Konica Minolta Bizhub 36 Manual de Usario

Lee a continuación 📖 el manual en español para Konica Minolta Bizhub 36 (94 páginas) en la categoría Impresora. Esta guía fue útil para 8 personas y fue valorada con 4.5 estrellas en promedio por 2 usuarios

Página 1/94
User’s Guide [Security Operations]
2012. 2
Ver. 1.03
bizhub 42/36 Contents-1
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2 Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3 Data to be Protected ...................................................................................................................... 1-5
1.4 Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator ................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Network Connection Requirements for the Machine......................................................................... 1-6
User information control system control requirements ..................................................................... 1-6
Security function operation setting operating requirements.............................................................. 1-7
Operation and control of the machine ............................................................................................... 1-7
Machine Maintenance Control ........................................................................................................... 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7
1.5 Miscellaneous.................................................................................................................................. 1-9
Password Rules ................................................................................................................................. 1-9
Precautions for Use of Various Types of Applications....................................................................... 1-9
Encrypting communications ............................................................................................................ 1-10
IPP printing ...................................................................................................................................... 1-10
Items of Data Cleared by Data Erase Function................................................................................ 1-11
HDD Format ..................................................................................................................................... 1-12
Upgrading of the firmware ............................................................................................................... 1-12
2 Administrator Operations
2.1 Accessing the Admin Settings....................................................................................................... 2-2
Accessing the Admin Settings........................................................................................................... 2-2
2.2 Enhancing the Security Function................................................................................................... 2-5
Setting the Enhanced Security Mode ................................................................................................ 2-7
2.3 Setting the Authentication Method ............................................................................................... 2-9
Setting the Authentication Method .................................................................................................... 2-9
2.4 ID & Print Setting Function........................................................................................................... 2-12
Setting the ID & Print........................................................................................................................ 2-12
2.5 Auto Reset Function ..................................................................................................................... 2-13
Setting the Auto Reset function ....................................................................................................... 2-13
2.6 User Setting Function ................................................................................................................... 2-16
Making user setting.......................................................................................................................... 2-16
2.7 IC card information Setting Function.......................................................................................... 2-18
Registering information from the control panel ............................................................................... 2-18
2.8 Changing the Administrator Password....................................................................................... 2-20
Changing the Administrator Password ............................................................................................ 2-20
2.9 Erasing data when the machine is to be discarded or use of a leased machine is
terminated...................................................................................................................................... 2-22
2.9.1 Setting the Overwrite All Data.......................................................................................................... 2-22
2.9.2 Setting the SSD Low-level Format................................................................................................... 2-25
2.9.3 Setting the Restore All ..................................................................................................................... 2-26
2.10 SSL Setting Function .................................................................................................................... 2-27
2.10.1 Device Certificate Setting ................................................................................................................ 2-27
2.10.2 SSL Setting ...................................................................................................................................... 2-29
2.10.3 Removing a Certificate..................................................................................................................... 2-30
bizhub 42/36 Contents-2
2.11 SNMP Setting Function ................................................................................................................ 2-31
2.11.1 Changing the auth-password and priv-password ........................................................................... 2-31
2.11.2 SNMP access authentication function............................................................................................. 2-32
2.11.3 SNMP v3 setting function ................................................................................................................ 2-32
2.11.4 SNMP network setting function ....................................................................................................... 2-32
2.12 Accessing the Scan to HDD file................................................................................................... 2-33
Accessing the image file .................................................................................................................. 2-33
2.13 TCP/IP Setting Function ............................................................................................................... 2-35
2.13.1 Setting the IP Address ................................................................. .................................. .................. 2-35
2.13.2 Registering the DNS Server ............................................................................................................. 2-35
2.14 NetWare Setting Function ............................................................................................................ 2-36
Making the NetWare Setting............................................................................................................ 2-36
2.15 SMB Setting Function................................................................................................................... 2-37
Making the SMB Setting .................................................................................................................. 2-37
2.16 AppleTalk Setting Function.......................................................................................................... 2-38
Making the AppleTalk Setting .......................................................................................................... 2-38
2.17 E-Mail Setting Function................................................................................................................ 2-39
Setting the SMTP Server (E-Mail Server)......................................................................................... 2-39
3 User Operations
3.1 User Authentication Function ........................................................................................................ 3-2
3.1.1 Performing user authentication (authentication through entry of the user name and
user password)....................................................................................................................................3-3
3.1.2 Performing user authentication (identification through the IC card) .................................................. 3-7
3.1.3 Performing user authentication (authentication through the IC card + user password) .................... 3-8
3.2 ID & Print Function ........................................................................................................................ 3-12
3.2.1 Registering ID & Print files ............................................................................................................... 3-12
3.2.2 Accessing the ID & Print file............................................................................................................. 3-14
3.3 Change Password Function......................................................................................................... 3-16
Performing Change Password ......................................................................................................... 3-16
3.4 Secured Job Function................................................................................................................... 3-18
3.4.1 Registering Secured Job files .......................................................................................................... 3-18
3.4.2 Accessing the Secured Job file ....................................................................................................... 3-20
3.5 Scan to HDD Function .................................................................................................................. 3-23
3.5.1 Registering image files..................................................................................................................... 3-23
3.5.2 Accessing the image file .................................................................................................................. 3-25
4 Application Software
4.1 PageScope Data Administrator ..................................................................................................... 4-2
Precautions during backup or restore ............................................................................................... 4-2
4.1.1 Accessing from PageScope Data Administrator ............................................................................... 4-2
4.1.2 Setting the user authentication method............................................................................................. 4-4
4.1.3 Changing the authentication mode.................................................................................................... 4-6
4.1.4 Making the user settings.................................................................................................................... 4-9
4.1.5 Setting the IC card information........................................................................................................ 4-10
4.2 TWAIN driver.................................................................................................................................. 4-12
Accessing from the TWAIN driver.................................................................................................... 4-12

Especificaciones del producto

Marca: Konica Minolta
Categoría: Impresora
Modelo: Bizhub 36
Color del producto: Meerkleurig
Ancho: 338 mm
Amable: Vliegtuigmodel
Edad recomendada (mín.): 8 jaar
Material: Kunststof
Destinado a: Militair vliegtuig
Tipo de construcción: Montagekit
Numero de piezas: 165 stuk(s)
Tipo-producto: Modelvliegtuig met vaste vleugels
Plato: 1:48
Nombre del modelo original: Fairchild Republic A-10 Thunderbolt II
Envergadura: 374 mm
Partes móviles: Ja

¿Necesitas ayuda?

Si necesitas ayuda con Konica Minolta Bizhub 36 haz una pregunta a continuación y otros usuarios te responderán




Impresora Konica Minolta Manuales

Impresora Manuales

Últimos Impresora Manuales