Konica Minolta bizhub C220 User Manual page 7

Network administrator
Hide thumbs Also See for bizhub C220:
Table of Contents

Advertisement

8.5.5
[WINS Setting].................................................................................................................................. 8-19
8.5.6
[Direct Hosting Setting] .................................................................................................................... 8-19
8.5.7
[LLMNR Setting]............................................................................................................................... 8-19
8.6
to this machine via SSL ................................................................................................................ 8-20
8.6.1
[TCP/IP Settings].............................................................................................................................. 8-20
8.6.2
[Device Certificate Setting]............................................................................................................... 8-20
8.6.3
[Web Service Common Settings] ..................................................................................................... 8-20
8.7
to Vista/Server 2008...................................................................................................................... 8-21
8.7.1
[TCP/IP Settings].............................................................................................................................. 8-21
8.7.2
[Web Service Common Settings] ..................................................................................................... 8-21
[Certificate Verification Setting]........................................................................................................ 8-22
8.8
Filtering IP addresses ................................................................................................................... 8-23
8.8.1
[TCP/IP Settings].............................................................................................................................. 8-23
8.8.2
[IP Filtering] ...................................................................................................................................... 8-24
8.9
Communicating using IPsec ........................................................................................................ 8-25
8.9.1
[TCP/IP Settings].............................................................................................................................. 8-25
8.9.2
[IPsec] .............................................................................................................................................. 8-26
8.9.3
[IKE].................................................................................................................................................. 8-26
[IKE Settings].................................................................................................................................... 8-27
8.9.4
[SA]................................................................................................................................................... 8-27
[SA Setting] ...................................................................................................................................... 8-27
8.9.5
[Peer] ................................................................................................................................................ 8-28
8.10
Using IEEE802.1X authentication ................................................................................................ 8-29
8.10.1
[TCP/IP Setting] ............................................................................................................................... 8-29
8.10.2
[Device Certificate Setting]............................................................................................................... 8-29
8.10.3
[IEEE802.1x Authentication Setting] ................................................................................................ 8-30
8.10.4
Certificate validation ........................................................................................................................ 8-31
[IEEE802.1x Authentication Setting] ................................................................................................ 8-31
[Certificate Verification Setting]........................................................................................................ 8-32
8.10.5
[IEEE802.1X Authentication Trial]..................................................................................................... 8-33
8.11
Managing external certificates .................................................................................................... 8-34
[External Certificate Setting] ............................................................................................................ 8-34
8.12
Limiting accessible destinations for each user ......................................................................... 8-36
[Address Reference Setting] ............................................................................................................ 8-36
8.13
Restricting Registration and Change by a User......................................................................... 8-37
[Restrict User Access]...................................................................................................................... 8-37
8.14
Configuring Copy Security Settings ............................................................................................ 8-38
[Copy Security]................................................................................................................................. 8-38
8.15
Configuring the administrator password.................................................................................... 8-39
[Administrator Password Setting] .................................................................................................... 8-39
8.16
Configuring the function permission of the public user............................................................ 8-40
[Public User]..................................................................................................................................... 8-40
8.17
Restricting Users' Direct Entry of Destinations ......................................................................... 8-42
[Scan to Authorized Folder Settings] ............................................................................................... 8-42
9
9.1
9.1.1
[TCP/IP Settings]................................................................................................................................ 9-2
9.1.2
[Device Certificate Setting]................................................................................................................. 9-2
9.1.3
[TCP Socket Setting].......................................................................................................................... 9-3
9.2
Linking an OpenAPI system with this machine............................................................................ 9-4
9.2.1
[TCP/IP Settings]................................................................................................................................ 9-4
9.2.2
[SSDP Settings].................................................................................................................................. 9-5
9.2.3
[Device Certificate Setting]................................................................................................................. 9-5
9.2.4
[OpenAPI Setting]............................................................................................................................... 9-6
bizhub C360/C280/C220
Contents-6

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub c280Bizhub c360

Table of Contents