beautypg.com

8reinforcing security – Konica Minolta BIZHUB C360 User Manual

Page 6

background image

bizhub C360/C280/C220

Contents-5

7.3.2

[External Server Settings]................................................................................................................. 7-16

7.3.3

[General Settings]............................................................................................................................. 7-17

7.3.4

[Administrative Setting] .................................................................................................................... 7-17

7.3.5

[Default Function Permission] .......................................................................................................... 7-17

7.3.6

[Client Settings] ................................................................................................................................ 7-18

7.3.7

[WINS Setting].................................................................................................................................. 7-18

7.3.8

[Direct Hosting Setting] .................................................................................................................... 7-18

7.4

Restricting users of this machine (NDS over IPX/SPX) ............................................................. 7-19

7.4.1

[External Server Settings]................................................................................................................. 7-19

7.4.2

[General Settings]............................................................................................................................. 7-20

7.4.3

[Administrative Setting] .................................................................................................................... 7-20

7.4.4

[Default Function Permission] .......................................................................................................... 7-21

7.4.5

[NetWare Settings] ........................................................................................................................... 7-21

7.5

Restricting users of this machine (NDS over TCP/IP) ............................................................... 7-22

7.5.1

[TCP/IP Settings].............................................................................................................................. 7-22

7.5.2

[External Server Settings]................................................................................................................. 7-23

7.5.3

[General Settings]............................................................................................................................. 7-24

7.5.4

[Administrative Setting] .................................................................................................................... 7-24

7.5.5

[Default Function Permission] .......................................................................................................... 7-24

7.6

Restricting users of this machine (LDAP) ................................................................................... 7-25

7.6.1

[TCP/IP Settings].............................................................................................................................. 7-25

7.6.2

[External Server Settings]................................................................................................................. 7-26

7.6.3

[General Settings]............................................................................................................................. 7-27

7.6.4

[Administrative Setting] .................................................................................................................... 7-27

7.6.5

[Default Function Permission] .......................................................................................................... 7-27

7.6.6

LDAP over SSL ................................................................................................................................ 7-28
[External Server Settings]................................................................................................................. 7-28
[Setting Up LDAP] ............................................................................................................................ 7-28
[Certificate Verification Setting]........................................................................................................ 7-29

8

Reinforcing security

8.1

Registering the certificate of this machine for SSL communications ....................................... 8-2

8.1.1

[Device Certificate Setting]................................................................................................................. 8-3

8.1.2

[Create and install a self-signed Certificate] ...................................................................................... 8-4

8.1.3

[Request a Certificate]........................................................................................................................ 8-5

8.1.4

[Install a Certificate]............................................................................................................................ 8-6

8.1.5

[Import a Certificates]......................................................................................................................... 8-7

8.1.6

[SSL Setting] ...................................................................................................................................... 8-7

8.1.7

[Remove a Certificate]........................................................................................................................ 8-8

8.2

Using device certificates depending on protocol ........................................................................ 8-9

8.2.1

[Device Certificate Setting]............................................................................................................... 8-10

8.2.2

[Protocol Setting] ............................................................................................................................. 8-10

8.3

Managing a device certificate...................................................................................................... 8-11

8.3.1

[Device Certificate Setting]............................................................................................................... 8-11

8.3.2

[Export Certificate] ........................................................................................................................... 8-11

8.4

Registering a user certificate in this machine............................................................................ 8-13

8.4.1

[E-mail] ............................................................................................................................................. 8-14

8.4.2

[Automatically Obtain Certificates]................................................................................................... 8-15

8.4.3

Certificate validation ........................................................................................................................ 8-16
[Certificate Verification Level Settings] ............................................................................................ 8-16
[Certificate Verification Setting]........................................................................................................ 8-16

8.5

Restricting the use of the SMB address registered in the address book................................ 8-18

8.5.1

[TCP/IP Settings].............................................................................................................................. 8-19

8.5.2

User Authentication ......................................................................................................................... 8-19

8.5.3

[Scan to Authorized Folder Settings] ............................................................................................... 8-19

8.5.4

[Client Setting].................................................................................................................................. 8-19

This manual is related to the following products: