Konica Minolta bizhub C253 User Manual

Konica Minolta bizhub C253 User Manual

For pki card system
Hide thumbs Also See for bizhub C253:
Table of Contents

Advertisement

User's Guide [Security Operations]
2010. 7
Ver. 1.01

Advertisement

Table of Contents
loading

Summary of Contents for Konica Minolta bizhub C253

  • Page 1 User’s Guide [Security Operations] 2010. 7 Ver. 1.01...
  • Page 2: Table Of Contents

    Contents Contents Security Introduction ............................1-2 Compliance with the ISO15408 Standard ....................1-2 Operating Precautions..........................1-2 INSTALLATION CHECKLIST ........................1-3 Security Functions ..........................1-4 1.2.1 Check Count Clear Conditions .........................1-4 Data to be Protected ..........................1-5 Precautions for Operation Control...................... 1-6 Roles and Requirements of the Administrator..................1-6 Password Usage Requirements .......................1-6 Operation and control of the machine......................1-6 Network Connection Requirements for the Machine ................1-7...
  • Page 3 Contents S/MIME Communication Setting Function ..................2-36 2.8.1 Setting the S/MIME Communication ......................2-36 <Setting can be made only from the control panel> ................2-36 TCP/IP Setting Function........................2-40 2.9.1 Setting the IP Address..........................2-40 <Setting can be made only from the control panel> ................2-40 2.9.2 Registering the DNS Server........................2-41 <Setting can be made only from the control panel>...
  • Page 4: Security

    Security...
  • Page 5: Introduction

    This User’s Guide contains the operating procedures and precautions to be used when using the security functions offered by the bizhub C253/C203 machine. To ensure the best possible performance and effective use of the machine, read this manual thoroughly before using the security functions. The Administrator of the machine should keep this manual for ready reference.
  • Page 6: Installation Checklist

    Security INSTALLATION CHECKLIST This Installation Checklist contains items that are to be check by the Service Engineer installing this machine. The Service Engineer should check the following items, then explain each checked item to the Administrator of the machine. To Service Engineer Make sure that each of these items is properly carried out by checking the box on the right of each item.
  • Page 7: Security Functions

    Security Security Functions A password that can be set must meet the requirements of the Password Rules. The machine does not ac- cept setting of an easily decipherable password. For details of the Password Rules, see "Password Rules" on page 1-8.
  • Page 8: Data To Be Protected

    Security Data to be Protected The underlying concept of this machine toward security is "to protect data that can be disclosed against the intention of users." The following types of image files that have been stored in the machine and made available for use by its users are protected while the machine is being used.
  • Page 9: Precautions For Operation Control

    Security Precautions for Operation Control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. Roles and Requirements of the Administrator The Administrator should take full responsibility for controlling the machine, thereby ensuring that no improp- er operations are performed.
  • Page 10: Network Connection Requirements For The Machine

    Security The Administrator should disable Write Setting of SNMP v1/v2c and control the operation of the ma- chine for use in the disable state. – To disable Write Setting of SNMP v1/v2c, press the [Utility/Counter] key, and then [Administrator Set- tings] - [Network Settings] - [SNMP Settings] - [Forward] - [SNMP v1/v2c Settings] - [Forward] on the MFP control panel, and set "Write Setting"...
  • Page 11: Miscellaneous

    Security Miscellaneous Password Rules According to certain Password Rules, registration of a password consisting of a string of a single character or change of a password to one consisting of a string of a single character is rejected for the HDD Lock Pass- word and Encryption Key.
  • Page 12: Administrator Operations

    Administrator Operations...
  • Page 13: Accessing The Administrator Settings

    Administrator Operations Administrator Operations Accessing the Administrator Settings This machine implements authentication of the user of the Administrator Settings function through the 8-digit Administrator Password that verifies the identity as the Administrator of the person who accesses the func- tion. During the authentication procedure, the Administrator Password entered for the authentication purpose appears as "*"...
  • Page 14: Setting Can Be Made Only From The Control Panel

    Administrator Operations <Setting can be made only from the control panel> Press the [Utility/Counter] key. Touch [Administrator Settings]. Is it possible to gain access to the Administrator Settings while a job is being executed? % The machine does not accept access to the Administrator Settings while a job is being executed. Wait until the execution of the job is completed before attempting to access the Administrator Set- tings again.
  • Page 15 Administrator Operations Touch [OK]. What happens if a wrong Administrator Password is entered? % If a wrong Administrator Password is entered, a message appears saying that there is a mismatch in the Administrator Passwords and entry of the Administrator Password will be prohibited for five sec.
  • Page 16: Accessing The User Mode

