Ricoh Aficio Common Security Features Guide
T A B L E O F C O N T E N T S
Introduction.............................................................................................................................................................................1
Information is an Asset .....................................................................................................................................................1
Risk Levels........................................................................................................................................................................4
Ricoh Security Solutions Review..............................................................................................................................................6
Network Protection............................................................................................................................................................6
Web Image Monitor...................................................................................................................................................6
SmartDeviceMonitor..................................................................................................................................................6
Network Protocol ON/OFF .........................................................................................................................................7
Device Access...................................................................................................................................................................7
Administrator Authentication.....................................................................................................................................7
User Authentication...................................................................................................................................................8
IP Address Filtering ...................................................................................................................................................9
Job Logs / Access Logs ............................................................................................................................................9
User Account Registration .......................................................................................................................................10
Kerberos .................................................................................................................................................................10
802.1x Wired Authentication...................................................................................................................................10
Data Encryption ..............................................................................................................................................................11
Address Book Encryption ........................................................................................................................................12
Encrypted PDF Transmission ...................................................................................................................................12
Driver Encryption Key ..............................................................................................................................................13
PDF Password Encryption........................................................................................................................................13
S/MIME for Scan to E-mail .....................................................................................................................................13
IPsec Communication .............................................................................................................................................13
Hard Disk (HDD) Encryption....................................................................................................................................14
Document Protection.......................................................................................................................................................14
Locked Print/Secure Print .......................................................................................................................................15
Enhanced Locked Print............................................................................................................................................15
SmartDeviceMonitor (for Admin) .............................................................................................................................16
RAM-based Security ................................................................................................................................................17
Removable Hard Disk Drive .....................................................................................................................................17
Closed Network.......................................................................................................................................................19
IP-fax.......................................................................................................................................................................19
ITU-T Sub-address Routing.......................................................................................................................................19
Memory Lock ..........................................................................................................................................................19
Restricted Access....................................................................................................................................................19
Security PIN Code Protection...................................................................................................................................19
Server Domain Authentication.........................................................................................................................20
Wrong Connection Prevention..........................................................................................................................20
Fax Security Compatibility Table..............................................................................................................................20