Chapter 2 management, Chapter, Management – Konica Minolta bizhub 25 User Manual

Page 54

Advertising
background image

Chapter

2

Management

List of Machine Management Settings ..................................................................2-2
Setting Security Codes ..............................................................................................2-4

Setting the Administrator Password ......................................................................2-4
Setting the Protect Passcode ..................................................................................2-7

Closed Communication ...........................................................................................2-10

Setting Closed Transmission ................................................................................2-10
Setting Closed Reception ......................................................................................2-11
Setting Passcode Polling .......................................................................................2-12
Setting the Passcode .............................................................................................2-14
Communication and Range of Passcodes .............................................................2-15

Setting ID Check Transmission ............................................................................2-16
Confirming the Destination Before Transmission ............................................2-18

Setting the Destination Confirmation Function ..................................................2-18
Setting the Confirmation Dial Functions ............................................................2-19

Prohibiting Transmission to Multiple Destinations ........................................2-22
Security Reception ...................................................................................................2-23
Activating the PIN mask .........................................................................................2-25
Function Protect Settings ......................................................................................2-27

Setting Function Protection..................................................................................2-28
Using Function Protection ....................................................................................2-30

Setting Mode Protection .........................................................................................2-32
Setting User Authentication ..................................................................................2-34

Setting the Authentication Method ......................................................................2-34

Managing User Access/Cost Accounting .............................................................2-37

Setting the Currency Unit ....................................................................................2-37
Specifying the Charge Settings ............................................................................2-39
Erasing the Accounting Data ...............................................................................2-41

Specifying the Network Settings ..........................................................................2-42

Specifying the TCP/IP Settings ............................................................................2-45
Registering LDAP Servers ....................................................................................2-56
Specifying the Archive Settings ............................................................................2-68
Setting an E-mail Gateway ..................................................................................2-72
Setting the Automatic Logout Time .....................................................................2-75

Mirroring the Machine Settings ...........................................................................2-77

Mirroring Methods ................................................................................................2-77
Importing / Exporting Using USB Memory .........................................................2-78
Directly Copying Via the Network .......................................................................2-83

Advertising