    Administrator Operations 2.1.2 Accessing the User Mode Note Make sure that none of the general users of the machine will know the Administrator Password. If the Administrator Password is forgotten, it must be set again by the Service Engineer. Contact your Service Representative.
  • Page 17 Administrator Operations Enter the 8-digit Administrator Password from the keyboard and keypad. – Press the [C] key to clear all characters. – Touch [Delete] to delete the last character entered. – Touch [Shift] to show the upper case/symbol screen. – Touch [Cancel] to go back to the screen shown in step 2.
  • Page 18: Preventing Unauthorized Access

    Administrator Operations Preventing Unauthorized Access When access by the Administrator of the machine through the Administrator Settings via the control panel is authenticated, the machine enables setting of the operation of Prohibited Functions When Authentication Er- ror. The machine then takes a count of the number of unsuccessful accesses to the Administrator Settings to prohibit the authentication operation.
  • Page 19: Setting Can Be Made Only From The Control Panel>

    Administrator Operations <Setting can be made only from the control panel> For the procedure to call the Administrator Settings to the display, see "Accessing the Administrator Settings" on page 2-2. Call the Administrator Settings to the screen from the control panel. Touch [Security Settings].
  • Page 20 Administrator Operations Touch [Mode 2]. – To change the check count, touch [+] to increase the count or [-] to decrease it. Touch [Release Time Settings]. Press the [C] key and, from the keypad, enter the time, after the lapse of which the access lock state of the Administrator Settings is canceled.
  • Page 21: Setting The External Server

    Administrator Operations Setting the External Server When access to the Administrator of the machine by the Administrator Settings via the control panel is au- thenticated, the machine enables setting of the External Server. The External Server that can be used for authentication is Active Directory only. Operate the machine in Ac- tive Directory.
  • Page 22 Administrator Operations Touch [Server Type]. Touch [Active Directory]. From the keyboard and keypad, enter the Domain Name and touch [OK]. C253/C203 2-11...
  • Page 23 Administrator Operations Touch [OK]. Make the necessary settings. What happens if the Sever Name is yet to be entered? % If the Sever Name is yet to be entered, the [OK] cannot be touched. Be sure to enter the Sever Name. Touch [OK].
  • Page 24: System Auto Reset Function

    Administrator Operations System Auto Reset Function When access to the Administrator of the machine by the Administrator Settings via the control panel is au- thenticated, the machine enables setting of the operation of the System Auto Reset function. If no operations are performed for a predetermined period of time during access to the Administrator Settings or user mode (during setting of User Authentication) from the control panel, the System Auto Reset function automatically causes the user to log off from the mode.
  • Page 25 Administrator Operations Touch [System Auto Reset]. Press the [C] key and enter the period of time (1 min. to 9 min.) after which System Auto Reset is acti- vated from the keypad. – The time for System Auto Reset can be set to a value between 1 min. and 9 min., variable in 1-min. increments.
  • Page 26: Setting Can Be Made Only From The Control Panel

    Administrator Operations Changing the Administrator Password When access to the Administrator of the machine from the control panel by the Administrator Settings is au- thenticated, the machine enables the operation of changing the Administrator Password required for access- ing the Administrator Settings. The Administrator Password entered for the authentication purpose appears as "*"...
  • Page 27 Administrator Operations Touch [OK]. What if an Administrator Password different from that is currently registered is mistakenly entered? % If there is a mismatch between the currently registered Administrator Password and the Administra- tor Password entered, a message appears that tells that there is a mismatch in the Administrator Passwords.
  • Page 28 Administrator Operations – Touch [Cancel] to go back to the Security Settings screen. Touch [OK]. What happens if there is a mismatch in the Administrator Passwords? % If there is a mismatch in the Administrator Passwords, a message appears that tells that there is a mismatch in the Administrator Passwords.
  • Page 29: Protecting Data In The Hdd

    Administrator Operations Protecting Data in the HDD When access to the Administrator of the machine by the Administrator Settings is authenticated, the machine enables the operation for setting and changing the HDD Lock Password. It also enables the operation for set- ting and changing the Encryption Key when the optional Security Kit SC-503 is mounted.
  • Page 30: Setting Can Be Made Only From The Control Panel

