Topic
Error
Corrections
Security Guide
> 4. Preventing
Leakage of Information from Ma-
chines > Encrypting Data on the
Hard Disk > Enabling the Encryp-
tion Settings
If you use hard disk erase-by-over-
write and encryption simultaneous-
ly and you select overwrite three
times for “Random Numbers”,
the maximum time to complete
the operations will be 11 hours,
45 minutes for types 1 and 2 or 9
hours, 15 minutes for types 3 and
4. Re-encrypting from an already
encrypted state takes the same
amount of time.
If you use hard disk erase-
by-overwrite and encryption
simultaneously and you select
overwrite three times for “Random
Numbers”, the maximum time to
complete the operations will be
7
hours, 30 minutes
for types 1 and
2 or 9 hours, 15 minutes for types
3 and 4. Re-encrypting from an
already encrypted state takes the
same amount of time.
Security Guide
> 5. Enhanced
Network Security > Specifying
Network Security Level > Status
of Functions under Each Network
Security Level
TCP/IP
Function: SSL/TLS > Permit SSL/
TLS Communication
FIPS 140:
Ciphertext Priority
FIPS 140:
Ciphertext Only
Security Guide
> 5. Enhanced
Network Security > Specifying
Network Security Level > Status
of Functions under Each Network
Security Level
TCP/IP Encryption Strength Set-
ting
Function: ssh > Encryption Algo-
rithm
Level 0:
DES/
3DES/
AES-128/
AES-192/
Blowfish/
Arcfour
Level 0:
DES/
3DES/
AES-128/
AES-192/
AES-256/
Blowfish/
Arcfour
Security Guide
> 7. Managing
the Machine > Configuring the
Browser Functions > Restricting
User Browser Functions
Step 3
Press [Settings par Users].
Step 3
Press [Settings
per
Users].
Security Guide
> 7. Managing
the Machine > Managing Device
Information
Printing Log Files
Both Printing Log Files for Import
and Export functions are not avail-
able.
Security Guide
> 7. Managing
the Machine > Managing Device
Information > Exporting Device
Information
Step 7
Select the item(s) to export and set
the export conditions.
Select [On] or [Off] for “Encryp-
•
tion”. If [On] is chosen, set up an
encryption key.
Step 7
Set the export conditions.
(You cannot select items to be
exported)
Specify an encryption key.
•
(The encryption key must be
configured)
Security Guide
> 7. Managing
the Machine > Managing Device
Information > Exporting Device
Information
Information can also be exported
•
from Web Image Monitor. When
exporting from Web Image
Monitor, device information can be
stored on the hard disk of the com-
puter you are using. For details,
see Web Image Monitor Help.
Web Image Monitor does not sup-
port the Export function.
Summary of Contents for Aficio MP C3002
Page 7: ...6 ...
Page 15: ...1 Manuals Provided with This Machine 14 ...
Page 39: ...2 Safety Information 38 ...
Page 51: ...3 Information for This Machine 50 ...
Page 54: ...Cover Paper Thickness 0 10 Body Paper Thickness 0 08 Pages in Book 0 Spine Width 0 2011 ...
Page 60: ......
Page 65: ...INDEX 235 5 ...
Page 86: ...1 What You Can Do with This Machine 26 ...
Page 126: ...2 Getting Started 66 ...
Page 128: ...7 When the copy job is finished press the Reset key to clear the settings 3 Copy 68 ...
Page 197: ...Storing the Scanned Documents to a USB Flash Memory or SC Card 6 126D ...
Page 201: ...7 Document Server 130 ...
Page 205: ...8 Web Image Monitor 134 ...
Page 235: ...9 Adding Paper and Toner 164 ...
Page 303: ...10 Troubleshooting 232 ...
Page 309: ...MEMO 238 ...
Page 310: ...MEMO 239 ...
Page 311: ...MEMO 240 EN GB EN US EN AU D143 ...
Page 312: ... 2011 ...
Page 313: ...GB EN D143 7003 US EN AU EN ...
Page 320: ......
Page 360: ...3 Installing the Scanner Driver 40 ...
Page 372: ...5 Troubleshooting 52 ...
Page 378: ...6 Installing the Printer Driver Under Mac OS X 58 ...
Page 382: ...3 Quit uninstaller 7 Appendix 62 ...
Page 386: ...MEMO 66 ...
Page 387: ...MEMO 67 ...
Page 388: ...MEMO 68 EN GB EN US EN AU D143 7038 ...
Page 389: ......
Page 390: ...EN GB EN US EN AU D143 7038 2011 ...
Page 392: ......
Page 398: ...6 ...
Page 440: ...MEMO 48 EN GB EN US EN AU D143 7042 ...
Page 441: ......
Page 442: ...EN GB EN US EN AU D143 7042 2011 ...
Page 444: ......
Page 454: ...10 ...
Page 472: ...1 Getting Started 28 ...
Page 540: ...3 Restricting Machine Usage 96 ...
Page 560: ...4 Preventing Leakage of Information from Machines 116 ...
Page 717: ...7 Press Yes 8 Log out Limiting Machine Operations to Customers Only 273 ...
Page 724: ...7 Managing the Machine 280 ...
Page 829: ......
Page 830: ...EN GB EN US EN AU D143 7040 2011 ...