Savin LD330 Spécifications

Naviguer en ligne ou télécharger Spécifications pour Multifonctionnels Savin LD330. Savin LD330 Specifications Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 92
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Print Controller Design Guide for Information Security
Copyright
2010 RICOH Americas Corporation. All rights reserved. Page 1 of 92
Visit our Knowledgebase at:
http://www.ricoh-usa.com/support/knowledgebase.asp
07/27/2010
Print Controller Design Guide for
Information Security 06A
Version 1.00
Gestetner Lanier Savin Ricoh
DSm416
DSm416f
DSm416pf
LD016
LD016f
LD016spf
816
816f
816mf
MP161
MP161f
MP161spf
DSm715
DSm716
DSm721d
DSm716s
DSm721ds
LD315
LD316
LD320d
LD316L
LD320Ld
9016
9021d
9016s
9021ds
MP1500
MP1600
MP2000
MP1600L
MP2000L
DSm625 LD125 7025 MP2500
DSm725e
DSm730e
LD325
LD330
8025e
8030e
MP2510
MP3010
DSm735e
DSm745e
LD335
LD345
8035e
8045e
MP3500
MP4500
GWD2004
GWD2006
LW324
LW336
2404WD
2406WD
MPW2400
MPW3600
Vue de la page 0
1 2 3 4 5 6 ... 91 92

Résumé du contenu

Page 1 - Version 1.00

Print Controller Design Guide for Information Security Copyright  2010 RICOH Americas Corporation. All rights reserved. Page 1 of 92 Visit ou

Page 2 - Page 2 of 92

Print Controller Design Guide for Information Security: Page 10 of 92 Principal Machine Functions Copier Activates the scanning engine, which read

Page 3 - TABLE OF CONTENTS

Print Controller Design Guide for Information Security: Page 11 of 92 3. Data Security External I/F The MFP/LP is equipped with the following inter

Page 4 - Applicable Products

Print Controller Design Guide for Information Security: Page 12 of 92 4. Communication between the MFP/LP and its peripherals is conducted via the

Page 5 -  Note:

Print Controller Design Guide for Information Security: Page 13 of 92 9. The USB I/F (Type A) only allows connection with devices that support eith

Page 6 - 2-1 Hardware Configuration

Print Controller Design Guide for Information Security: Page 14 of 92 • This use of a public key to decrypt the digital signature allows the MFP/LP

Page 7 - Page 7 of 92

Print Controller Design Guide for Information Security: Page 15 of 92 Remote Firmware Installation • In addition to using an SD card, it is also pos

Page 8 - 2-2 Software Configuration

Print Controller Design Guide for Information Security: Page 16 of 92 RC-GateInstallationvia RC-GateRicoh Licenese ServerDownloadDigital signaturePr

Page 9 - Page 9 of 92

Print Controller Design Guide for Information Security: Page 17 of 92 5. Authentication, Access Control Authentication • When enabled, User Auth

Page 10 - Page 10 of 92

Print Controller Design Guide for Information Security: Page 18 of 92 • Before authentication at the MFP/LP operation panel can be perform

Page 11 - 3. Data Security

Print Controller Design Guide for Information Security: Page 19 of 92 LAN PCWindows ServerJob + Auth. Info.Integration ServerAuthenticationLDAP Serve

Page 12 - Page 12 of 92

Print Controller Design Guide for Information Security: Page 2 of 92 Notice: THIS DOCUMENT MAY NOT BE REPRODUCED OR DISTRIBUTED IN WHOLE OR IN PART,

Page 13 - 4. Firmware Update

Print Controller Design Guide for Information Security: Page 20 of 92 • IC Authentication using the serial number/IDm (Felica cards or those contai

Page 14

Print Controller Design Guide for Information Security: Page 21 of 92 • On MFP/LPs with email transmission applications, to prevent the impersonati

Page 15 - (from a client PC)

Print Controller Design Guide for Information Security: Page 22 of 92 6. Administrator Settings In order to spread the risk of malicious operations

Page 16 - (performed by the end user)

Print Controller Design Guide for Information Security: Page 23 of 92 7. Data Erase/Overwrite Overview • A wide variety of data is stored in MFP/LP

Page 17 - Page 17 of 92

Print Controller Design Guide for Information Security: Page 24 of 92 Auto Erase Memory • The main purpose of this feature is to automatically overw

