bizhub 950i/850i/AccurioPrint 950i/850i
Contents-1
Contents
1
Security
1.1
Introduction
.....................................................................................................................................
1-2
1.1.1
Persons using the machine
................................................................................................................
1-2
1.1.2
Relation between user and job deletion
............................................................................................
1-3
1.2
Compliance with the ISO15408 Standard
.....................................................................................
1-4
1.2.1
Hardware and software
......................................................................................................................
1-4
1.2.2
Operating precautions
.......................................................................................................................
1-4
1.3
Installation procedure
.....................................................................................................................
1-6
1.3.1
Setting of password rules
..................................................................................................................
1-7
1.3.2
Setting of IP address and DNS host
..................................................................................................
1-7
1.3.3
Setting of administrator password
.....................................................................................................
1-7
1.3.4
Setting of user authentication
............................................................................................................
1-8
1.3.5
Setting of accurate date and time
......................................................................................................
1-8
1.3.6
Setting of job log obtaining method
..................................................................................................
1-8
1.3.7
Setting of operation of ID & Print function
.........................................................................................
1-8
1.3.8
Setting of Memory RX
........................................................................................................................
1-8
1.3.9
Setting of FW Update (USB) Password
.............................................................................................
1-9
1.3.10
Setting of FIPS mode
.........................................................................................................................
1-9
1.3.11
Setting of function pattern customization
..........................................................................................
1-9
1.3.12
Setting of Enhanced Security Mode
..................................................................................................
1-9
1.3.13
Setting of IPsec communication certificate
.....................................................................................
1-10
1.3.14
Setting of network
............................................................................................................................
1-10
1.3.15
Check of IPsec setting for communication with each server
...........................................................
1-10
1.3.16
Check of settings banned for operation
..........................................................................................
1-10
1.3.17
Check of device information
............................................................................................................
1-10
1.4
Enhanced security mode
..............................................................................................................
1-11
1.4.1
Major security functions in operation under ISO15408 certification
................................................
1-11
1.5
Precautions for operation control
...............................................................................................
1-12
1.5.1
Roles of the owner of the machine
..................................................................................................
1-12
1.5.2
Maintenance of the security environment
........................................................................................
1-12
1.5.3
Roles of the administrator
................................................................................................................
1-13
1.5.4
Password usage requirements
........................................................................................................
1-13
1.5.5
External authentication server control requirements
.......................................................................
1-13
1.5.6
Security function operation setting operating requirements
............................................................
1-14
1.5.7
Operation and control of the machine
.............................................................................................
1-14
1.5.8
Machine maintenance control
..........................................................................................................
1-16
1.5.9
Precautions for using the printer driver
............................................................................................
1-16
1.6
Miscellaneous
................................................................................................................................
1-17
1.6.1
Password rules
................................................................................................................................
1-17
1.6.2
Precautions for use of various types of applications
.......................................................................
1-17
1.6.3
Encrypting communications
............................................................................................................
1-18
1.6.4
Print functions
..................................................................................................................................
1-18
IPP printing
......................................................................................................................................
1-18
1.6.5
FAX functions
...................................................................................................................................
1-18
1.6.6
USB keyboard
..................................................................................................................................
1-18
1.6.7
Different types of boxes
...................................................................................................................
1-18
1.6.8
Terminating a session and logging out
............................................................................................
1-19
1.6.9
Occurrence of authentication error during external server authentication
......................................
1-19
1.6.10
Finding the version information
........................................................................................................
1-19