Használati útmutató Konica Minolta Bizhub 36

Olvassa el alább 📖 a magyar nyelvű használati útmutatót Konica Minolta Bizhub 36 (94 oldal) a nyomtató kategóriában. Ezt az útmutatót 2 ember találta hasznosnak és 2 felhasználó értékelte átlagosan 4.5 csillagra

Oldal 1/94
User’s Guide [Security Operations]
2012. 2
Ver. 1.03
bizhub 42/36 Contents-1
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2 Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3 Data to be Protected ...................................................................................................................... 1-5
1.4 Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
User information control system control requirements ..................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-7
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7
1.5 Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications ............................................................................................................ 1-10
IPP printing ...................................................................................................................................... 1-10
Items of Data Cleared by Data Erase Function................................................................................ 1-11
HDD Format ..................................................................................................................................... 1-12
Upgrading of the firmware ............................................................................................................... 1-12
2 Administrator Operations
2.1 Accessing the Admin Settings....................................................................................................... 2-2
Accessing the Admin Settings........................................................................................................... 2-2
2.2 Enhancing the Security Function................................................................................................... 2-5
Setting the Enhanced Security Mode ................................................................................................ 2-7
2.3 Setting the Authentication Method ............................................................................................... 2-9
Setting the Authentication Method .................................................................................................... 2-9
2.4 ID & Print Setting Function........................................................................................................... 2-12
Setting the ID & Print........................................................................................................................ 2-12
2.5 Auto Reset Function ..................................................................................................................... 2-13
Setting the Auto Reset function ....................................................................................................... 2-13
2.6 User Setting Function ................................................................................................................... 2-16
Making user setting.......................................................................................................................... 2-16
2.7 IC card information Setting Function.......................................................................................... 2-18
Registering information from the control panel ............................................................................... 2-18
2.8 Changing the Administrator Password....................................................................................... 2-20
Changing the Administrator Password ............................................................................................ 2-20
2.9 Erasing data when the machine is to be discarded or use of a leased machine is
terminated...................................................................................................................................... 2-22
2.9.1 Setting the Overwrite All Data.......................................................................................................... 2-22
2.9.2 Setting the SSD Low-level Format................................................................................................... 2-25
2.9.3 Setting the Restore All ..................................................................................................................... 2-26
2.10 SSL Setting Function .................................................................................................................... 2-27
2.10.1 Device Certificate Setting ................................................................................................................ 2-27
2.10.2 SSL Setting ...................................................................................................................................... 2-29
2.10.3 Removing a Certificate..................................................................................................................... 2-30
bizhub 42/36 Contents-2
2.11 SNMP Setting Function ................................................................................................................ 2-31
2.11.1 Changing the auth-password and priv-password ........................................................................... 2-31
2.11.2 SNMP access authentication function............................................................................................. 2-32
2.11.3 SNMP v3 setting function ................................................................................................................ 2-32
2.11.4 SNMP network setting function ....................................................................................................... 2-32
2.12 Accessing the Scan to HDD file................................................................................................... 2-33
Accessing the image file .................................................................................................................. 2-33
2.13 TCP/IP Setting Function ............................................................................................................... 2-35
2.13.1 Setting the IP Address ................................................................. .................................. .................. 2-35
2.13.2 Registering the DNS Server ............................................................................................................. 2-35
2.14 NetWare Setting Function ............................................................................................................ 2-36
Making the NetWare Setting............................................................................................................ 2-36
2.15 SMB Setting Function................................................................................................................... 2-37
Making the SMB Setting .................................................................................................................. 2-37
2.16 AppleTalk Setting Function.......................................................................................................... 2-38
Making the AppleTalk Setting .......................................................................................................... 2-38
2.17 E-Mail Setting Function................................................................................................................ 2-39
Setting the SMTP Server (E-Mail Server)......................................................................................... 2-39
3 User Operations
3.1 User Authentication Function ........................................................................................................ 3-2
3.1.1 Performing user authentication (authentication through entry of the user name and
user password)....................................................................................................................................3-3
3.1.2 Performing user authentication (identification through the IC card) .................................................. 3-7
3.1.3 Performing user authentication (authentication through the IC card + user password) .................... 3-8
3.2 ID & Print Function ........................................................................................................................ 3-12
3.2.1 Registering ID & Print files ............................................................................................................... 3-12
3.2.2 Accessing the ID & Print file............................................................................................................. 3-14
3.3 Change Password Function......................................................................................................... 3-16
Performing Change Password ......................................................................................................... 3-16
3.4 Secured Job Function................................................................................................................... 3-18
3.4.1 Registering Secured Job files .......................................................................................................... 3-18
3.4.2 Accessing the Secured Job file ....................................................................................................... 3-20
3.5 Scan to HDD Function .................................................................................................................. 3-23
3.5.1 Registering image files..................................................................................................................... 3-23
3.5.2 Accessing the image file .................................................................................................................. 3-25
4 Application Software
4.1 PageScope Data Administrator ..................................................................................................... 4-2
Precautions during backup or restore ............................................................................................... 4-2
4.1.1 Accessing from PageScope Data Administrator ............................................................................... 4-2
4.1.2 Setting the user authentication method............................................................................................. 4-4
4.1.3 Changing the authentication mode.................................................................................................... 4-6
4.1.4 Making the user settings.................................................................................................................... 4-9
4.1.5 Setting the IC card information........................................................................................................ 4-10
4.2 TWAIN driver.................................................................................................................................. 4-12
Accessing from the TWAIN driver.................................................................................................... 4-12

Termékspecifikációk

Márka: Konica Minolta
Kategória: nyomtató
Modell: Bizhub 36

Szüksége van segítségre?

Ha segítségre van szüksége Konica Minolta Bizhub 36, tegyen fel kérdést alább, és más felhasználók válaszolnak Önnek




Útmutatók nyomtató Konica Minolta

Útmutatók nyomtató

Legújabb útmutatók nyomtató

Kyocera

Kyocera FS-9520DN Útmutató

10 Április 2025
OKI

OKI C9655 Útmutató

10 Április 2025
OKI

OKI B2500 MFP Útmutató

10 Április 2025
OKI

OKI C830N Útmutató

10 Április 2025
Lexmark

Lexmark E 342n Útmutató

10 Április 2025
Mitsubishi

Mitsubishi P93E Útmutató

9 Április 2025