Ricoh GX3050SFN - Aficio Color Inkjet Features Manual Download Page 9

6

Network Protection

Network Protection refers to the features and utilities that touch the overall network infrastructure,
and/or allow IT personnel to make global changes to all connected devices in a single operation. Much
of this capability is enabled through Web Image Monitor and SmartDeviceMonitor, the two installation
and monitoring utilities that ship standard with every Ricoh Aficio device. Much of the functionality of
these utilities is covered in the Ricoh Aficio Common Features Guide: Solution Selection Guide. However,
their security-related features are reviewed here.

Web Image Monitor

Web Image Monitor is firmware built into the
controller of every Ricoh device that enables all
settings to be managed via a typical web browser,
i.e. Internet Explorer, by simply inputting the
machine’s IP address as the URL. Users and admin-
istrators can browse the current machine status, job
queues and error histories, and monitor paper and
supply levels, on- or off-line status, etc. Web Image
Monitor controls one device at a time. Security-
related features of Web Image Monitor include: 

Set IP Address Range (IP Filtering):

System

administrators can restrict authorized connec-
tions to the print controller from those hosts
whose IP addresses fall into a particular IP range. In this way the administrator can block depart-
ments from using a specific device, or restrict users from sending scanned files to competitors, for
example. Commands or jobs sent from non-authorized IP addresses are simply ignored by the print
controller. 

(See IP Address Filtering.)

Network Protocol Security:

The system administrator can enable or disable IP protocols, thus

controlling the different network services provided by the print controller to an individual user, such
as TCP/IP or FTP. 

(See Network Protocol ON/OFF.)

SmartDeviceMonitor/Web SmartDeviceMonitor

SmartDeviceMonitor and its web-based companion
utility, Web SmartDeviceMonitor are more advanced
utilities for managing multiple devices simultaneously
on a network. SmartDeviceMonitor now allows
administrators the ability to change and download
driver default settings, see information regarding
attached options, and more. SmartDeviceMonitor can
also provide limited information about other vendors’
devices so that IT managers can use a single utility to
monitor all printing devices on the network. A “lite”
version intended for end-users, SmartDeviceMonitor for
Client, is installed on client desktops and allows users
to view the status and availability of networked Ricoh peripherals. Security-related features of
SmartDeviceMonitor include: 

R I C O H   S E C U R I T Y   S O L U T I O N S   R E V I E W  

Summary of Contents for GX3050SFN - Aficio Color Inkjet

Page 1: ...Multifunction Devices Color Printers Black White Printers Super G3 Facsimiles Ricoh Aficio Common Security Features Guide SECURITY SOLUTIONS Maintaining data security in networked environments for ult...

Page 2: ...r Encryption Key 13 PDF Password Encryption 13 SNMP v3 Encrypted Communication 13 S MIME for Scan to E mail 13 IPsec Communication 13 Hard Disk HDD Encryption 14 Document Protection 14 Hard Disk Drive...

Page 3: ...s contained herein Windows and Windows 95 98 Me NT4 0 2000 Server 2003 Vista are registered trademarks of Microsoft Corporation Macintosh Mac OS and AppleTalk are registered trademarks of Apple Comput...

Page 4: ...every week we hear another instance of subscriber lists credit cardholder files or medical records being stolen ostensibly for identify theft purposes Even the federal government s top secret Los Alam...

Page 5: ...ection of data streams and stored documents leave companies vulnerable to information theft leaking or falsification High Risk Sectors Information at Risk Federal Government National Security Military...

Page 6: ...rced companies to adopt practices that safeguard both business and personal information The Health Insurance Portability and Accountability Act HIPPA is a law designed to protect workers from hiring d...

Page 7: ...curity HDD Encryption Local Authentication User Codes Locked Print RAM based Security SmartDeviceMonitor Data Encryption DataOverwrite Security System Web Image Monitor Web SmartDevice Monitor HDD Enc...

