Konica Minolta bizhub 223 bizhub 423/363/283/223 Network Administrator User Gu - Page 6

Reinforcing security - scan to folder

Page 6 highlights

7.3.2 7.3.3 7.3.4 7.3.5 7.3.6 7.3.7 7.3.8 7.4 7.4.1 7.4.2 7.4.3 7.4.4 7.4.5 7.5 7.5.1 7.5.2 7.5.3 7.5.4 7.5.5 7.6 7.6.1 7.6.2 7.6.3 7.6.4 7.6.5 7.6.6 [External Server Settings]...7-16 [General Settings]...7-17 [Administrative Setting] ...7-17 [Default Function Permission] ...7-17 [Client Setting]...7-18 [WINS Setting]...7-18 [Direct Hosting Setting] ...7-18 Restricting users of this machine (NDS over IPX/SPX 7-19 [External Server Settings]...7-19 [General Settings]...7-20 [Administrative Setting] ...7-20 [Default Function Permission] ...7-21 [NetWare Settings] ...7-21 Restricting users of this machine (NDS over TCP/IP 7-22 [TCP/IP Settings]...7-22 [External Server Settings]...7-23 [General Settings]...7-24 [Administrative Setting] ...7-24 [Default Function Permission] ...7-24 Restricting users of this machine (LDAP 7-25 [TCP/IP Settings]...7-25 [External Server Settings]...7-26 [General Settings]...7-27 [Administrative Setting] ...7-27 [Default Function Permission] ...7-27 LDAP over SSL ...7-28 [External Server Settings]...7-28 [Setting Up LDAP] ...7-28 [Certificate Verification Setting]...7-29 8 Reinforcing security 8.1 8.1.1 8.1.2 8.1.3 8.1.4 8.1.5 8.1.6 8.1.7 8.2 8.2.1 8.2.2 8.3 8.3.1 8.3.2 8.4 8.4.1 8.4.2 8.4.3 8.5 8.5.1 8.5.2 8.5.3 8.5.4 Registering the certificate of this machine for SSL communications 8-2 [Device Certificate Setting]...8-3 [Create and install a self-signed Certificate 8-4 [Request a Certificate]...8-5 [Install a Certificate]...8-6 [Import a Certificates]...8-7 [SSL Setting] ...8-7 [Remove a Certificate]...8-8 Using device certificates depending on protocol 8-9 [Device Certificate Setting]...8-10 [Protocol Setting] ...8-10 Managing a device certificate...8-11 [Device Certificate Setting]...8-11 [Export Certificate] ...8-11 Registering a user certificate in this machine 8-13 [E-mail] ...8-14 [Automatically Obtain Certificates 8-15 Certificate validation ...8-16 [Certificate Verification Level Settings 8-16 [Certificate Verification Setting]...8-16 Restricting the use of the SMB address registered in the address book 8-18 [TCP/IP Settings]...8-19 User Authentication ...8-19 [Scan to Authorized Folder Settings 8-19 [Client Setting]...8-19 bizhub 423/363/283/223 Contents-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371

bizhub 423/363/283/223
Contents-5
7.3.2
[External Server Settings]
.................................................................................................................
7-16
7.3.3
[General Settings]
.............................................................................................................................
7-17
7.3.4
[Administrative Setting]
....................................................................................................................
7-17
7.3.5
[Default Function Permission]
..........................................................................................................
7-17
7.3.6
[Client Setting]
..................................................................................................................................
7-18
7.3.7
[WINS Setting]
..................................................................................................................................
7-18
7.3.8
[Direct Hosting Setting]
....................................................................................................................
7-18
7.4
Restricting users of this machine (NDS over IPX/SPX)
.............................................................
7-19
7.4.1
[External Server Settings]
.................................................................................................................
7-19
7.4.2
[General Settings]
.............................................................................................................................
7-20
7.4.3
[Administrative Setting]
....................................................................................................................
7-20
7.4.4
[Default Function Permission]
..........................................................................................................
7-21
7.4.5
[NetWare Settings]
...........................................................................................................................
7-21
7.5
Restricting users of this machine (NDS over TCP/IP)
...............................................................
7-22
7.5.1
[TCP/IP Settings]
..............................................................................................................................
7-22
7.5.2
[External Server Settings]
.................................................................................................................
7-23
7.5.3
[General Settings]
.............................................................................................................................
7-24
7.5.4
[Administrative Setting]
....................................................................................................................
7-24
7.5.5
[Default Function Permission]
..........................................................................................................
7-24
7.6
Restricting users of this machine (LDAP)
...................................................................................
7-25
7.6.1
[TCP/IP Settings]
..............................................................................................................................
7-25
7.6.2
[External Server Settings]
.................................................................................................................
7-26
7.6.3
[General Settings]
.............................................................................................................................
7-27
7.6.4
[Administrative Setting]
....................................................................................................................
7-27
7.6.5
[Default Function Permission]
..........................................................................................................
7-27
7.6.6
LDAP over SSL
................................................................................................................................
7-28
[External Server Settings]
.................................................................................................................
7-28
[Setting Up LDAP]
............................................................................................................................
7-28
[Certificate Verification Setting]
........................................................................................................
7-29
8
Reinforcing security
8.1
Registering the certificate of this machine for SSL communications
.......................................
8-2
8.1.1
[Device Certificate Setting]
.................................................................................................................
8-3
8.1.2
[Create and install a self-signed Certificate]
......................................................................................
8-4
8.1.3
[Request a Certificate]
........................................................................................................................
8-5
8.1.4
[Install a Certificate]
............................................................................................................................
8-6
8.1.5
[Import a Certificates]
.........................................................................................................................
8-7
8.1.6
[SSL Setting]
......................................................................................................................................
8-7
8.1.7
[Remove a Certificate]
........................................................................................................................
8-8
8.2
Using device certificates depending on protocol
........................................................................
8-9
8.2.1
[Device Certificate Setting]
...............................................................................................................
8-10
8.2.2
[Protocol Setting]
.............................................................................................................................
8-10
8.3
Managing a device certificate
......................................................................................................
8-11
8.3.1
[Device Certificate Setting]
...............................................................................................................
8-11
8.3.2
[Export Certificate]
...........................................................................................................................
8-11
8.4
Registering a user certificate in this machine
............................................................................
8-13
8.4.1
[E-mail]
.............................................................................................................................................
8-14
8.4.2
[Automatically Obtain Certificates]
...................................................................................................
8-15
8.4.3
Certificate validation
........................................................................................................................
8-16
[Certificate Verification Level Settings]
............................................................................................
8-16
[Certificate Verification Setting]
........................................................................................................
8-16
8.5
Restricting the use of the SMB address registered in the address book
................................
8-18
8.5.1
[TCP/IP Settings]
..............................................................................................................................
8-19
8.5.2
User Authentication
.........................................................................................................................
8-19
8.5.3
[Scan to Authorized Folder Settings]
...............................................................................................
8-19
8.5.4
[Client Setting]
..................................................................................................................................
8-19