Konica Minolta bizhub 950i bizhub 950i/850i Security Operations User Guide - Page 2

Contents

Page 2 highlights

Contents 1 Security 1.1 1.1.1 1.1.2 1.2 1.2.1 1.2.2 1.3 1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.6 1.3.7 1.3.8 1.3.9 1.3.10 1.3.11 1.3.12 1.3.13 1.3.14 1.3.15 1.3.16 1.3.17 1.4 1.4.1 1.5 1.5.1 1.5.2 1.5.3 1.5.4 1.5.5 1.5.6 1.5.7 1.5.8 1.5.9 1.6 1.6.1 1.6.2 1.6.3 1.6.4 Introduction ...1-2 Persons using the machine...1-2 Relation between user and job deletion 1-3 Compliance with the ISO15408 Standard 1-4 Hardware and software...1-4 Operating precautions ...1-4 Installation procedure...1-6 Setting of password rules ...1-7 Setting of IP address and DNS host 1-7 Setting of administrator password...1-7 Setting of user authentication ...1-8 Setting of accurate date and time...1-8 Setting of job log obtaining method 1-8 Setting of operation of ID & Print function 1-8 Setting of Memory RX...1-8 Setting of FW Update (USB) Password 1-9 Setting of FIPS mode...1-9 Setting of function pattern customization 1-9 Setting of Enhanced Security Mode 1-9 Setting of IPsec communication certificate 1-10 Setting of network...1-10 Check of IPsec setting for communication with each server 1-10 Check of settings banned for operation 1-10 Check of device information ...1-10 Enhanced security mode...1-11 Major security functions in operation under ISO15408 certification 1-11 Precautions for operation control 1-12 Roles of the owner of the machine 1-12 Maintenance of the security environment 1-12 Roles of the administrator...1-13 Password usage requirements ...1-13 External authentication server control requirements 1-13 Security function operation setting operating requirements 1-14 Operation and control of the machine 1-14 Machine maintenance control...1-16 Precautions for using the printer driver 1-16 Miscellaneous...1-17 Password rules ...1-17 Precautions for use of various types of applications 1-17 Encrypting communications ...1-18 Print functions ...1-18 IPP printing ...1-18 1.6.5 1.6.6 1.6.7 1.6.8 1.6.9 1.6.10 FAX functions...1-18 USB keyboard...1-18 Different types of boxes...1-18 Terminating a session and logging out 1-19 Occurrence of authentication error during external server authentication 1-19 Finding the version information...1-19 bizhub 950i/850i/AccurioPrint 950i/850i Contents-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

bizhub 950i/850i/AccurioPrint 950i/850i
Contents-1
Contents
1
Security
1.1
Introduction
.....................................................................................................................................
1-2
1.1.1
Persons using the machine
................................................................................................................
1-2
1.1.2
Relation between user and job deletion
............................................................................................
1-3
1.2
Compliance with the ISO15408 Standard
.....................................................................................
1-4
1.2.1
Hardware and software
......................................................................................................................
1-4
1.2.2
Operating precautions
.......................................................................................................................
1-4
1.3
Installation procedure
.....................................................................................................................
1-6
1.3.1
Setting of password rules
..................................................................................................................
1-7
1.3.2
Setting of IP address and DNS host
..................................................................................................
1-7
1.3.3
Setting of administrator password
.....................................................................................................
1-7
1.3.4
Setting of user authentication
............................................................................................................
1-8
1.3.5
Setting of accurate date and time
......................................................................................................
1-8
1.3.6
Setting of job log obtaining method
..................................................................................................
1-8
1.3.7
Setting of operation of ID & Print function
.........................................................................................
1-8
1.3.8
Setting of Memory RX
........................................................................................................................
1-8
1.3.9
Setting of FW Update (USB) Password
.............................................................................................
1-9
1.3.10
Setting of FIPS mode
.........................................................................................................................
1-9
1.3.11
Setting of function pattern customization
..........................................................................................
1-9
1.3.12
Setting of Enhanced Security Mode
..................................................................................................
1-9
1.3.13
Setting of IPsec communication certificate
.....................................................................................
1-10
1.3.14
Setting of network
............................................................................................................................
1-10
1.3.15
Check of IPsec setting for communication with each server
...........................................................
1-10
1.3.16
Check of settings banned for operation
..........................................................................................
1-10
1.3.17
Check of device information
............................................................................................................
1-10
1.4
Enhanced security mode
..............................................................................................................
1-11
1.4.1
Major security functions in operation under ISO15408 certification
................................................
1-11
1.5
Precautions for operation control
...............................................................................................
1-12
1.5.1
Roles of the owner of the machine
..................................................................................................
1-12
1.5.2
Maintenance of the security environment
........................................................................................
1-12
1.5.3
Roles of the administrator
................................................................................................................
1-13
1.5.4
Password usage requirements
........................................................................................................
1-13
1.5.5
External authentication server control requirements
.......................................................................
1-13
1.5.6
Security function operation setting operating requirements
............................................................
1-14
1.5.7
Operation and control of the machine
.............................................................................................
1-14
1.5.8
Machine maintenance control
..........................................................................................................
1-16
1.5.9
Precautions for using the printer driver
............................................................................................
1-16
1.6
Miscellaneous
................................................................................................................................
1-17
1.6.1
Password rules
................................................................................................................................
1-17
1.6.2
Precautions for use of various types of applications
.......................................................................
1-17
1.6.3
Encrypting communications
............................................................................................................
1-18
1.6.4
Print functions
..................................................................................................................................
1-18
IPP printing
......................................................................................................................................
1-18
1.6.5
FAX functions
...................................................................................................................................
1-18
1.6.6
USB keyboard
..................................................................................................................................
1-18
1.6.7
Different types of boxes
...................................................................................................................
1-18
1.6.8
Terminating a session and logging out
............................................................................................
1-19
1.6.9
Occurrence of authentication error during external server authentication
......................................
1-19
1.6.10
Finding the version information
........................................................................................................
1-19