bizhub 423/363/283/223
Contents-1
Contents
1
Security
1.1
Introduction
.....................................................................................................................................
1-2
Compliance with the ISO15408 Standard
.........................................................................................
1-2
Operating Precautions
.......................................................................................................................
1-2
INSTALLATION CHECKLIST
..............................................................................................................
1-3
1.2
Security Functions
..........................................................................................................................
1-4
Check Count Clear Conditions
..........................................................................................................
1-4
1.3
Data to be Protected
......................................................................................................................
1-5
1.4
Precautions for Operation Control
................................................................................................
1-6
Roles and Requirements of the Administrator
...................................................................................
1-6
Password Usage Requirements
........................................................................................................
1-6
Operation and control of the machine
...............................................................................................
1-6
Network Connection Requirements for the Machine
.........................................................................
1-7
Machine Maintenance Control
...........................................................................................................
1-7
Implementing digital signature properly
.............................................................................................
1-7
Operating conditions for the IC card and IC card reader
..................................................................
1-7
IC card owner requirements
..............................................................................................................
1-7
1.5
Miscellaneous
..................................................................................................................................
1-8
Password Rules
.................................................................................................................................
1-8
Precautions for Use of Various Types of Applications
.......................................................................
1-8
Items of Data Cleared by Overwrite All Data Function
......................................................................
1-8
Items cleared by HDD Format
...........................................................................................................
1-8
Fax functions
......................................................................................................................................
1-9
2
Administrator Operations
2.1
Accessing the Administrator Settings
..........................................................................................
2-2
2.1.1
Accessing the Administrator Settings
................................................................................................
2-2
2.1.2
Accessing the User Mode
..................................................................................................................
2-4
2.2
Preventing Unauthorized Access
..................................................................................................
2-6
Setting Prohibited Functions When Authentication Error
..................................................................
2-6
2.3
Setting the External Server
............................................................................................................
2-9
Setting the External Server
................................................................................................................
2-9
2.4
System Auto Reset Function
.......................................................................................................
2-12
Setting the System Auto Reset function
..........................................................................................
2-12
2.5
Changing the Administrator Password
.......................................................................................
2-14
Changing the Administrator Password
............................................................................................
2-14
2.6
Protecting Data in the HDD
..........................................................................................................
2-16
2.6.1
Setting the Encryption Key (encryption word)
.................................................................................
2-16
2.6.2
Changing the Encryption Key
..........................................................................................................
2-22
2.7
Overwrite All Data Function
.........................................................................................................
2-24
Setting the Overwrite All Data function
............................................................................................
2-24
2.8
S/MIME Communication Setting Function
.................................................................................
2-26
Setting the S/MIME Communication
...............................................................................................
2-26
2.9
PC-Fax RX Setting Function
........................................................................................................
2-29
PC-Fax RX Setting
...........................................................................................................................
2-29
2.10
TSI User Box Setting Function
.....................................................................................................
2-31
TSI User Box Setting
........................................................................................................................
2-31
2.11
TCP/IP Setting Function
...............................................................................................................
2-33
2.11.1
Setting the IP Address
.....................................................................................................................
2-33
2.11.2
Registering the DNS Server
.............................................................................................................
2-33
2.12
NetWare Setting Function
............................................................................................................
2-34
Making the NetWare Setting
............................................................................................................
2-34
2.13
SMB Setting Function
...................................................................................................................
2-35