Page 8: ...y Some are very basic like the Locked Secure Print mode available on most drivers Some are optional based on device type MFP versus printer via the control panel functionality inherent in each device...

Page 9: ...hosts whose IP addresses fall into a particular IP range In this way the administrator can block depart ments from using a specific device or restrict users from sending scanned files to competitors...

Page 10: ...ge Monitor or SmartDeviceMonitor This prevents the theft of user names and passwords as well as eliminating outside threats including destruction falsification of stored data Denial of Service DoS att...

Page 11: ...remember multiple passwords and for IT personnel to support another login password system Once access is granted the user s name is automatically entered in the Sender s Name field of outgoing Scan t...

Page 12: ...net Protocol Address Filtering In a LAN an IP Address is each networked com puter s unique hardware number Just like your street address with a house or apartment num ber these addresses help route e...

Page 13: ...tion and encryption features block intruders with wirelessly enabled laptops from tapping into wireless networks in any environment preventing the interception of data streams and passwords or from us...

Page 14: ...ces offer another level of security through password and data encryption capabilities By scrambling data prior to sending it over the LAN for output or storage it becomes impossible for hackers to dec...

Page 15: ...ata usually corresponds to user names and passwords used elsewhere on the network protecting printer MFP address book data increases overall network security Encrypted PDF Transmission Adobe s PDF fil...

Page 16: ...maintain a secure environment Earlier versions v1 and v2 of SNMP were used to configure and monitor remote devices The latest version SNMPv3 offers enhancements to user authentication and data encrypt...

Page 17: ...ion The DataOverwriteSecurity System DOSS eliminates these threats by overwriting the hard disk after each job so that files cannot be retrieved or recovered Initially designed to meet gov ernment mil...

Page 18: ...or removing a confidential or sensitive document from the paper tray The file is automatically deleted from memory after printing Locked Print Secure Print usually requires the presence of a hard dis...

Page 19: ...view of the peripherals authorized for use by User Code and User Name All supported peripherals on the network are listed and a simple click on the device accesses a menu that restricts or enables acc...

Page 20: ...omers The Removable Hard Drive RHD option provides an ideal security solution for government military and other office environments that require high security The system s internal hard drive is exter...

Page 21: ...ion over a standard phone line Since most standard phone lines are analog the modem converts the digital data to a format that can be sent over the analog phone lines The receiving machine converts th...

Page 22: ...es but also operates behind the firewall for secure point to point transmissions ITU T Sub address Routing Using a Sub address appended to a fax number think of it like an extension on a business phon...

Page 23: ...ine will disconnect if the last four or eight digits of the dialed number do not match the CSI on the receiving machine Fax Security Compatibility Table The following chart outlines the current Ricoh...

Page 24: ...C2000 SPF Aficio MPC2500 SPF Aficio MPC3000 SPF Aficio MP C2800 SPF Aficio MP C3300 SPF Aficio MP C3500 SPF Aficio MPC4500 SPF Aficio MP C2500 EFI Aficio MP C3000 EFI Aficio MP C3500 EFI Aficio MP C45...

Page 25: ...0 SPF Web Image Monitor SmartDeviceMonitor Network Protocols ON OFF Administrator Authentication Job Log Access Log IP Address Filtering User Account Registration User Authentication Wi Fi Protect Acc...

Page 26: ...nitor Network Protocols ON OFF Administrator Authentication Job Log Access Log IP Address Filtering User Account Registration User Authentication Wi Fi Protect Access WPA Kerberos 802 1X Wired Authent...

Page 27: ...hite Printers Aficio SP 3300D SP 3300DN Aficio SP 4100NL Aficio SP 4100N KP HotSpot Aficio SP 4110N KP HotSpot Aficio SP 4210N Aficio SP 5100N Aficio AP610N Aficio SP 6330N Aficio SP 8200DN Aficio SP...

Reviews: