Ricoh Aficio SP C231SF Merkmale Handbuch - Seite 2

Blättern Sie online oder laden Sie pdf Merkmale Handbuch für Fax Machine Ricoh Aficio SP C231SF herunter. Ricoh Aficio SP C231SF 27 Seiten. New fax feature
Auch für Ricoh Aficio SP C231SF: Spezifikationen (4 seiten), Informationen (36 seiten)

Ricoh Aficio SP C231SF Merkmale Handbuch
Ricoh Aficio Common Security Features Guide
T A B L E O F C O N T E N T S
Introduction.............................................................................................................................................................................1
Information is an Asset .....................................................................................................................................................1
Risk Levels........................................................................................................................................................................4
Ricoh Aficio Security Solutions Compatibility Chart ...........................................................................................................4
Ricoh Security Solutions Review..............................................................................................................................................6
Network Protection............................................................................................................................................................6
Web Image Monitor...................................................................................................................................................6
SmartDeviceMonitor..................................................................................................................................................6
Network Protocol ON/OFF .........................................................................................................................................7
Device Access...................................................................................................................................................................7
Administrator Authentication.....................................................................................................................................7
User Authentication...................................................................................................................................................8
Common Access Card (CAC) Authentication..............................................................................................................9
IP Address Filtering ...................................................................................................................................................9
Job Logs / Access Logs ............................................................................................................................................9
User Account Registration .......................................................................................................................................10
Wi-Fi Protect Access (WPA) Support........................................................................................................................10
Kerberos .................................................................................................................................................................10
802.1x Wired Authentication...................................................................................................................................10
Data Encryption ..............................................................................................................................................................11
128-bit Secure Socket Layer (SSL) Support ............................................................................................................11
Address Book Encryption ........................................................................................................................................12
Encrypted PDF Transmission ...................................................................................................................................12
Driver Encryption Key ..............................................................................................................................................13
PDF Password Encryption........................................................................................................................................13
SNMP v3 Encrypted Communication.......................................................................................................................13
S/MIME for Scan to E-mail .....................................................................................................................................13
IPsec Communication .............................................................................................................................................13
Hard Disk (HDD) Encryption....................................................................................................................................14
Document Protection.......................................................................................................................................................14
Hard Disk Drive Data Protection (DOSS) .................................................................................................................14
Locked Print/Secure Print .......................................................................................................................................15
Locked Print Password Encryption...........................................................................................................................15
Enhanced Locked Print............................................................................................................................................15
SmartDeviceMonitor (for Admin) .............................................................................................................................16
Password Protection of Stored Documents..............................................................................................................16
RAM-based Security ................................................................................................................................................17
Removable Hard Disk Drive .....................................................................................................................................17
Unauthorized Copy Control/Masked Type ................................................................................................................17
Commercial Facsimile Security Solutions ........................................................................................................................18
Closed Network.......................................................................................................................................................19
Confidential Transmission/Reception ......................................................................................................................19
IP-fax.......................................................................................................................................................................19
ITU-T Sub-address Routing.......................................................................................................................................19
Memory Lock ..........................................................................................................................................................19
Restricted Access....................................................................................................................................................19
Security PIN Code Protection...................................................................................................................................19
Server Domain Authentication.........................................................................................................................20
Wrong Connection Prevention..........................................................................................................................20
Fax Security Compatibility Table..............................................................................................................................20
Security Solution Compatibility Tables................................................................................................................21-24