    Administrator Operations <Setting can be made only from the control panel> For the procedure to call the Security Settings menu to the display, see steps 1 and 2 of "Setting Pro- hibited Functions When Authentication Error" on page 2-7. Call the Security Settings to the screen from the control panel. Touch [HDD Settings].
  • Page 31 Administrator Operations Touch [OK]. What happens if the HDD Lock Password entered does not meet the requirements of the Password Rules? % If the HDD Lock Password entered does not comply with the Password Rules, a message appears that tells that the HDD Lock Password entered cannot be used. Enter the correct HDD Lock Pass- word.
  • Page 32: Changing The Hdd Lock Password

    Administrator Operations 2.6.2 Changing the HDD Lock Password Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 33 Administrator Operations Enter the new 20-digit HDD Lock Password from the keyboard and keypad. – Press the [C] key to clear all characters. – Touch [Delete] to delete the last character entered. – Touch [Shift] to show the upper case/symbol screen. –...
  • Page 34 Administrator Operations Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch. Note NEVER forget the HDD Lock Password set through the above procedure. The HDD Lock Password must be entered when changing canceling the HDD Lock Password.
  • Page 35: Setting The Encryption Key (Encryption Word)

    Administrator Operations 2.6.3 Setting the Encryption Key (encryption word) Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 36 Administrator Operations Enter the new 20-digit Encryption Key from the keyboard and keypad. – Press the [C] key to clear all characters. – Touch [Delete] to delete the last character entered. – Touch [Shift] to show the upper case/symbol screen. –...
  • Page 37 Administrator Operations Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch. The following screen appears after the machine has been restarted. Call the Administrator Settings to the screen from the control panel.
  • Page 38 Administrator Operations A message will appear that confirms whether the HDD may be formatted or not. Select the [Yes] and touch [OK]. What happens when HDD Format is executed? % Executing HDD Format erases data in the HDD. It is recommended that important data be saved in a backup medium in advance.
  • Page 39 Administrator Operations Touch [Overwrite Temporary Data]. Touch [Encryption Priority] or [Overwrite Priority]. Touch [OK]. – If the setting has been changed in step 16, the screen shown in step 18 will appear. Perform HDD Format. A message appears requesting confirmation of the execution of HDD format. Select [Yes] and touch [OK].
  • Page 40 Administrator Operations Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch. C253/C203 2-29...
  • Page 41: Setting Can Be Made Only From The Control Panel

    Administrator Operations 2.6.4 Changing the Encryption Key Note When the main power switch is turned off, then on again, wait at least 10 seconds to turn it on after turning it off. if there is no wait period between turning the main power switch off, then on again, the machine may not function properly.
  • Page 42 Administrator Operations Enter the new 20-digit Encryption Key from the keyboard and keypad. – Press the [C] key to clear all characters. – Touch [Delete] to delete the last character entered. – Touch [Shift] to show the upper case/symbol screen. –...
  • Page 43 Administrator Operations Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch. C253/C203 2-32...
  • Page 44: Overwrite All Data Function

    Administrator Operations Overwrite All Data Function When access to the Administrator Settings by the Administrator of the machine via the control panel is au- thenticated, the machine enables setting of the operation of the Overwrite All Data function. When the machine is to be discarded, or use of a leased machine is terminated at the end of the leasing con- tract, the Overwrite All Data function overwrites and erases all data stored in all spaces of the HDD.
  • Page 45: Setting Can Be Made Only From The Control Panel

    Administrator Operations <Setting can be made only from the control panel> For the procedure to call the HDD Settings menu to the display, see steps 1 and 2 of "Setting the HDD Lock Password" on page 2-18. Call the HDD Settings to the screen from the control panel. Touch [Overwrite All Data].
  • Page 46 Administrator Operations Make sure that a message appears prompting you to turn OFF and then ON the main power switch. Now, turn OFF and then turn ON the main power switch. Note After the main power switch has been turned on, quickly turn it off and give the machine to the Service Engineer.
  • Page 47: S/Mime Communication Setting Function

