Ricoh GX3050SFN - Aficio Color Inkjet Features Manual Download Page 25

22

Network

Data

Document

Protection Device Access

Encryption

Protection

Black & White Multifunction

AC104

AC204

AC205L

■ ■

Aficio SP 1000SF

■ ■ ■

Aficio SP 3400SF/

■ ■ ■

■ ■

SP 3410SF

Aficio SP 3200SF

■ ■

Aficio SP 4100SFL/

■ ■ ■

■ ■ ■ ■ ■ ■

■ ■ ■ ■ ■

■ ■ ■

SP4100SF/SP4110SF

Aficio 1515/1515F/

■ ■

1515MF

Aficio MP 161/F/

■ ■ ■

1

1

1

1

3

1

1

1

1

1

1

SPF

Aficio MP 171/F/

■ ■ ■

1

1

1

1

1

1

3

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

SPF

Aficio 2015

■ ■

Aficio 2016

■ ■

Aficio MP 1600/SPF

■ ■ ■

1

1

1

1

3

■ ■

4

1

1

1

1

Aficio 2018/2018D

■ ■

Aficio 2020/2020D

■ ■

Aficio MP 2000/SPF

■ ■ ■

1

1

1

1

3

■ ■

4

1

1

1

1

Aficio MP 2500

1

1

■ ■

1

1

■ ■

1

3

1

4

1

1

1

1

■ ■

Aficio MP 2500SPF

■ ■ ■

■ ■ ■ ■

2

■ ■ ■ ■ ■ ■

■ ■

Aficio MP 2851SP/

■ ■ ■

■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■

MP 3351SP

Aficio MP 2510/P/

■ ■ ■

■ ■ ■ ■

■ ■ ■

■ ■ ■ ■

SP/SPF/SPI

Aficio MP 3010/P/

■ ■ ■

■ ■ ■ ■

■ ■ ■

■ ■ ■ ■

SP/SPF/SPI

Aficio 3025/P/SP/

■ ■ ■

■ ■ ■ ■ ■

■ ■ ■ ■ ■ ■

■ ■ ■ ■

SPF/SPi

Aficio 3030/P/SP/

■ ■ ■

■ ■ ■ ■ ■

■ ■ ■ ■ ■ ■

■ ■ ■ ■

SPF/SPi

Aficio MP 2550B/

■ ■ ■

■ ■ ■ ■ ■ ■ ■

■ ■ ■

■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■

■ ■

MP 2550/SPF

Aficio MP 3350B/

■ ■ ■

■ ■ ■ ■ ■ ■ ■

■ ■ ■

■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■

■ ■

3350/SPF

W

e

b

Im

a

g

e

M

o

n

it

o

r

S

m

a

rt

D

e

vi

ce

M

o

n

it

o

r

N

e

tw

o

rk

P

ro

to

co

ls

O

N

/

O

FF

A

d

m

in

is

tr

a

to

r

A

u

th

e

n

ti

ca

ti

o

n

Jo

b

Lo

g

/

A

cc

e

ss

Lo

g

IP

A

d

d

re

ss

F

ilt

e

ri

n

g

U

se

r

A

cc

o

u

n

t

R

e

g

is

tr

a

ti

o

n

U

se

r

A

u

th

e

n

ti

ca

ti

o

n

W

i-

F

i

P

ro

te

ct

A

cc

e

ss

(W

P

A

)

K

e

rb

e

ro

s

8

0

2

.1

X

W

ir

e

d

A

u

th

e

n

ti

ca

ti

o

n

U

.S

.

D

o

D

C

o

m

m

o

n

A

cc

e

ss

C

a

rd

(C

A

C

)

A

u

th

.

1

2

8

-b

it

S

e

cu

re

S

o

ck

e

t

La

ye

r

(S

S

L)

A

d

d

re

ss

B

o

o

k

E

n

cr

yp

ti

o

n

E

n

cr

yp

te

d

P

D

F

Tr

a

n

sm

is

si

o

n

D

ri

ve

r

E

n

cr

yp

ti

o

n

K

e

y

P

D

F

P

a

ss

w

o

rd

E

n

cr

yp

ti

o

n

S

N

M

P

v3

E

n

cr

yp

ti

o

n

S

/

M

IM

E

fo

r

S

ca

n

to

E

m

a

il

IP

se

c

C

o

m

m

u

n

ic

a

ti

o

n

H

D

D

E

n

cr

yp

ti

o

n

Lo

ck

e

d

P

ri

n

t

P

a

ss

w

o

rd

E

n

cr

yp

ti

o

n

D

a

ta

O

ve

rw

ri

te

S

e

cu

ri

ty

S

ys

te

m

(D

O

S

S

)

Lo

ck

e

d

/

S

e

cu

re

P

ri

n

t/

E

n

h

a

n

ce

d

Lo

ck

e

d

P

ri

n

t

P

a

ss

w

o

rd

P

ro

te

ct

io

n

o

f

S

to

re

d

D

o

cu

m

e

n

ts

R

A

M

-b

a

se

d

S

e

cu

ri

ty

*

(I

f

H

a

rd

D

ri

ve

is

O

p

ti

o

n

a

l)

R

e

m

o

va

b

le

H

a

rd

D

ri

ve

U

n

a

u

th

o

ri

ze

d

C

o

p

y

C

o

n

tr

o

l

M

a

sk

Ty

p

e

fo

r

C

o

p

yi

n

g

C

o

p

y

D

a

ta

S

e

cu

ri

ty

O

p

ti

o

n

1

Printer/Scanner Kit is required.

