Table Of Contents - Konica Minolta bizhub C253 User Manual

For pki card system
Hide thumbs Also See for bizhub C253:
Table of Contents

Advertisement

Contents
Contents
1
1.1
Introduction ........................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ................................................................................................1-2
Operating Precautions..............................................................................................................................1-2
INSTALLATION CHECKLIST ....................................................................................................................1-3
1.2
Security Functions ................................................................................................................................ 1-4
1.2.1
Check Count Clear Conditions .................................................................................................................1-4
1.3
Data to be Protected ............................................................................................................................ 1-5
1.4
Precautions for Operation Control...................................................................................................... 1-6
Roles and Requirements of the Administrator..........................................................................................1-6
Password Usage Requirements ...............................................................................................................1-6
Operation and control of the machine......................................................................................................1-6
Network Connection Requirements for the Machine ...............................................................................1-7
Machine Maintenance Control..................................................................................................................1-7
Implementing digital signature properly ...................................................................................................1-7
Operating conditions for the IC card and IC card reader .........................................................................1-7
IC card owner requirements .....................................................................................................................1-7
1.5
Miscellaneous ....................................................................................................................................... 1-8
Password Rules ........................................................................................................................................1-8
Precautions for Use of Various Types of Applications .............................................................................1-8
Types of Data Cleared by Overwrite All Data Function ............................................................................1-8
Items cleared by HDD Format ..................................................................................................................1-8
2
2.1
Accessing the Administrator Settings ................................................................................................ 2-2
2.1.1
Accessing the Administrator Settings ......................................................................................................2-2
<Setting can be made only from the control panel> ................................................................................2-3
2.1.2
Accessing the User Mode ........................................................................................................................2-5
<Setting can be made only from the control panel> ................................................................................2-5
2.2
Preventing Unauthorized Access........................................................................................................ 2-7
2.2.1
Setting Prohibited Functions When Authentication Error.........................................................................2-7
<Setting can be made only from the control panel> ................................................................................2-8
2.3
Setting the External Server ................................................................................................................ 2-10
2.3.1
Setting the External Server .....................................................................................................................2-10
<Setting can be made only from the control panel> ..............................................................................2-10
2.4
System Auto Reset Function ............................................................................................................. 2-13
2.4.1
Setting the System Auto Reset function.................................................................................................2-13
<Setting can be made only from the control panel> ..............................................................................2-13
2.5
Changing the Administrator Password ............................................................................................ 2-15
2.5.1
Changing the Administrator Password...................................................................................................2-15
<Setting can be made only from the control panel> ..............................................................................2-15
2.6
Protecting Data in the HDD ............................................................................................................... 2-18
2.6.1
Setting the HDD Lock Password ............................................................................................................2-18
<Setting can be made only from the control panel> ..............................................................................2-19
2.6.2
Changing the HDD Lock Password........................................................................................................2-21
<Setting can be made only from the control panel> ..............................................................................2-21
2.6.3
Setting the Encryption Key (encryption word) ........................................................................................2-24
<Setting can be made only from the control panel> ..............................................................................2-24
2.6.4
Changing the Encryption Key .................................................................................................................2-30
<Setting can be made only from the control panel> ..............................................................................2-30
2.7
Overwrite All Data Function............................................................................................................... 2-33
2.7.1
Setting the Overwrite All Data function ..................................................................................................2-33
<Setting can be made only from the control panel> ..............................................................................2-34
C253/C203
x-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bizhub c203

Table of Contents