Page 18 - Authentication information

Print Controller Design Guide for Information Security: Page 25 of 92 8. Data Protection Protection of Address Book Data • The tables below show t

Page 19

Print Controller Design Guide for Information Security: Page 26 of 92 View Make Changes Delete Entries Change ACL Settings R View Yes RW

Page 20 - Page 20 of 92

Print Controller Design Guide for Information Security: Page 27 of 92 General Users Document Owner (User) Document Administrator Document No

Page 21 - Page 21 of 92

Print Controller Design Guide for Information Security: Page 28 of 92 9. Additional Methods for Increased Security In addition to the above, adminis

Page 22 - 6. Administrator Settings

Print Controller Design Guide for Information Security: Page 29 of 92 10. Job/Access Logs • Job logs and access logs for the principal machine fun

Page 23 - 7. Data Erase/Overwrite

Print Controller Design Guide for Information Security: Page 3 of 92 TABLE OF CONTENTS 1. Overview ...

Page 24 - Page 24 of 92

Print Controller Design Guide for Information Security: Page 30 of 92 • The MFP/LP does not allow any changes to be made to the log data itself, i.

Page 25 - 8. Data Protection

Print Controller Design Guide for Information Security: Page 31 of 92  Access log Capacity: With HDD: 6000 entries Without HDD: 500 entries Tim

Page 26 - Page 26 of 92

Print Controller Design Guide for Information Security: Page 32 of 92 11. Capture (MFP Models Only) Overview of Capture Operations • When a user ma

Page 27 - Page 27 of 92

Print Controller Design Guide for Information Security: Page 33 of 92 Operations that Generate Captured Images • Images are captured and sent to Sc

Page 28 - Page 28 of 92

Print Controller Design Guide for Information Security: Page 34 of 92 Capture Settings • ScanRouter is used to program all settings for the Capture

Page 29 - 10. Job/Access Logs

Print Controller Design Guide for Information Security: Page 35 of 92 Security Considerations • Three transfer protocols are available for sending

Page 30 - Page 30 of 92

Print Controller Design Guide for Information Security: Page 36 of 92 12. Principal Machine Functions Copier (MFP Models Only) Overview of Copier Op

Page 31 - Page 31 of 92

Print Controller Design Guide for Information Security: Page 37 of 92 Data Security Considerations • Since the page location data is erased at the

Page 32 - Page 32 of 92

Print Controller Design Guide for Information Security: Page 38 of 92 Restricting the Available Functions for Each Individual User • When User Auth

Page 33 - Page 33 of 92

Print Controller Design Guide for Information Security: Page 39 of 92 Print Backup • After a job is performed, it is possible to store a copy of th

Page 34 - Page 34 of 92

Print Controller Design Guide for Information Security: Page 4 of 92 1. Overview This document describes the structural layout and functional opera

Page 35 - Page 35 of 92

Print Controller Design Guide for Information Security: Page 40 of 92 13. Printer Overview of Printer Operations • The Printer function can be div

Page 36 - Page 36 of 92

Print Controller Design Guide for Information Security: Page 41 of 92 • From the printer driver, it is possible to select the following printing me

Page 37 - Page 37 of 92

Print Controller Design Guide for Information Security: Page 42 of 92 • When Normal Print is selected as the print job, the print management data*1

Page 38 - Page 38 of 92

Print Controller Design Guide for Information Security: Page 43 of 92 Printing Encrypted Image Data • With PDF Direct Print, it is possible to prin

Page 39 - Page 39 of 92

Print Controller Design Guide for Information Security: Page 44 of 92 • The password necessary for authentication is encrypted before the printer d

Page 40 - 13. Printer

Print Controller Design Guide for Information Security: Page 45 of 92 • It is possible to make a Stored Print or Store and Print document available

Page 41 - Page 41 of 92

Print Controller Design Guide for Information Security: Page 46 of 92 • As stated above, the PDF interpreter cross-references the password programm

Page 42 - Page 42 of 92

Print Controller Design Guide for Information Security: Page 47 of 92 14. Scanner (MFP Models Only) Overview of Scanner Operations • Depending on t

Page 43 - Page 43 of 92

Print Controller Design Guide for Information Security: Page 48 of 92 • When sending an email from the MFP via the SMTP server, the operator can ei

