Ricoh Pro C720s Manuale utente

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
8
Getting Started
Authentication and its Application
Ensuring Information Security
Managing Access to the Machine
Enhanced Network Security
Specifying the Extended Security Functions
Troubleshooting
Appendix
1
2
3
4
5
6
7
Security Reference
Operating Instructions
Pro C720s

Introduction
This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and
benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference.
Important
Contents of this manual are subject to change without prior notice. In no event will the company be liable for direct,
indirect, special, incidental, or consequential damages as a result of handling or operating the machine.
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its completeness or
accuracy. If you have any questions concerning the legality of copying or printing certain items, consult with your
legal advisor.
Notes:
Some illustrations in this manual might be slightly different from the machine.
Certain options might not be available in some countries. For details, please contact your local dealer.
Depending on which country you are in, certain units may be optional. For details, please contact your local dealer.
Caution:
Use of controls or adjustments or performance of procedures other than those specified in this manual might result
in hazardous radiation exposure.

Manuals for This Machine
Refer to the manuals that are relevant to what you want to do with the machine.
• Media differ according to manual.
• The printed and electronic versions of a manual have the same contents.
• Adobe Acrobat Reader/Adobe Reader must be installed in order to view the manuals as PDF files.
• A Web browser must be installed in order to view the html manuals.
• For enhanced security, we recommend that you first make the following settings. For details, see
“Setting Up the Machine”, Security Reference.
• Install the Device Certificate.
• Enable SSL (Secure Sockets Layer) Encryption.
• Change the user name and password of the administrator using Web Image Monitor.
About This Machine
Be sure to read the Safety Information in this manual before using the machine.
This manual provides an introduction to the functions of the machine. It also explains the control panel,
preparation procedures for using the machine, how to enter text, and how to install the CD-ROMs
provided.
Troubleshooting
Provides a guide to solving common problems, and explains how to replace paper, toner, staples,
and other consumables.
Copy/Document Server Reference
Explains Copier and Document Server functions and operations. Also refer to this manual for
explanations on how to place originals.
Scanner Reference
Explains Scanner functions and operations.
Network Guide
Explains how to configure and operate the machine in a network environment.
General Settings Guide
Explains User Tools settings, and Address Book procedures such as registering user codes. Also refer
to this manual for explanations on how to connect the machine.
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. Be sure to read
this manual when setting the enhanced security functions, or user and administrator authentication.
1

Information
Contains general notes on the machine, and information about the trademarks of product names used
in the manuals.
• In addition to the above, manuals are also provided for the Printer function.
2

TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
How to Read This Manual.................................................................................................................................8
Symbols...........................................................................................................................................................8
IP Address.......................................................................................................................................................8
1. Getting Started
Before Using the Security Functions..................................................................................................................9
Setting Up the Machine...................................................................................................................................10
Enhanced Security............................................................................................................................................12
Glossary............................................................................................................................................................13
Security Measures Provided by this Machine................................................................................................14
Using Authentication and Managing Users...............................................................................................14
Ensuring Information Security.....................................................................................................................14
Limiting and Controlling Access..................................................................................................................15
Enhanced Network Security.......................................................................................................................16
2. Authentication and its Application
Administrators and Users.................................................................................................................................17
Administrators...............................................................................................................................................17
User...............................................................................................................................................................18
The Management Function..............................................................................................................................20
About Administrator Authentication............................................................................................................20
About User Authentication..........................................................................................................................21
Enabling Authentication...................................................................................................................................23
Authentication Setting Procedure...............................................................................................................23
Administrator Authentication...........................................................................................................................25
Specifying Administrator Privileges............................................................................................................25
Registering the Administrator......................................................................................................................28
Logging on Using Administrator Authentication........................................................................................33
Logging off Using Administrator Authentication........................................................................................35
Changing the Administrator........................................................................................................................36
Using Web Image Monitor.........................................................................................................................38
User Authentication..........................................................................................................................................40
User Code Authentication...............................................................................................................................41
Specifying User Code Authentication........................................................................................................41
3

Basic Authentication.........................................................................................................................................44
Specifying Basic Authentication..................................................................................................................44
Authentication Information Stored in the Address Book...........................................................................46
Windows Authentication.................................................................................................................................53
Specifying Windows Authentication..........................................................................................................54
LDAP Authentication.........................................................................................................................................61
Specifying LDAP Authentication.................................................................................................................62
Integration Server Authentication....................................................................................................................67
Specifying Integration Server Authentication............................................................................................67
If User Authentication is Specified..................................................................................................................74
User Code Authentication (Using the Control Panel)................................................................................74
Login (Using the Control Panel)..................................................................................................................75
Log Off (Using the Control Panel)..............................................................................................................76
Login (Using Web Image Monitor)............................................................................................................77
Log Off (Using Web Image Monitor).........................................................................................................77
Auto Logout..................................................................................................................................................77
Authentication Using an External Device.......................................................................................................81
3. Ensuring Information Security
Specifying Access Permission for Stored Files...............................................................................................83
Assigning Users and Access Permission for Stored Files..........................................................................84
Specifying Access Privileges for Files Stored using the Scanner Function..............................................86
Assigning the User and the Access Permission for the User's Stored Files..............................................90
Specifying Passwords for Stored Files........................................................................................................93
Unlocking Files.............................................................................................................................................95
Preventing Data Leaks Due to Unauthorized Transmission...........................................................................98
Restrictions on Destinations.........................................................................................................................98
Using S/MIME to Protect E-mail Transmission............................................................................................101
E-mail Encryption.......................................................................................................................................101
Attaching an Electronic Signature............................................................................................................103
Protecting the Address Book.........................................................................................................................109
Address Book Access Permission.............................................................................................................109
Encrypting Data in the Address Book......................................................................................................112
Deleting Data on the Hard Disk....................................................................................................................116
4

