
bizhub 423/363/283/223 Contents-1
Contents
1 Security
1.1 Introduction ..................................................................................................................................... 1-2
Compliance with the ISO15408 Standard ......................................................................................... 1-2
Operating Precautions ....................................................................................................................... 1-2
INSTALLATION CHECKLIST.............................................................................................................. 1-3
1.2 Security Functions .......................................................................................................................... 1-4
Check Count Clear Conditions .......................................................................................................... 1-4
1.3 Data to be Protected ...................................................................................................................... 1-5
1.4 Precautions for Operation Control ................................................................................................ 1-6
Roles and Requirements of the Administrator................................................................................... 1-6
Password Usage Requirements ........................................................................................................ 1-6
Operation and control of the machine ............................................................................................... 1-6
Network Connection Requirements for the Machine......................................................................... 1-7
Machine Maintenance Control........................................................................................................... 1-7
Implementing digital signature properly............................................................................................. 1-7
Operating conditions for the IC card and IC card reader .................................................................. 1-7
IC card owner requirements .............................................................................................................. 1-7
1.5 Miscellaneous.................................................................................................................................. 1-8
Password Rules ................................................................................................................................. 1-8
Precautions for Use of Various Types of Applications....................................................................... 1-8
Items of Data Cleared by Overwrite All Data Function ...................................................................... 1-8
Items cleared by HDD Format ........................................................................................................... 1-8
Fax functions...................................................................................................................................... 1-9
2 Administrator Operations
2.1 Accessing the Administrator Settings .......................................................................................... 2-2
2.1.1 Accessing the Administrator Settings................................................................................................ 2-2
2.1.2 Accessing the User Mode.................................................................................................................. 2-4
2.2 Preventing Unauthorized Access .................................................................................................. 2-6
Setting Prohibited Functions When Authentication Error .................................................................. 2-6
2.3 Setting the External Server ............................................................................................................ 2-9
Setting the External Server ................................................................................................................ 2-9
2.4 System Auto Reset Function ....................................................................................................... 2-12
Setting the System Auto Reset function.......................................................................................... 2-12
2.5 Changing the Administrator Password....................................................................................... 2-14
Changing the Administrator Password ............................................................................................ 2-14
2.6 Protecting Data in the HDD.......................................................................................................... 2-16
2.6.1 Setting the Encryption Key (encryption word) ................................................................................. 2-16
2.6.2 Changing the Encryption Key .......................................................................................................... 2-22
2.7 Overwrite All Data Function ......................................................................................................... 2-24
Setting the Overwrite All Data function............................................................................................ 2-24
2.8 S/MIME Communication Setting Function ................................................................................. 2-26
Setting the S/MIME Communication ............................................................................................... 2-26
2.9 PC-Fax RX Setting Function ........................................................................................................ 2-29
PC-Fax RX Setting........................................................................................................................... 2-29
2.10 TSI User Box Setting Function..................................................................................................... 2-31
TSI User Box Setting........................................................................................................................ 2-31
2.11 TCP/IP Setting Function ............................................................................................................... 2-33
2.11.1 Setting the IP Address ..................................................................................................................... 2-33
2.11.2 Registering the DNS Server ............................................................................................................. 2-33
2.12 NetWare Setting Function ............................................................................................................ 2-34
Making the NetWare Setting............................................................................................................ 2-34
2.13 SMB Setting Function................................................................................................................... 2-35