bizhub 423/363/283/223
Contents-5
7.3.2
[External Server Settings]
.................................................................................................................
7-16
7.3.3
[General Settings]
.............................................................................................................................
7-17
7.3.4
[Administrative Setting]
....................................................................................................................
7-17
7.3.5
[Default Function Permission]
..........................................................................................................
7-17
7.3.6
[Client Setting]
..................................................................................................................................
7-18
7.3.7
[WINS Setting]
..................................................................................................................................
7-18
7.3.8
[Direct Hosting Setting]
....................................................................................................................
7-18
7.4
Restricting users of this machine (NDS over IPX/SPX)
.............................................................
7-19
7.4.1
[External Server Settings]
.................................................................................................................
7-19
7.4.2
[General Settings]
.............................................................................................................................
7-20
7.4.3
[Administrative Setting]
....................................................................................................................
7-20
7.4.4
[Default Function Permission]
..........................................................................................................
7-21
7.4.5
[NetWare Settings]
...........................................................................................................................
7-21
7.5
Restricting users of this machine (NDS over TCP/IP)
...............................................................
7-22
7.5.1
[TCP/IP Settings]
..............................................................................................................................
7-22
7.5.2
[External Server Settings]
.................................................................................................................
7-23
7.5.3
[General Settings]
.............................................................................................................................
7-24
7.5.4
[Administrative Setting]
....................................................................................................................
7-24
7.5.5
[Default Function Permission]
..........................................................................................................
7-24
7.6
Restricting users of this machine (LDAP)
...................................................................................
7-25
7.6.1
[TCP/IP Settings]
..............................................................................................................................
7-25
7.6.2
[External Server Settings]
.................................................................................................................
7-26
7.6.3
[General Settings]
.............................................................................................................................
7-27
7.6.4
[Administrative Setting]
....................................................................................................................
7-27
7.6.5
[Default Function Permission]
..........................................................................................................
7-27
7.6.6
LDAP over SSL
................................................................................................................................
7-28
[External Server Settings]
.................................................................................................................
7-28
[Setting Up LDAP]
............................................................................................................................
7-28
[Certificate Verification Setting]
........................................................................................................
7-29
8
Reinforcing security
8.1
Registering the certificate of this machine for SSL communications
.......................................
8-2
8.1.1
[Device Certificate Setting]
.................................................................................................................
8-3
8.1.2
[Create and install a self-signed Certificate]
......................................................................................
8-4
8.1.3
[Request a Certificate]
........................................................................................................................
8-5
8.1.4
[Install a Certificate]
............................................................................................................................
8-6
8.1.5
[Import a Certificates]
.........................................................................................................................
8-7
8.1.6
[SSL Setting]
......................................................................................................................................
8-7
8.1.7
[Remove a Certificate]
........................................................................................................................
8-8
8.2
Using device certificates depending on protocol
........................................................................
8-9
8.2.1
[Device Certificate Setting]
...............................................................................................................
8-10
8.2.2
[Protocol Setting]
.............................................................................................................................
8-10
8.3
Managing a device certificate
......................................................................................................
8-11
8.3.1
[Device Certificate Setting]
...............................................................................................................
8-11
8.3.2
[Export Certificate]
...........................................................................................................................
8-11
8.4
Registering a user certificate in this machine
............................................................................
8-13
8.4.1
[E-mail]
.............................................................................................................................................
8-14
8.4.2
[Automatically Obtain Certificates]
...................................................................................................
8-15
8.4.3
Certificate validation
........................................................................................................................
8-16
[Certificate Verification Level Settings]
............................................................................................
8-16
[Certificate Verification Setting]
........................................................................................................
8-16
8.5
Restricting the use of the SMB address registered in the address book
................................
8-18
8.5.1
[TCP/IP Settings]
..............................................................................................................................
8-19
8.5.2
User Authentication
.........................................................................................................................
8-19
8.5.3
[Scan to Authorized Folder Settings]
...............................................................................................
8-19
8.5.4
[Client Setting]
..................................................................................................................................
8-19