2

IEEE 802.11b required.

3

Printer/Scanner Kit and IEEE 802.11b required.

4

Printer/Scanner Kit or Fax Kit required.

Summary of Contents for GX3050SFN - Aficio Color Inkjet

Page 1: ...Multifunction Devices Color Printers Black White Printers Super G3 Facsimiles Ricoh Aficio Common Security Features Guide SECURITY SOLUTIONS Maintaining data security in networked environments for ult...

Page 2: ...r Encryption Key 13 PDF Password Encryption 13 SNMP v3 Encrypted Communication 13 S MIME for Scan to E mail 13 IPsec Communication 13 Hard Disk HDD Encryption 14 Document Protection 14 Hard Disk Drive...

Page 3: ...s contained herein Windows and Windows 95 98 Me NT4 0 2000 Server 2003 Vista are registered trademarks of Microsoft Corporation Macintosh Mac OS and AppleTalk are registered trademarks of Apple Comput...

Page 4: ...every week we hear another instance of subscriber lists credit cardholder files or medical records being stolen ostensibly for identify theft purposes Even the federal government s top secret Los Alam...

Page 5: ...ection of data streams and stored documents leave companies vulnerable to information theft leaking or falsification High Risk Sectors Information at Risk Federal Government National Security Military...

Page 6: ...rced companies to adopt practices that safeguard both business and personal information The Health Insurance Portability and Accountability Act HIPPA is a law designed to protect workers from hiring d...

Page 7: ...curity HDD Encryption Local Authentication User Codes Locked Print RAM based Security SmartDeviceMonitor Data Encryption DataOverwrite Security System Web Image Monitor Web SmartDevice Monitor HDD Enc...

Page 8: ...y Some are very basic like the Locked Secure Print mode available on most drivers Some are optional based on device type MFP versus printer via the control panel functionality inherent in each device...

Page 9: ...hosts whose IP addresses fall into a particular IP range In this way the administrator can block depart ments from using a specific device or restrict users from sending scanned files to competitors...

Page 10: ...ge Monitor or SmartDeviceMonitor This prevents the theft of user names and passwords as well as eliminating outside threats including destruction falsification of stored data Denial of Service DoS att...

Page 11: ...remember multiple passwords and for IT personnel to support another login password system Once access is granted the user s name is automatically entered in the Sender s Name field of outgoing Scan t...

Page 12: ...net Protocol Address Filtering In a LAN an IP Address is each networked com puter s unique hardware number Just like your street address with a house or apartment num ber these addresses help route e...

Page 13: ...tion and encryption features block intruders with wirelessly enabled laptops from tapping into wireless networks in any environment preventing the interception of data streams and passwords or from us...

Page 14: ...ces offer another level of security through password and data encryption capabilities By scrambling data prior to sending it over the LAN for output or storage it becomes impossible for hackers to dec...

Page 15: ...ata usually corresponds to user names and passwords used elsewhere on the network protecting printer MFP address book data increases overall network security Encrypted PDF Transmission Adobe s PDF fil...

Page 16: ...maintain a secure environment Earlier versions v1 and v2 of SNMP were used to configure and monitor remote devices The latest version SNMPv3 offers enhancements to user authentication and data encrypt...

Page 17: ...ion The DataOverwriteSecurity System DOSS eliminates these threats by overwriting the hard disk after each job so that files cannot be retrieved or recovered Initially designed to meet gov ernment mil...

Page 18: ...or removing a confidential or sensitive document from the paper tray The file is automatically deleted from memory after printing Locked Print Secure Print usually requires the presence of a hard dis...

Page 19: ...view of the peripherals authorized for use by User Code and User Name All supported peripherals on the network are listed and a simple click on the device accesses a menu that restricts or enables acc...

Page 20: ...omers The Removable Hard Drive RHD option provides an ideal security solution for government military and other office environments that require high security The system s internal hard drive is exter...

Page 21: ...ion over a standard phone line Since most standard phone lines are analog the modem converts the digital data to a format that can be sent over the analog phone lines The receiving machine converts th...

Page 22: ...es but also operates behind the firewall for secure point to point transmissions ITU T Sub address Routing Using a Sub address appended to a fax number think of it like an extension on a business phon...

Page 23: ...ine will disconnect if the last four or eight digits of the dialed number do not match the CSI on the receiving machine Fax Security Compatibility Table The following chart outlines the current Ricoh...

Page 24: ...C2000 SPF Aficio MPC2500 SPF Aficio MPC3000 SPF Aficio MP C2800 SPF Aficio MP C3300 SPF Aficio MP C3500 SPF Aficio MPC4500 SPF Aficio MP C2500 EFI Aficio MP C3000 EFI Aficio MP C3500 EFI Aficio MP C45...

Page 25: ...0 SPF Web Image Monitor SmartDeviceMonitor Network Protocols ON OFF Administrator Authentication Job Log Access Log IP Address Filtering User Account Registration User Authentication Wi Fi Protect Acc...

Page 26: ...nitor Network Protocols ON OFF Administrator Authentication Job Log Access Log IP Address Filtering User Account Registration User Authentication Wi Fi Protect Access WPA Kerberos 802 1X Wired Authent...

Page 27: ...hite Printers Aficio SP 3300D SP 3300DN Aficio SP 4100NL Aficio SP 4100N KP HotSpot Aficio SP 4110N KP HotSpot Aficio SP 4210N Aficio SP 5100N Aficio AP610N Aficio SP 6330N Aficio SP 8200DN Aficio SP...

Reviews: