- ページ 2

ファックス Ricoh Aficio SP C231SFのPDF 機能マニュアルをオンラインで閲覧またはダウンロードできます。Ricoh Aficio SP C231SF 27 ページ。 New fax feature
Ricoh Aficio SP C231SF にも: 仕様 (4 ページ), インフォメーション (36 ページ)

Ricoh Aficio SP C231SF 機能マニュアル
Ricoh Aficio Common Security Features Guide
T A B L E O F C O N T E N T S
Introduction.............................................................................................................................................................................1
Information is an Asset .....................................................................................................................................................1
Risk Levels........................................................................................................................................................................4
Ricoh Aficio Security Solutions Compatibility Chart ...........................................................................................................4
Ricoh Security Solutions Review..............................................................................................................................................6
Network Protection............................................................................................................................................................6
Web Image Monitor...................................................................................................................................................6
SmartDeviceMonitor..................................................................................................................................................6
Network Protocol ON/OFF .........................................................................................................................................7
Device Access...................................................................................................................................................................7
Administrator Authentication.....................................................................................................................................7
User Authentication...................................................................................................................................................8
Common Access Card (CAC) Authentication..............................................................................................................9
IP Address Filtering ...................................................................................................................................................9
Job Logs / Access Logs ............................................................................................................................................9
User Account Registration .......................................................................................................................................10
Wi-Fi Protect Access (WPA) Support........................................................................................................................10
Kerberos .................................................................................................................................................................10
802.1x Wired Authentication...................................................................................................................................10
Data Encryption ..............................................................................................................................................................11
128-bit Secure Socket Layer (SSL) Support ............................................................................................................11
Address Book Encryption ........................................................................................................................................12
Encrypted PDF Transmission ...................................................................................................................................12
Driver Encryption Key ..............................................................................................................................................13
PDF Password Encryption........................................................................................................................................13
SNMP v3 Encrypted Communication.......................................................................................................................13
S/MIME for Scan to E-mail .....................................................................................................................................13
IPsec Communication .............................................................................................................................................13
Hard Disk (HDD) Encryption....................................................................................................................................14
Document Protection.......................................................................................................................................................14
Hard Disk Drive Data Protection (DOSS) .................................................................................................................14
Locked Print/Secure Print .......................................................................................................................................15
Locked Print Password Encryption...........................................................................................................................15
Enhanced Locked Print............................................................................................................................................15
SmartDeviceMonitor (for Admin) .............................................................................................................................16
Password Protection of Stored Documents..............................................................................................................16
RAM-based Security ................................................................................................................................................17
Removable Hard Disk Drive .....................................................................................................................................17
Unauthorized Copy Control/Masked Type ................................................................................................................17
Commercial Facsimile Security Solutions ........................................................................................................................18
Closed Network.......................................................................................................................................................19
Confidential Transmission/Reception ......................................................................................................................19
IP-fax.......................................................................................................................................................................19
ITU-T Sub-address Routing.......................................................................................................................................19
Memory Lock ..........................................................................................................................................................19
Restricted Access....................................................................................................................................................19
Security PIN Code Protection...................................................................................................................................19
Server Domain Authentication.........................................................................................................................20
Wrong Connection Prevention..........................................................................................................................20
Fax Security Compatibility Table..............................................................................................................................20
Security Solution Compatibility Tables................................................................................................................21-24