % If the User Box Password entered does not meet the requirements of the Password Rules, a message appears that tells that the User Box Password that has been entered cannot be used. Click [OK] to go back to the screen of step 5.
  • Page 76: Setting Can Be Made Only From Pagescope Web Connection

    User Operations 3.2.2 Changing the User Box attributes <Setting can be made only from PageScope Web Connection> For the procedure to call the PageScope Web Connection to the display, see steps 1 through 3 of "Setting the User Box" on page 3-5.
  • Page 77 User Operations Click the [User Box Setting]. What steps should be performed to delete a User Box? % To delete a User Box, click [Delete User Box]. A message will then appear for confirming whether the specific User Box can definitely be deleted. Click [OK] to delete the specified User Box. Make the necessary settings.
  • Page 78 User Operations Click the [OK]. What if there is a mismatch in the Current User Box Passwords? % If there is a mismatch in the Current User Box Passwords, a message appears that tells that there is a mismatch in the Current User Box Passwords. Click [OK] to go back to the screen of step 4. Perform steps 4 through 6 once again.
  • Page 79: Accessing The User Box And User Box File

    User Operations 3.2.3 Accessing the User Box and User Box file <From the Control Panel> For the procedure to call the Job Operation menu to the display, see steps 1 through 3 of "Accessing the Secure Print Document" on page 3-2.
  • Page 80 User Operations Press the [+] and/or [,] key to select the target User Box document. – Select [All Documents] to select all User Box documents in the User Box. Press the [Menu/Select] or [)] key. – Go to step 12 if [All Documents] has been selected in step 8. Press the [+] and/or [,] key to select [Print].
  • Page 81: From Pagescope Web Connection

    User Operations <From PageScope Web Connection> For the procedure to access the Public User Box menu, see steps 1 through 3 of "Changing the User Box attributes" on page 3-7. Access the Public User Box from the PageScope Web Connection. Select the desired operation from the pull-down menu and click [Changes the display].
  • Page 82: Application Software

    Application Software...
  • Page 83: Gaining Access From Pagescope Data Administrator

    Application Software Application Software PageScope Data Administrator PageScope Data Administrator is an application for management purpose that allows the network setting information registered in the machine to be edited or registered from a PC connected over the network. It allows the network setting information to be downloaded in your PC, edited on the PC, and then written in the machine.
  • Page 84 Application Software Type the 8-digit Administrator Password registered in the machine and click [OK]. – If the "Save" check box is selected, enter the 8-digit Administrator Password once again to make sure that the Administrator Password has been entered correctly. What happens if a wrong Administrator Password is entered? % If a wrong Administrator Password is entered, a message appears saying that there is a mismatch in the passwords and entry of the Administrator Password will be prohibited for five sec.
  • Page 85: Changing The Auth-Password And Priv-Password>

    Application Software 4.1.2 SNMP Setting Function Note Do not leave the site while you are gaining access to the machine through PageScope Data Adminis- trator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator.
  • Page 86 Application Software Click the "Security Level" pull-down menu and select [auth-password] or [auth-password/priv- password]. Click the "Set a password" check box and enter the new 8-digit-or-more auth-password or priv- password. Click the [Export to the device]. What happens if the auth-password or priv-password entered does not meet the requirements of the Password Rules? % If the auth-password or priv-password entered does not meet the requirements of the Password Rules, [Export to the device] cannot be selected.
  • Page 87: Making The Netware Setting>

    Application Software 4.1.3 NetWare Setting Function Note Do not leave the site while you are gaining access to the machine through PageScope Data Adminis- trator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator.
  • Page 88: Making The Netbios Name Setting>

    Application Software 4.1.4 SMB Setting Function Note Do not leave the site while you are gaining access to the machine through PageScope Data Adminis- trator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator.
  • Page 89: Making The Appletalk Setting>

    Application Software 4.1.5 AppleTalk Setting Function Note Do not leave the site while you are gaining access to the machine through PageScope Data Adminis- trator. If it is absolutely necessary to leave the site, be sure first to log off from the PageScope Data Administrator.
  • Page 90: Hdd Backup Utility

    Application Software HDD Backup Utility The HDD Backup Utility, which is to be installed in the PC of the Administrator of the machine, is application software used exclusively for accessing the HDD in this machine. The HDD Backup Utility functions performed by the Administrator of the machine allow the image data saved in the HDD of the machine to be backed up and restored.
  • Page 91 Application Software From the "Device to be backed up" pull-down menu, select this machine and then enter the 8-digit Administrator Password registered in the machine in the "Administrator password" box. Click the [Next]. What happens if a wrong Administrator Password is entered? % If a wrong Administrator Password is entered, a message appears saying that there is a mismatch in the passwords.
  • Page 92 Application Software Click [Browse] and specify the destination, in which the backup folder is to be saved. Type a backup folder name that consists of one to 50 characters in the "Backup folder name" text box and click [Next]. To set a password for the backup file, select the corresponding check box and type a password that consists of one to 64 digits in the "Password for the backup files"...
  • Page 93 Application Software Check the data that has been set and click [Start]. Make sure that the backup procedure has been completed. Then, click [Finish]. Reminder In Backup, neither the Administrator Password nor CE Password is backed up. 8650 4-12...
  • Page 94: From The Pc

    Application Software 4.2.2 Restore Reminder If the "Save the administrator password" check box is selected, the Administrator Password entered is stored in the PC being used. If you do not want the Administrator Password stored, clear the "Save the administrator password" check box. <From the PC>...
  • Page 95 Application Software Click the "Device to be restored" pull-down menu and select the machine. Type the 8-digit Administrator Password registered in the machine in the "Administrator Password" box. Click the [Next]. What happens if a wrong Administrator Password is entered? % If a wrong Administrator Password is entered, a message appears saying that there is a mismatch in the passwords.
  • Page 96 Application Software Click the [OK]. Make sure that Restore procedure has been completed and then click [Finish]. 8650 4-15...
  • Page 97 Application Software 8650 4-16...
  • Page 98 http://konicaminolta.com Copyright A02E-9665-00 2007...

This manual is also suitable for:

Magicolor 8650

Table of Contents