Ricoh Aficio MP C2500 EFI 기능 설명서 - 페이지 2
{카테고리_이름} Ricoh Aficio MP C2500 EFI에 대한 기능 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. Ricoh Aficio MP C2500 EFI 27 페이지. Security features guide
Ricoh Aficio Common Security Features Guide
T A B L E O F C O N T E N T S
Introduction.............................................................................................................................................................................1
Information is an Asset .....................................................................................................................................................1
Risk Levels........................................................................................................................................................................4
Ricoh Aficio Security Solutions Compatibility Chart ...........................................................................................................4
Ricoh Security Solutions Review..............................................................................................................................................6
Network Protection............................................................................................................................................................6
Web Image Monitor...................................................................................................................................................6
SmartDeviceMonitor..................................................................................................................................................6
Network Protocol ON/OFF .........................................................................................................................................7
Device Access...................................................................................................................................................................7
Administrator Authentication.....................................................................................................................................7
User Authentication...................................................................................................................................................8
Common Access Card (CAC) Authentication..............................................................................................................9
IP Address Filtering ...................................................................................................................................................9
Job Logs / Access Logs ............................................................................................................................................9
User Account Registration .......................................................................................................................................10
Wi-Fi Protect Access (WPA) Support........................................................................................................................10
Kerberos .................................................................................................................................................................10
802.1x Wired Authentication...................................................................................................................................10
Data Encryption ..............................................................................................................................................................11
128-bit Secure Socket Layer (SSL) Support ............................................................................................................11
Address Book Encryption ........................................................................................................................................12
Encrypted PDF Transmission ...................................................................................................................................12
Driver Encryption Key ..............................................................................................................................................13
PDF Password Encryption........................................................................................................................................13
SNMP v3 Encrypted Communication.......................................................................................................................13
S/MIME for Scan to E-mail .....................................................................................................................................13
IPsec Communication .............................................................................................................................................13
Hard Disk (HDD) Encryption....................................................................................................................................14
Document Protection.......................................................................................................................................................14
Hard Disk Drive Data Protection (DOSS) .................................................................................................................14
Locked Print/Secure Print .......................................................................................................................................15
Locked Print Password Encryption...........................................................................................................................15
Enhanced Locked Print............................................................................................................................................15
SmartDeviceMonitor (for Admin) .............................................................................................................................16
Password Protection of Stored Documents..............................................................................................................16
RAM-based Security ................................................................................................................................................17
Removable Hard Disk Drive .....................................................................................................................................17
Unauthorized Copy Control/Masked Type ................................................................................................................17
Commercial Facsimile Security Solutions ........................................................................................................................18
Closed Network.......................................................................................................................................................19
Confidential Transmission/Reception ......................................................................................................................19
IP-fax.......................................................................................................................................................................19
ITU-T Sub-address Routing.......................................................................................................................................19
Memory Lock ..........................................................................................................................................................19
Restricted Access....................................................................................................................................................19
Security PIN Code Protection...................................................................................................................................19
Server Domain Authentication.........................................................................................................................20
Wrong Connection Prevention..........................................................................................................................20
Fax Security Compatibility Table..............................................................................................................................20
Security Solution Compatibility Tables................................................................................................................21-24