Table Of Contents - Konica Minolta bizhub C3110 User Manual

Security operations
Hide thumbs Also See for bizhub C3110:
Table of Contents

Advertisement

Contents
1
1.1
Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2
Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3
Data to be Protected ...................................................................................................................... 1-5
1.4
Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-6
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-8
1.5
Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications ............................................................................................................ 1-10
IPP printing ...................................................................................................................................... 1-10
Items of Data Cleared by Data Erase Function................................................................................ 1-11
HDD Format ..................................................................................................................................... 1-12
Upgrading of the firmware ............................................................................................................... 1-12
Software used in the machine ......................................................................................................... 1-12
2
2.1
Accessing the Administrator Settings .......................................................................................... 2-2
Accessing the Administrator Settings................................................................................................ 2-2
2.2
Enhancing the Security Function................................................................................................... 2-5
Setting the Enhanced Security Mode ................................................................................................ 2-7
2.3
Setting the Authentication Method ............................................................................................... 2-8
Setting the Authentication Method .................................................................................................... 2-8
2.4
ID & Print Setting Function............................................................................................................. 2-9
Setting the ID & Print.......................................................................................................................... 2-9
2.5
System Auto Reset Function ....................................................................................................... 2-10
Setting the System Auto Reset function .......................................................................................... 2-10
2.6
User Setting Function ................................................................................................................... 2-12
Making user setting.......................................................................................................................... 2-12
2.7
Changing the Administrator Password....................................................................................... 2-14
Changing the Administrator Password ............................................................................................ 2-14
2.8
Protecting Data in the HDD.......................................................................................................... 2-15
2.8.1
Setting the Encryption Key (encryption word) ................................................................................. 2-15
2.8.2
Deleting the encryption key ............................................................................................................. 2-17
2.9
terminated...................................................................................................................................... 2-18
2.9.1
Setting the Overwrite All Data.......................................................................................................... 2-18
2.9.2
Setting the RESTORE ALL ............................................................................................................... 2-20
2.10
SSL Setting Function .................................................................................................................... 2-21
2.10.1
Device Certificate Setting ................................................................................................................ 2-21
2.10.2
SSL Setting ...................................................................................................................................... 2-23
2.10.3
Removing a Certificate..................................................................................................................... 2-24
bizhub C3110
Contents-1

Advertisement

Table of Contents
loading

Table of Contents