Page 44 - Page 44 of 92

Print Controller Design Guide for Information Security: Page 49 of 92 Protection of Data when Performing Scanning and Sending Operations It is possi

Page 45 - Page 45 of 92

Print Controller Design Guide for Information Security: Page 5 of 92 Note: Some of the hardware (e.g. external I/F) and functions described in this

Page 46 - Page 46 of 92

Print Controller Design Guide for Information Security: Page 50 of 92 • By enabling Basic Authentication, it is possible to protect the destination

Page 47 - Page 47 of 92

Print Controller Design Guide for Information Security: Page 51 of 92 • It is also possible to assign a password to individual documents when scann

Page 48 - Page 48 of 92

Print Controller Design Guide for Information Security: Page 52 of 92 • As explained above, the email forwarding feature sends data from the MFP to

Page 49 - Page 49 of 92

Print Controller Design Guide for Information Security: Page 53 of 92 15. FAX (MFP Models Only) Overview of FAX operations • The FAX function se

Page 50 - Page 50 of 92

Print Controller Design Guide for Information Security: Page 54 of 92 • With FAX reception, the incoming data is received by the FCU, which then se

Page 51 - Page 51 of 92

Print Controller Design Guide for Information Security: Page 55 of 92 Data Security Considerations • The FCU supports only G3 and G4 FAX protocols.

Page 52 - Page 52 of 92

Print Controller Design Guide for Information Security: Page 56 of 92 • When User Authentication is enabled, it is possible to set the authenticate

Page 53 - 15. FAX (MFP Models Only)

Print Controller Design Guide for Information Security: Page 57 of 92 Protection of FAX Transmission Operations • By setting restrictions on addres

Page 54 - Page 54 of 92

Print Controller Design Guide for Information Security: Page 58 of 92 Extended Security Feature • It is possible to set Extended Security to prohib

Page 55 - Page 55 of 92

Print Controller Design Guide for Information Security: Page 59 of 92 16. NetFile (GWWS) Overview of NetFile Operations • NetFile operates via comm

Page 56 - Page 56 of 92

Print Controller Design Guide for Information Security: Page 6 of 92 2. Internal System Configuration 2-1 Hardware Configuration MFP Processing an

Page 57 - Page 57 of 92

Print Controller Design Guide for Information Security: Page 60 of 92 Transferring Job Log and Access Log Data to Web SmartDeviceMonitor for Admin •

Page 58 - Page 58 of 92

Print Controller Design Guide for Information Security: Page 61 of 92 Creating Thumbnails (MFP models only) • The MFP creates thumbnail images in J

Page 59 - 16. NetFile (GWWS)

Print Controller Design Guide for Information Security: Page 62 of 92 Downloading Document Server Files to the PC (MFP models only) • From DeskTop

Page 60 - Page 60 of 92

Print Controller Design Guide for Information Security: Page 63 of 92 Forwarding Image Data with Capture • With the Capture feature, the primary ma

Page 61 - Page 61 of 92

Print Controller Design Guide for Information Security: Page 64 of 92 Viewing and Changing User Data Settings Stored in the MFP/LP • From SmartDev

Page 62 - Page 62 of 92

Print Controller Design Guide for Information Security: Page 65 of 92 Transferring the Job Log and Access Log Data • To send log data from the MFP/

Page 63 - Page 63 of 92

Print Controller Design Guide for Information Security: Page 66 of 92  User Authentication Tickets (MFP models only) When using User Authenticatio

Page 64 - Page 64 of 92

Print Controller Design Guide for Information Security: Page 67 of 92 17. Data Security Considerations SOAP Communication Sessions • SOAP communic

Page 65 - Page 65 of 92

Print Controller Design Guide for Information Security: Page 68 of 92 Restoring Files Back to the MFP (MFP models only) • Netfile will reject any da

Page 66 - Page 66 of 92

Print Controller Design Guide for Information Security: Page 69 of 92 Deleting, Pausing or Resuming Print Jobs • To delete the current job or all a

Page 67 - Page 67 of 92

Print Controller Design Guide for Information Security: Page 7 of 92 LP Processing andControl Unit - CPU - RAMNVRAM ・Settings ・CountersI/O Controll

Page 68 - Page 68 of 92

Print Controller Design Guide for Information Security: Page 70 of 92 18. Web Applications Web Server Framework The MFP/LP Web Server was developed

