EasyManua.ls Logo

Xerox WorkCentre 5230

Xerox WorkCentre 5230
30 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
2
1. Before Using the Security Function ...................................................................................4
1.1. Preface.........................................................................................................................4
1.2. Security Features .........................................................................................................4
1.3. Settings for the Secure Operation.................................................................................4
1.4. Data Restoration...........................................................................................................5
1.5. Starting use of the data encryption feature and changing the settings..........................5
1.6. For Optimal Performance of the Security features........................................................6
1.7. Confirm the Machine ROM version and Clock..............................................................7
1.7.1. How to check by Control Panel...........................................................................7
1.7.2. How to check by Print Report .............................................................................7
1.7.3. How to check the Clock......................................................................................7
2. Initial Setting Procedures...................................................................................................8
2.1. Use Passcode Entry from Control Panel ......................................................................8
2.2. Preparations for settings on the machine’s control panel..............................................8
2.3. Change the System Administrator Passcode................................................................8
2.4. Set Maximum Login Attempts.......................................................................................9
2.5. Set Service Rep. Restricted Operation.........................................................................9
2.6. Set Overwrite Hard Disk.............................................................................................10
2.7. Set Data Encryption....................................................................................................10
2.8. Set Scheduled Image Overwrite.................................................................................10
2.9. Set Authentication.......................................................................................................11
2.10. Set Private Print..........................................................................................................11
2.11. Set User Passcode Minimum Length..........................................................................11
2.12. Preparations for settings on the CentreWare Internet Services ..................................12
2.13. Disable SMB...............................................................................................................12
2.14. Creating a self-signed certificate (for SSL server) and SSL/TSL Client ....................12
2.15. Configuring Machine certificates.................................................................................12
2.16. Set IPSec ...................................................................................................................13
2.17. Set SNMPv3...............................................................................................................13
2.18. Set S/MIME ................................................................................................................14
2.19. Set Audit Log..............................................................................................................14
3. Authentication..................................................................................................................15
3.1. Overview of Authentication .........................................................................................15
3.1.1. Users Controlled by Authentication...................................................................15
3.1.2. Local Machine Authentication...........................................................................15
3.1.3. Functions Controlled by Authentication.............................................................16
3.2. Authentication for Mailboxes.......................................................................................17
3.2.1. Types of Mailboxes...........................................................................................17
4. Operation Using Control Panel........................................................................................19
4.1. User Authentication ....................................................................................................19
4.2. Create/View User Accounts........................................................................................19
4.3. Reset User Accounts..................................................................................................20
4.4. Change User Passcode..............................................................................................21
4.5. MailboxStored Document Settings ..........................................................................21
4.5.1. Mailbox Service Settings ..................................................................................21
4.5.2. Stored Document Settings................................................................................21
4.6. Create Mailbox ...........................................................................................................22
4.7. Send from Mailbox......................................................................................................23
4.8. Private Charge Print ...................................................................................................24
5. Operation Using CentreWare Internet Services...............................................................25
5.1. Target Computers.......................................................................................................25
5.2. Accessing CentreWare Internet Services ...................................................................25
5.3. Print............................................................................................................................26
5.4. Mailbox.......................................................................................................................26

Table of Contents

Other manuals for Xerox WorkCentre 5230

Related product manuals