Ricoh Pro C900s Характеристики Руководство - Страница 2

Просмотреть онлайн или скачать pdf Характеристики Руководство для Принтер Ricoh Pro C900s. Ricoh Pro C900s 27 страниц. Color server options
Также для Ricoh Pro C900s: Технические характеристики (6 страниц), Брошюра и технические характеристики (8 страниц), Руководство по установке (24 страниц), Заметки для пользователей (2 страниц), Дополнение для пользователей (24 страниц), Руководство по технике безопасности (12 страниц)

Ricoh Pro C900s Характеристики Руководство
Ricoh Aficio Common Security Features Guide
T A B L E O F C O N T E N T S
Introduction.............................................................................................................................................................................1
Information is an Asset .....................................................................................................................................................1
Risk Levels........................................................................................................................................................................4
Ricoh Aficio Security Solutions Compatibility Chart ...........................................................................................................4
Ricoh Security Solutions Review..............................................................................................................................................6
Network Protection............................................................................................................................................................6
Web Image Monitor...................................................................................................................................................6
SmartDeviceMonitor..................................................................................................................................................6
Network Protocol ON/OFF .........................................................................................................................................7
Device Access...................................................................................................................................................................7
Administrator Authentication.....................................................................................................................................7
User Authentication...................................................................................................................................................8
Common Access Card (CAC) Authentication..............................................................................................................9
IP Address Filtering ...................................................................................................................................................9
Job Logs / Access Logs ............................................................................................................................................9
User Account Registration .......................................................................................................................................10
Wi-Fi Protect Access (WPA) Support........................................................................................................................10
Kerberos .................................................................................................................................................................10
802.1x Wired Authentication...................................................................................................................................10
Data Encryption ..............................................................................................................................................................11
128-bit Secure Socket Layer (SSL) Support ............................................................................................................11
Address Book Encryption ........................................................................................................................................12
Encrypted PDF Transmission ...................................................................................................................................12
Driver Encryption Key ..............................................................................................................................................13
PDF Password Encryption........................................................................................................................................13
SNMP v3 Encrypted Communication.......................................................................................................................13
S/MIME for Scan to E-mail .....................................................................................................................................13
IPsec Communication .............................................................................................................................................13
Hard Disk (HDD) Encryption....................................................................................................................................14
Document Protection.......................................................................................................................................................14
Hard Disk Drive Data Protection (DOSS) .................................................................................................................14
Locked Print/Secure Print .......................................................................................................................................15
Locked Print Password Encryption...........................................................................................................................15
Enhanced Locked Print............................................................................................................................................15
SmartDeviceMonitor (for Admin) .............................................................................................................................16
Password Protection of Stored Documents..............................................................................................................16
RAM-based Security ................................................................................................................................................17
Removable Hard Disk Drive .....................................................................................................................................17
Unauthorized Copy Control/Masked Type ................................................................................................................17
Commercial Facsimile Security Solutions ........................................................................................................................18
Closed Network.......................................................................................................................................................19
Confidential Transmission/Reception ......................................................................................................................19
IP-fax.......................................................................................................................................................................19
ITU-T Sub-address Routing.......................................................................................................................................19
Memory Lock ..........................................................................................................................................................19
Restricted Access....................................................................................................................................................19
Security PIN Code Protection...................................................................................................................................19
Server Domain Authentication.........................................................................................................................20
Wrong Connection Prevention..........................................................................................................................20
Fax Security Compatibility Table..............................................................................................................................20
Security Solution Compatibility Tables................................................................................................................21-24