Konica Minolta C250i bizhub C360i/C300i/C250i Security Operations User Manual - Page 2

Contents - driver

Page 2 highlights

Contents 1 Security 1.1 1.1.1 1.1.2 1.2 1.2.1 1.2.2 1.2.3 1.2.4 1.3 1.3.1 1.4 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6 1.4.7 1.4.8 1.5 1.5.1 1.5.2 1.5.3 1.5.4 1.5.5 1.5.6 1.5.7 1.5.8 1.5.9 1.5.10 Introduction ...1-2 Persons using the machine...1-2 Relation between user and job deletion 1-3 Compliance with the ISO15408 Standard 1-4 Hardware and software...1-4 Installation of firmware...1-4 Operating precautions ...1-5 INSTALLATION CHECKLIST...1-6 Enhanced security mode...1-9 Major security functions in operation under ISO15408 certification 1-9 Precautions for operation control 1-9 Roles of the owner of the machine ...1-9 Roles and requirements of the administrator 1-10 Password usage requirements ...1-10 External authentication server control requirements 1-10 Security function operation setting operating requirements 1-11 Operation and control of the machine 1-11 Machine maintenance control...1-13 Precautions for using the printer driver 1-13 Miscellaneous...1-14 Password rules ...1-14 Precautions for use of various types of applications 1-14 Encrypting communications ...1-15 Print functions ...1-15 IPP printing ...1-15 FAX functions...1-15 USB keyboard...1-15 Different types of boxes...1-15 Terminating a session and logging out 1-16 Authentication error during external server authentication 1-16 Finding the version information...1-16 2 Administrator Operations 2.1 2.1.1 2.1.2 2.1.3 2.2 2.2.1 2.2.2 2.3 2.3.1 2.4 2.4.1 2.5 2.5.1 2.5.2 Accessing the administrator mode 2-2 Accessing the administrator mode ...2-2 Accessing the user mode ...2-7 Checking the number of wrong entries in authentication 2-9 Conditions to clear the number of times of check 2-9 Enhancing the security function 2-10 Items cleared by format ...2-12 Setting the Enhanced Security Mode 2-13 Setting the password rules ...2-14 Setting the password rules ...2-14 Setting IPsec ...2-15 IPsec setting ...2-15 Firmware verification function at the time of starting the machine 2-17 Setting the firmware verification function 2-17 Self-test function...2-17 bizhub C360i/C300i/C250i/C036DNi/C030DNi/C025DNi Contents-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106

bizhub C360i/C300i/C250i/C036DNi/C030DNi/C025DNi
Contents-1
Contents
1
Security
1.1
Introduction
.....................................................................................................................................
1-2
1.1.1
Persons using the machine
................................................................................................................
1-2
1.1.2
Relation between user and job deletion
............................................................................................
1-3
1.2
Compliance with the ISO15408 Standard
.....................................................................................
1-4
1.2.1
Hardware and software
......................................................................................................................
1-4
1.2.2
Installation of firmware
.......................................................................................................................
1-4
1.2.3
Operating precautions
.......................................................................................................................
1-5
1.2.4
INSTALLATION CHECKLIST
..............................................................................................................
1-6
1.3
Enhanced security mode
................................................................................................................
1-9
1.3.1
Major security functions in operation under ISO15408 certification
..................................................
1-9
1.4
Precautions for operation control
.................................................................................................
1-9
1.4.1
Roles of the owner of the machine
....................................................................................................
1-9
1.4.2
Roles and requirements of the administrator
...................................................................................
1-10
1.4.3
Password usage requirements
........................................................................................................
1-10
1.4.4
External authentication server control requirements
.......................................................................
1-10
1.4.5
Security function operation setting operating requirements
............................................................
1-11
1.4.6
Operation and control of the machine
.............................................................................................
1-11
1.4.7
Machine maintenance control
..........................................................................................................
1-13
1.4.8
Precautions for using the printer driver
............................................................................................
1-13
1.5
Miscellaneous
................................................................................................................................
1-14
1.5.1
Password rules
................................................................................................................................
1-14
1.5.2
Precautions for use of various types of applications
.......................................................................
1-14
1.5.3
Encrypting communications
............................................................................................................
1-15
1.5.4
Print functions
..................................................................................................................................
1-15
IPP printing
......................................................................................................................................
1-15
1.5.5
FAX functions
...................................................................................................................................
1-15
1.5.6
USB keyboard
..................................................................................................................................
1-15
1.5.7
Different types of boxes
...................................................................................................................
1-15
1.5.8
Terminating a session and logging out
............................................................................................
1-16
1.5.9
Authentication error during external server authentication
..............................................................
1-16
1.5.10
Finding the version information
........................................................................................................
1-16
2
Administrator Operations
2.1
Accessing the administrator mode
...............................................................................................
2-2
2.1.1
Accessing the administrator mode
....................................................................................................
2-2
2.1.2
Accessing the user mode
..................................................................................................................
2-7
2.1.3
Checking the number of wrong entries in authentication
..................................................................
2-9
Conditions to clear the number of times of check
.............................................................................
2-9
2.2
Enhancing the security function
..................................................................................................
2-10
2.2.1
Items cleared by format
...................................................................................................................
2-12
2.2.2
Setting the Enhanced Security Mode
..............................................................................................
2-13
2.3
Setting the password rules
..........................................................................................................
2-14
2.3.1
Setting the password rules
..............................................................................................................
2-14
2.4
Setting IPsec
.................................................................................................................................
2-15
2.4.1
IPsec setting
....................................................................................................................................
2-15
2.5
Firmware verification function at the time of starting the machine
.........................................
2-17
2.5.1
Setting the firmware verification function
........................................................................................
2-17
2.5.2
Self-test function
..............................................................................................................................
2-17