Konica Minolta bizhub C360 bizhub C220/C280/C360 Network Administrator User Gu - Page 6

Reinforcing security - scan to folder

Page 6 highlights

7.3.2 7.3.3 7.3.4 7.3.5 7.3.6 7.3.7 7.3.8 7.4 7.4.1 7.4.2 7.4.3 7.4.4 7.4.5 7.5 7.5.1 7.5.2 7.5.3 7.5.4 7.5.5 7.6 7.6.1 7.6.2 7.6.3 7.6.4 7.6.5 7.6.6 [External Server Settings]...7-16 [General Settings]...7-17 [Administrative Setting] ...7-17 [Default Function Permission] ...7-17 [Client Settings] ...7-18 [WINS Setting]...7-18 [Direct Hosting Setting] ...7-18 Restricting users of this machine (NDS over IPX/SPX 7-19 [External Server Settings]...7-19 [General Settings]...7-20 [Administrative Setting] ...7-20 [Default Function Permission] ...7-21 [NetWare Settings] ...7-21 Restricting users of this machine (NDS over TCP/IP 7-22 [TCP/IP Settings]...7-22 [External Server Settings]...7-23 [General Settings]...7-24 [Administrative Setting] ...7-24 [Default Function Permission] ...7-24 Restricting users of this machine (LDAP 7-25 [TCP/IP Settings]...7-25 [External Server Settings]...7-26 [General Settings]...7-27 [Administrative Setting] ...7-27 [Default Function Permission] ...7-27 LDAP over SSL ...7-28 [External Server Settings]...7-28 [Setting Up LDAP] ...7-28 [Certificate Verification Setting]...7-29 8 Reinforcing security 8.1 8.1.1 8.1.2 8.1.3 8.1.4 8.1.5 8.1.6 8.1.7 8.2 8.2.1 8.2.2 8.3 8.3.1 8.3.2 8.4 8.4.1 8.4.2 8.4.3 8.5 8.5.1 8.5.2 8.5.3 8.5.4 Registering the certificate of this machine for SSL communications 8-2 [Device Certificate Setting]...8-3 [Create and install a self-signed Certificate 8-4 [Request a Certificate]...8-5 [Install a Certificate]...8-6 [Import a Certificates]...8-7 [SSL Setting] ...8-7 [Remove a Certificate]...8-8 Using device certificates depending on protocol 8-9 [Device Certificate Setting]...8-10 [Protocol Setting] ...8-10 Managing a device certificate...8-11 [Device Certificate Setting]...8-11 [Export Certificate] ...8-11 Registering a user certificate in this machine 8-13 [E-mail] ...8-14 [Automatically Obtain Certificates 8-15 Certificate validation ...8-16 [Certificate Verification Level Settings 8-16 [Certificate Verification Setting]...8-16 Restricting the use of the SMB address registered in the address book 8-18 [TCP/IP Settings]...8-19 User Authentication ...8-19 [Scan to Authorized Folder Settings 8-19 [Client Setting]...8-19 bizhub C360/C280/C220 Contents-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366

bizhub C360/C280/C220
Contents-5
7.3.2
[External Server Settings]
.................................................................................................................
7-16
7.3.3
[General Settings]
.............................................................................................................................
7-17
7.3.4
[Administrative Setting]
....................................................................................................................
7-17
7.3.5
[Default Function Permission]
..........................................................................................................
7-17
7.3.6
[Client Settings]
................................................................................................................................
7-18
7.3.7
[WINS Setting]
..................................................................................................................................
7-18
7.3.8
[Direct Hosting Setting]
....................................................................................................................
7-18
7.4
Restricting users of this machine (NDS over IPX/SPX)
.............................................................
7-19
7.4.1
[External Server Settings]
.................................................................................................................
7-19
7.4.2
[General Settings]
.............................................................................................................................
7-20
7.4.3
[Administrative Setting]
....................................................................................................................
7-20
7.4.4
[Default Function Permission]
..........................................................................................................
7-21
7.4.5
[NetWare Settings]
...........................................................................................................................
7-21
7.5
Restricting users of this machine (NDS over TCP/IP)
...............................................................
7-22
7.5.1
[TCP/IP Settings]
..............................................................................................................................
7-22
7.5.2
[External Server Settings]
.................................................................................................................
7-23
7.5.3
[General Settings]
.............................................................................................................................
7-24
7.5.4
[Administrative Setting]
....................................................................................................................
7-24
7.5.5
[Default Function Permission]
..........................................................................................................
7-24
7.6
Restricting users of this machine (LDAP)
...................................................................................
7-25
7.6.1
[TCP/IP Settings]
..............................................................................................................................
7-25
7.6.2
[External Server Settings]
.................................................................................................................
7-26
7.6.3
[General Settings]
.............................................................................................................................
7-27
7.6.4
[Administrative Setting]
....................................................................................................................
7-27
7.6.5
[Default Function Permission]
..........................................................................................................
7-27
7.6.6
LDAP over SSL
................................................................................................................................
7-28
[External Server Settings]
.................................................................................................................
7-28
[Setting Up LDAP]
............................................................................................................................
7-28
[Certificate Verification Setting]
........................................................................................................
7-29
8
Reinforcing security
8.1
Registering the certificate of this machine for SSL communications
.......................................
8-2
8.1.1
[Device Certificate Setting]
.................................................................................................................
8-3
8.1.2
[Create and install a self-signed Certificate]
......................................................................................
8-4
8.1.3
[Request a Certificate]
........................................................................................................................
8-5
8.1.4
[Install a Certificate]
............................................................................................................................
8-6
8.1.5
[Import a Certificates]
.........................................................................................................................
8-7
8.1.6
[SSL Setting]
......................................................................................................................................
8-7
8.1.7
[Remove a Certificate]
........................................................................................................................
8-8
8.2
Using device certificates depending on protocol
........................................................................
8-9
8.2.1
[Device Certificate Setting]
...............................................................................................................
8-10
8.2.2
[Protocol Setting]
.............................................................................................................................
8-10
8.3
Managing a device certificate
......................................................................................................
8-11
8.3.1
[Device Certificate Setting]
...............................................................................................................
8-11
8.3.2
[Export Certificate]
...........................................................................................................................
8-11
8.4
Registering a user certificate in this machine
............................................................................
8-13
8.4.1
[E-mail]
.............................................................................................................................................
8-14
8.4.2
[Automatically Obtain Certificates]
...................................................................................................
8-15
8.4.3
Certificate validation
........................................................................................................................
8-16
[Certificate Verification Level Settings]
............................................................................................
8-16
[Certificate Verification Setting]
........................................................................................................
8-16
8.5
Restricting the use of the SMB address registered in the address book
................................
8-18
8.5.1
[TCP/IP Settings]
..............................................................................................................................
8-19
8.5.2
User Authentication
.........................................................................................................................
8-19
8.5.3
[Scan to Authorized Folder Settings]
...............................................................................................
8-19
8.5.4
[Client Setting]
..................................................................................................................................
8-19