Page 69 - Page 69 of 92

Print Controller Design Guide for Information Security: Page 71 of 92 Protection Against URL Buffer Overflows • URL buffer overflow attacks occur w

Page 70 - 18. Web Applications

Print Controller Design Guide for Information Security: Page 72 of 92 19. WebDocBox (MFP models only) Overview of WebDocBox Operations • WebDocBox

Page 71 - Page 71 of 92

Print Controller Design Guide for Information Security: Page 73 of 92 Sending Stored Image Data to the PC • When the MFP receives a request from

Page 72 - Page 72 of 92

Print Controller Design Guide for Information Security: Page 74 of 92 • It is possible to protect individual Document Server documents with a pass

Page 73 - Page 73 of 92

Print Controller Design Guide for Information Security: Page 75 of 92 20. Optional Features @Remote Overview of @Remote Operations • “@Remote” ref

Page 74 - Page 74 of 92

Print Controller Design Guide for Information Security: Page 76 of 92 The NCS module communicates with RC Gate via the host I/F over an SSL connecti

Page 75 - 20. Optional Features

Print Controller Design Guide for Information Security: Page 77 of 92 The NCS module communicates with the @Remote Center via the host I/F over an S

Page 76 - Page 76 of 92

Print Controller Design Guide for Information Security: Page 78 of 92 • The internal layout of the modules is such that the NRS module must always

Page 77 - Page 77 of 92

Print Controller Design Guide for Information Security: Page 79 of 92 21. CSS (Customer Support System) – MFP Models Only Overview of CSS Operations

Page 78 - Page 78 of 92

Print Controller Design Guide for Information Security: Page 8 of 92 2-2 Software Configuration SIMHNetBSD=-=-=-=-=-=-=-=-=-= Engine I/F =-=-=-=-=-

Page 79 - Page 79 of 92

Print Controller Design Guide for Information Security: Page 80 of 92 22. Copy Data Security Feature Overview of Copy Data Security Operations • Th

Page 80 - Page 80 of 92

Print Controller Design Guide for Information Security: Page 81 of 92 Data Flow Marking: • The data flow for when the Copy Data Security f

Page 81

Print Controller Design Guide for Information Security: Page 82 of 92 Other Conditions of Use On some MFP models, one or more of the following limit

Page 82 - Page 82 of 92

Print Controller Design Guide for Information Security: Page 83 of 92 23. Device SDK Applications (DSDK) Overview of Operations • DSDK applications

Page 83 - Page 83 of 92

Print Controller Design Guide for Information Security: Page 84 of 92 Installation • DSDK applications are installed via Type 1 or Type 2 SD cards i

Page 84 - Page 84 of 92

Print Controller Design Guide for Information Security: Page 85 of 92 Overview of SDK Application Functions • As mentioned above, Vendors can creat

Page 85 - SDK Application

Print Controller Design Guide for Information Security: Page 86 of 92 Data Flow Scanning Functions: Sending Data over the Network with the Copier and

Page 86 - Page 86 of 92

Print Controller Design Guide for Information Security: Page 87 of 92 Network Functions • As mentioned above, a Type 1 SDK application is able to p

Page 87 - Page 87 of 92

Print Controller Design Guide for Information Security: Page 88 of 92 24. Data Security Considerations Preventing the Installation of Illegal Applic

Page 88 - Page 88 of 92

Print Controller Design Guide for Information Security: Page 89 of 92 SDK Authentication (Types 1 and 2) • Once the development of the SDK applicat

Page 89 - Page 89 of 92

Print Controller Design Guide for Information Security: Page 9 of 92 FCS (FAX Control Service) Exchanges data and commands with the FCU (FAX

Page 90 - Page 90 of 92

Print Controller Design Guide for Information Security: Page 90 of 92 • As a general rule, Ricoh assigns relatively restricted access privileges to

Page 91 - Page 91 of 92

Print Controller Design Guide for Information Security: Page 91 of 92 Protection Against Attacks on Principal MFP/LP Functions, Prevention of Damage

Page 92 - Page 92 of 92

Print Controller Design Guide for Information Security: Page 92 of 92 Certification of the SDK Application • Having completed the development of th

Commentaires sur ces manuels

Pas de commentaire