Konica Minolta bizhub 36 bizhub 36/42 Administrator Operations User Guide - Page 149

Limiting Access to Destination], Restrict User Access]

Page 149 highlights

5.2 [Security] tab Item [Encryption Strength] [Network Stop] [Limit Time] 5 Description Select an encryption strength level for encrypted communication with TLS. • [Low]: Keys of any length are used for communication. • [Medium]: Keys that are more than 56 bits in length are used for com- munication. • [High]: Keys that are more than 128 bits in length are used for commu- nication. This item is available if [EAP-Type] is set to anything other than [None] or [EAP-MD5]. If an authentication process does not succeed within the specified time, all network communication will stop. To specify the delay between the start of an authentication process and the stop of network communication, select [Enable]. Specify the delay (sec.) between the start of an authentication process and the stop of network communication. To restart the authentication process after network communication has stopped, turn the power of this machine off and on again. 5.2.8 [Limiting Access to Destination] You can configure the setting that prohibits user operation. [Restrict User Access] Select [Security] ö [Limiting Access to Destination] ö [Restrict User Access]. Item [Registering and Changing Addresses] Description Select whether or not to prohibit users from registering or editing destinations. bizhub 42/36 5-61

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

bizhub 42/36
5-61
5.2
[Security] tab
5
5.2.8
[Limiting Access to Destination]
You can configure the setting that prohibits user operation.
[Restrict User Access]
Select [Security]
ö
[Limiting Access to Destination]
ö
[Restrict User Access].
[Encryption Strength]
Select an encryption strength level for encrypted communication with TLS.
[Low]: Keys of any length are used for communication.
[Medium]: Keys that are more than 56 bits in length are used for com-
munication.
[High]: Keys that are more than 128 bits in length are used for commu-
nication.
This item is available if [EAP-Type] is set to anything other than [None] or
[EAP-MD5].
[Network Stop]
If an authentication process does not succeed within the specified time, all
network communication will stop. To specify the delay between the start
of an authentication process and the stop of network communication, se-
lect [Enable].
[Limit Time]
Specify the delay (sec.) between the start of an authentication process and
the stop of network communication.
To restart the authentication process after network communication has
stopped, turn the power of this machine off and on again.
Item
Description
Item
Description
[Registering and Changing
Addresses]
Select whether or not to prohibit users from registering or editing destina-
tions.