Auto Erase Memory .................................................................................................................................116
Erase All Memory......................................................................................................................................120
4. Managing Access to the Machine
Preventing Modification of Machine Settings..............................................................................................125
Menu Protect..................................................................................................................................................127
Menu Protect..............................................................................................................................................127
Limiting Available Functions..........................................................................................................................130
Specifying Which Functions are Available.............................................................................................130
5. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................133
Access Control...........................................................................................................................................133
Enabling/Disabling Protocols..................................................................................................................134
Specifying Network Security Level..........................................................................................................140
Encrypting Transmitted Passwords...............................................................................................................144
Driver Encryption Key...............................................................................................................................144
Protection Using Encryption..........................................................................................................................147
SSL (Secure Sockets Layer) Encryption....................................................................................................147
User Settings for SSL (Secure Sockets Layer)..........................................................................................152
Setting the SSL / TLS Encryption Mode...................................................................................................152
SNMPv3 Encryption.................................................................................................................................154
Transmission Using IPsec...............................................................................................................................157
Encryption and Authentication by IPsec..................................................................................................157
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................158
IPsec Settings.............................................................................................................................................159
Encryption Key Auto Exchange Settings Configuration Flow................................................................167
Encryption Key Manual Settings Configuration Flow.............................................................................172
telnet Setting Commands..........................................................................................................................173
6. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................181
Changing the Extended Security Functions.............................................................................................181
Procedure for Changing the Extended Security Functions.....................................................................181
Settings.......................................................................................................................................................183
Other Security Functions...............................................................................................................................187
5

Scanner Function.......................................................................................................................................187
Weekly Timer Code..................................................................................................................................187
Limiting Machine Operation to Customers Only.........................................................................................192
Settings.......................................................................................................................................................192
Specifying Service Mode Lock Preparation............................................................................................192
Canceling Service Mode Lock.................................................................................................................194
7. Troubleshooting
Authentication Does Not Work Properly.....................................................................................................197
A Message Appears.................................................................................................................................197
An Error Code Appears............................................................................................................................199
Machine Cannot Be Operated................................................................................................................213
8. Appendix
Supervisor Operations..................................................................................................................................217
Logging on as the Supervisor...................................................................................................................217
Logging off as the Supervisor...................................................................................................................219
Changing the Supervisor..........................................................................................................................219
Resetting an Administrator's Password....................................................................................................222
Machine Administrator Settings....................................................................................................................224
System Settings..........................................................................................................................................224
Copier / Document Server Features.......................................................................................................226
Scanner Features.......................................................................................................................................227
Settings via Web Image Monitor.............................................................................................................227
Network Administrator Settings....................................................................................................................231
System Settings..........................................................................................................................................231
Scanner Features.......................................................................................................................................232
Settings via Web Image Monitor.............................................................................................................232
File Administrator Settings.............................................................................................................................235
System Settings..........................................................................................................................................235
Settings via Web Image Monitor.............................................................................................................235
User Administrator Settings...........................................................................................................................237
System Settings..........................................................................................................................................237
Settings via Web Image Monitor.............................................................................................................238
Document Server File Permissions................................................................................................................239
6

The Privilege for User Account Settings in the Address Book.....................................................................241
User Settings - Control Panel Settings..........................................................................................................244
Copier / Document Server Features............................................................................................................245
Scanner Features...........................................................................................................................................251
System Settings...............................................................................................................................................253
User Settings - Web Image Monitor Settings..............................................................................................259
Device Settings...............................................................................................................................................260
Scanner...........................................................................................................................................................270
Interface..........................................................................................................................................................272
Network..........................................................................................................................................................273
Webpage.......................................................................................................................................................276
Functions That Require Options....................................................................................................................277
INDEX...........................................................................................................................................................279
7

How to Read This Manual
Symbols
This manual uses the following symbols:
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[ ]
Indicates the names of keys that appear on the machine's display panel.
[ ]
Indicates the names of keys on the machine's control panel.
IP Address
In this manual, “IP address” covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.
8
Altri manuali per Pro C720s
1
Indice
Altri manuali Ricoh Fotocopiatrice

Ricoh
Ricoh M5 Manuale utente

Ricoh
Ricoh A193 Manuale utente

Ricoh
Ricoh FT2012+ Manuale utente

Ricoh
Ricoh IS 2060 Manuale utente

Ricoh
Ricoh Afico 3030 Manuale utente

Ricoh
Ricoh AD1 Manuale utente

Ricoh
Ricoh MP 401 spf Manuale utente

Ricoh
Ricoh D069 Guida rapida

Ricoh
Ricoh FT5034 Manuale utente

Ricoh
Ricoh Pro C550EX Manuale utente

Ricoh
Ricoh FT4480 Guida rapida

Ricoh
Ricoh Pro C550EX Istruzioni di installazione e manutenzione

Ricoh
Ricoh FT5034C Manuale utente

Ricoh
Ricoh A183 Manuale utente

Ricoh
Ricoh D017 Manuale utente

Ricoh
Ricoh LDD745 Manuale utente

Ricoh
Ricoh FW740 Manuale utente

Ricoh
Ricoh D146 Manuale utente

Ricoh
Ricoh A163 Manuale utente

Ricoh
Ricoh A-C4 Manuale utente





















