beautypg.com

Konica Minolta bizhub C35 User Manual

Page 2

background image

bizhub C35

Contents-1

Contents

1

Security

1.1

Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3

1.2

Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4

1.3

Data to be Protected ...................................................................................................................... 1-5

1.4

Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
User information control system control requirements ..................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-7
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7

1.5

Miscellaneous.................................................................................................................................. 1-8
Password Rules ................................................................................................................................. 1-8
Precautions for Use of Various Types of Applications....................................................................... 1-8
Encrypting communications .............................................................................................................. 1-9
IPP printing ........................................................................................................................................ 1-9
Items of Data Cleared by Data Erase Function................................................................................ 1-10
HDD Format ..................................................................................................................................... 1-11
Upgrading of the firmware ............................................................................................................... 1-11

2

Administrator Operations

2.1

Accessing the Admin Settings ....................................................................................................... 2-2
Accessing the Admin Settings ........................................................................................................... 2-2

2.2

Enhancing the Security Function................................................................................................... 2-5
Setting the Enhanced Security Mode ................................................................................................ 2-7

2.3

Setting the Authentication Method ............................................................................................... 2-9
Setting the Authentication Method .................................................................................................... 2-9

2.4

ID & Print Setting Function........................................................................................................... 2-12
Setting the ID & Print........................................................................................................................ 2-12

2.5

Auto Reset Function ..................................................................................................................... 2-13
Setting the Auto Reset function ....................................................................................................... 2-13

2.6

User Setting Function ................................................................................................................... 2-16
Making user setting.......................................................................................................................... 2-16

2.7

IC card information Setting Function .......................................................................................... 2-18
Registering information from the control panel ............................................................................... 2-18

2.8

Changing the Administrator Password....................................................................................... 2-20
Changing the Administrator Password ............................................................................................ 2-20

2.9

Erasing data when the machine is to be discarded or use of a leased machine is
terminated...................................................................................................................................... 2-22

2.9.1

Setting the Overwrite All Data.......................................................................................................... 2-22

2.9.2

Setting the SSD Low-level Format................................................................................................... 2-25

2.9.3

Setting the Restore All ..................................................................................................................... 2-26

2.10

SSL Setting Function .................................................................................................................... 2-27

2.10.1

Device Certificate Setting ................................................................................................................ 2-27

2.10.2

SSL Setting ...................................................................................................................................... 2-29

2.10.3

Removing a Certificate..................................................................................................................... 2-30