beautypg.com

3user operations, 4application software – Konica Minolta magicolor 8650 User Manual

Page 3

background image

8650

x-2

Contents

2.8.3

Setting the Encryption Key (encryption word) ........................................................................................2-27
..............................................................................2-27

2.8.4

Changing the Encryption Key .................................................................................................................2-30
..............................................................................2-30

2.8.5

Making Overwrite Priority Setting ...........................................................................................................2-32
..............................................................................2-32

2.9

Overwrite All Area Function............................................................................................................... 2-35

2.9.1

Setting the Overwrite All Area function...................................................................................................2-35
..............................................................................2-35

2.10

SSL Setting Function .......................................................................................................................... 2-37

2.10.1

Setting the SSL.......................................................................................................................................2-37
...........................................................2-37

2.10.2

Changing the Encryption Strength Setting .............................................................................................2-40
...........................................................2-40

2.10.3

Changing the Mode Using SSL ..............................................................................................................2-41
...........................................................2-41

2.10.4

Removing a Certificate ...........................................................................................................................2-42
...........................................................2-42

2.11

SNMP Setting Function ...................................................................................................................... 2-43

2.11.1

Changing the auth-password and priv-password ..................................................................................2-43
......................................................................................................................2-43
....................................................................................................2-47

2.11.2

SNMP access authentication function ...................................................................................................2-48

2.11.3

SNMP v3 setting function.......................................................................................................................2-48

2.11.4

SNMP network setting function..............................................................................................................2-48

2.12

TCP/IP Setting Function..................................................................................................................... 2-49

2.12.1

Setting the IP Address............................................................................................................................2-49
......................................................................................................................2-49
....................................................................................................2-50

2.13

NetWare Setting Function.................................................................................................................. 2-51

2.13.1

Making the NetWare Setting...................................................................................................................2-51
......................................................................................................................2-51
....................................................................................................2-51

2.14

SMB Setting Function......................................................................................................................... 2-52

2.14.1

Setting the NetBIOS Name.....................................................................................................................2-52
......................................................................................................................2-52
....................................................................................................2-52

2.15

AppleTalk Setting Function................................................................................................................ 2-53

2.15.1

Making the AppleTalk Setting.................................................................................................................2-53
......................................................................................................................2-53
....................................................................................................2-53

3

User Operations

3.1

Secure Print Document Function ........................................................................................................ 3-2

3.1.1

Accessing the Secure Print Document.....................................................................................................3-2
................................................................................3-2

3.2

User Box Function ................................................................................................................................ 3-5

3.2.1

Setting the User Box ................................................................................................................................3-5
.............................................................3-5

3.2.2

Changing the User Box attributes ............................................................................................................3-7
.............................................................3-7

3.2.3

Accessing the User Box and User Box file.............................................................................................3-10
......................................................................................................................3-10
....................................................................................................3-12

4

Application Software