Konica Minolta Bizhub 36 Handleiding


Lees hieronder de πŸ“– handleiding in het Nederlandse voor Konica Minolta Bizhub 36 (94 pagina's) in de categorie Printer. Deze handleiding was nuttig voor 58 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld

Pagina 1/94
User’s Guide [Security Operations]
2012. 2
Ver. 1.03
bizhub 42/36 Contents-1
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2 Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3 Data to be Protected ...................................................................................................................... 1-5
1.4 Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
User information control system control requirements ..................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-7
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7
1.5 Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications ............................................................................................................ 1-10
IPP printing ...................................................................................................................................... 1-10
Items of Data Cleared by Data Erase Function................................................................................ 1-11
HDD Format ..................................................................................................................................... 1-12
Upgrading of the firmware ............................................................................................................... 1-12
2 Administrator Operations
2.1 Accessing the Admin Settings....................................................................................................... 2-2
Accessing the Admin Settings........................................................................................................... 2-2
2.2 Enhancing the Security Function................................................................................................... 2-5
Setting the Enhanced Security Mode ................................................................................................ 2-7
2.3 Setting the Authentication Method ............................................................................................... 2-9
Setting the Authentication Method .................................................................................................... 2-9
2.4 ID & Print Setting Function........................................................................................................... 2-12
Setting the ID & Print........................................................................................................................ 2-12
2.5 Auto Reset Function ..................................................................................................................... 2-13
Setting the Auto Reset function ....................................................................................................... 2-13
2.6 User Setting Function ................................................................................................................... 2-16
Making user setting.......................................................................................................................... 2-16
2.7 IC card information Setting Function.......................................................................................... 2-18
Registering information from the control panel ............................................................................... 2-18
2.8 Changing the Administrator Password....................................................................................... 2-20
Changing the Administrator Password ............................................................................................ 2-20
2.9 Erasing data when the machine is to be discarded or use of a leased machine is
terminated...................................................................................................................................... 2-22
2.9.1 Setting the Overwrite All Data.......................................................................................................... 2-22
2.9.2 Setting the SSD Low-level Format................................................................................................... 2-25
2.9.3 Setting the Restore All ..................................................................................................................... 2-26
2.10 SSL Setting Function .................................................................................................................... 2-27
2.10.1 Device Certificate Setting ................................................................................................................ 2-27
2.10.2 SSL Setting ...................................................................................................................................... 2-29
2.10.3 Removing a Certificate..................................................................................................................... 2-30
bizhub 42/36 Contents-2
2.11 SNMP Setting Function ................................................................................................................ 2-31
2.11.1 Changing the auth-password and priv-password ........................................................................... 2-31
2.11.2 SNMP access authentication function............................................................................................. 2-32
2.11.3 SNMP v3 setting function ................................................................................................................ 2-32
2.11.4 SNMP network setting function ....................................................................................................... 2-32
2.12 Accessing the Scan to HDD file................................................................................................... 2-33
Accessing the image file .................................................................................................................. 2-33
2.13 TCP/IP Setting Function ............................................................................................................... 2-35
2.13.1 Setting the IP Address ................................................................. .................................. .................. 2-35
2.13.2 Registering the DNS Server ............................................................................................................. 2-35
2.14 NetWare Setting Function ............................................................................................................ 2-36
Making the NetWare Setting............................................................................................................ 2-36
2.15 SMB Setting Function................................................................................................................... 2-37
Making the SMB Setting .................................................................................................................. 2-37
2.16 AppleTalk Setting Function.......................................................................................................... 2-38
Making the AppleTalk Setting .......................................................................................................... 2-38
2.17 E-Mail Setting Function................................................................................................................ 2-39
Setting the SMTP Server (E-Mail Server)......................................................................................... 2-39
3 User Operations
3.1 User Authentication Function ........................................................................................................ 3-2
3.1.1 Performing user authentication (authentication through entry of the user name and
user password)....................................................................................................................................3-3
3.1.2 Performing user authentication (identification through the IC card) .................................................. 3-7
3.1.3 Performing user authentication (authentication through the IC card + user password) .................... 3-8
3.2 ID & Print Function ........................................................................................................................ 3-12
3.2.1 Registering ID & Print files ............................................................................................................... 3-12
3.2.2 Accessing the ID & Print file............................................................................................................. 3-14
3.3 Change Password Function......................................................................................................... 3-16
Performing Change Password ......................................................................................................... 3-16
3.4 Secured Job Function................................................................................................................... 3-18
3.4.1 Registering Secured Job files .......................................................................................................... 3-18
3.4.2 Accessing the Secured Job file ....................................................................................................... 3-20
3.5 Scan to HDD Function .................................................................................................................. 3-23
3.5.1 Registering image files..................................................................................................................... 3-23
3.5.2 Accessing the image file .................................................................................................................. 3-25
4 Application Software
4.1 PageScope Data Administrator ..................................................................................................... 4-2
Precautions during backup or restore ............................................................................................... 4-2
4.1.1 Accessing from PageScope Data Administrator ............................................................................... 4-2
4.1.2 Setting the user authentication method............................................................................................. 4-4
4.1.3 Changing the authentication mode.................................................................................................... 4-6
4.1.4 Making the user settings.................................................................................................................... 4-9
4.1.5 Setting the IC card information........................................................................................................ 4-10
4.2 TWAIN driver.................................................................................................................................. 4-12
Accessing from the TWAIN driver.................................................................................................... 4-12


Product specificaties

Merk: Konica Minolta
Categorie: Printer
Model: Bizhub 36

Heb je hulp nodig?

Als je hulp nodig hebt met Konica Minolta Bizhub 36 stel dan hieronder een vraag en andere gebruikers zullen je antwoorden




Handleiding Printer Konica Minolta

Handleiding Printer

Nieuwste handleidingen voor Printer