Ricoh Pro C700EX Series Merkmale Handbuch - Seite 2
Blättern Sie online oder laden Sie pdf Merkmale Handbuch für Drucker Ricoh Pro C700EX Series herunter. Ricoh Pro C700EX Series 27 Seiten. Security features guide
Auch für Ricoh Pro C700EX Series: Broschüre & Specs (6 seiten)
Ricoh Aficio Common Security Features Guide
T A B L E O F C O N T E N T S
Introduction.............................................................................................................................................................................1
Information is an Asset .....................................................................................................................................................1
Risk Levels........................................................................................................................................................................4
Ricoh Aficio Security Solutions Compatibility Chart ...........................................................................................................4
Ricoh Security Solutions Review..............................................................................................................................................6
Network Protection............................................................................................................................................................6
Web Image Monitor...................................................................................................................................................6
SmartDeviceMonitor..................................................................................................................................................6
Network Protocol ON/OFF .........................................................................................................................................7
Device Access...................................................................................................................................................................7
Administrator Authentication.....................................................................................................................................7
User Authentication...................................................................................................................................................8
Common Access Card (CAC) Authentication..............................................................................................................9
IP Address Filtering ...................................................................................................................................................9
Job Logs / Access Logs ............................................................................................................................................9
User Account Registration .......................................................................................................................................10
Wi-Fi Protect Access (WPA) Support........................................................................................................................10
Kerberos .................................................................................................................................................................10
802.1x Wired Authentication...................................................................................................................................10
Data Encryption ..............................................................................................................................................................11
128-bit Secure Socket Layer (SSL) Support ............................................................................................................11
Address Book Encryption ........................................................................................................................................12
Encrypted PDF Transmission ...................................................................................................................................12
Driver Encryption Key ..............................................................................................................................................13
PDF Password Encryption........................................................................................................................................13
SNMP v3 Encrypted Communication.......................................................................................................................13
S/MIME for Scan to E-mail .....................................................................................................................................13
IPsec Communication .............................................................................................................................................13
Hard Disk (HDD) Encryption....................................................................................................................................14
Document Protection.......................................................................................................................................................14
Hard Disk Drive Data Protection (DOSS) .................................................................................................................14
Locked Print/Secure Print .......................................................................................................................................15
Locked Print Password Encryption...........................................................................................................................15
Enhanced Locked Print............................................................................................................................................15
SmartDeviceMonitor (for Admin) .............................................................................................................................16
Password Protection of Stored Documents..............................................................................................................16
RAM-based Security ................................................................................................................................................17
Removable Hard Disk Drive .....................................................................................................................................17
Unauthorized Copy Control/Masked Type ................................................................................................................17
Commercial Facsimile Security Solutions ........................................................................................................................18
Closed Network.......................................................................................................................................................19
Confidential Transmission/Reception ......................................................................................................................19
IP-fax.......................................................................................................................................................................19
ITU-T Sub-address Routing.......................................................................................................................................19
Memory Lock ..........................................................................................................................................................19
Restricted Access....................................................................................................................................................19
Security PIN Code Protection...................................................................................................................................19
Server Domain Authentication.........................................................................................................................20
Wrong Connection Prevention..........................................................................................................................20
Fax Security Compatibility Table..............................................................................................................................20
Security Solution Compatibility Tables................................................................................................................21-24