    Administrator Operations S/MIME Communication Setting Function When access to the Administrator of the machine by the Administrator Settings is authenticated, the machine enables the setting of encryption of text of e-mail transmitted and received between the PC and the machine. Note Be sure to set [Always add signature] or [Select when sending] for Digital Signature.
  • Page 48 Administrator Operations Touch [S/MIME Communication Settings]. Select [ON] and [E-Mail Text Encryption Method]. Select encryption strength and touch [OK]. Touch [OK]. C253/C203 2-37...
  • Page 49 Administrator Operations Select [Automatically Obtain Certificates]. Select [NO] and touch [OK]. Select [Digital Signature]. C253/C203 2-38...
  • Page 50 Administrator Operations Select [Always add signature] or [Select when sending] and touch [OK]. Touch [OK]. C253/C203 2-39...
  • Page 51: Setting Can Be Made Only From The Control Panel

    Administrator Operations TCP/IP Setting Function When access to the Administrator of the machine by the Administrator Settings is authenticated, the machine enables setting of the IP Address and registration of the DNS Server. 2.9.1 Setting the IP Address Note Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings.
  • Page 52: Registering The Dns Server

    Administrator Operations 2.9.2 Registering the DNS Server Note Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings. <Setting can be made only from the control panel>...
  • Page 53: Netware Setting Function

    Administrator Operations 2.10 NetWare Setting Function When access to the Administrator of the machine by the Administrator Settings is authenticated, the machine enables registration as the Print Server. 2.10.1 Making the NetWare Setting Note Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings.
  • Page 54: Smb Setting Function

    Administrator Operations 2.11 SMB Setting Function When access to the Administrator of the machine by the Administrator Settings is authenticated, the machine enables setting of the NetBIOS Name. 2.11.1 Setting the NetBIOS Name Note Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings.
  • Page 55: Setting Can Be Made Only From The Control Panel

    Administrator Operations 2.12 E-Mail Setting Function When access to the Administrator of the machine by the Administrator Settings is authenticated, the machine enables setting of the SMTP Server (E-Mail Server). 2.12.1 Setting the SMTP Server (E-Mail Server) Note Do not leave the machine with the setting screen of Administrator Settings left shown on the display. If it is absolutely necessary to leave the machine, be sure first to log off from the Administrator Settings.
  • Page 56: User Operations

    User Operations...
  • Page 57: User Authentication Function

    User Operations User Operations User Authentication Function To authenticate a user before he or she actually uses the machine, user authentication is performed using the IC card and PIN code. The IC card reader installed in the machine is used to read the IC card. The PIN code entered is displayed as "*"...
  • Page 58: Setting Can Be Made Only From The Control Panel

    User Operations <Setting can be made only from the control panel> Insert the IC card into the IC card reader connected to the machine. – The following screen appears if any document is stored in the PKI Encrypted Document User Box. Make sure that the IC card is recognized, press [Access] or touch [Login].
  • Page 59 User Operations Enter the PIN code from the keyboard or 10-key pad and touch [OK]. – Press the [C] key to clear all characters. – Touch [Delete] to delete the last character entered. – Touch [Shift] to show the upper case/symbol screen. –...
  • Page 60: Encrypted Document Function

    User Operations Encrypted Document Function This function is used when a document encrypted by the dedicated printer driver and IC card from the PC side is stored in the machine. The PKI encrypted document stored in the machine can be decrypted only by an encrypted IC card, which makes this function just right for printing highly confidential documents.
  • Page 61 User Operations Touch [System User Box] tab. Select [Encrypted document User Box] and touch [OK]. Select [PKI Encrypted Document User Box] and touch [OK]. C253/C203...
  • Page 62 User Operations Select the desired PKI Encrypted Document and touch [Print]. – To Delete PKI Encrypted Document, select [Delete]. C253/C203...
  • Page 63: Scan To Me Function

    User Operations Scan to Me Function The machine allows all users who have been authenticated with the IC card to operate the Scan to Me func- tion. Scan to Me encrypts the image file scanned by the user on this machine using the IC card and transmits it as a mail data file of S/MIME to the mail address of the IC card user.
  • Page 64 User Operations Select [E-Mail Encryption] and [Digital Signature]. – If [E-Mail Encryption] and [Digital Signature] are selected after the destination has been set, the set destination is canceled, making it necessary to set the destination once again. Touch [Close]. Touch [E-mail]. Check that the destination is your e-mail address and then touch [OK].
  • Page 65 http://konicaminolta.com Copyright A02E-9692-11F 2009...

This manual is also suitable for:

Bizhub c203

Table of Contents