background image

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information 
in "About This Machine" before using the machine.

8

Getting Started

Authentication and its Application

Ensuring Information Security

Managing Access to the Machine

Enhanced Network Security

Specifying the Extended Security Functions

Troubleshooting

Appendix

1

2

3

4

5

6

7

Security Reference

Operating Instructions

Содержание Pro C550EX

Страница 1: ...the Safety Information in About This Machine before using the machine 8 Getting Started Authentication and its Application Ensuring Information Security Managing Access to the Machine Enhanced Networ...

Страница 2: ...bank notes revenue stamps bonds stock certificates bank drafts checks passports driver s licenses The preceding list is meant as a guide only and is not inclusive We assume no responsibility for its c...

Страница 3: ...the machine how to enter text and how to install the CD ROMs provided Troubleshooting Provides a guide to solving common problems and explains how to replace paper toner staples and other consumables...

Страница 4: ...the manuals Manuals provided are specific to machine types In addition to the above manuals are also provided for the Printer functions Some of the example screens shown in this manual might differ s...

Страница 5: ...on Administrators and Users 17 Administrators 17 User 18 The Management Function 20 About Administrator Authentication 20 About User Authentication 21 Enabling Authentication 23 Authentication Setting...

Страница 6: ...ng Web Image Monitor 61 User Lockout Function 61 Auto Logout 64 3 Ensuring Information Security Specifying Access Permission for Stored Files 67 Assigning Users and Access Permission for Stored Files...

Страница 7: ...IPsec 123 Encryption Key Auto Exchange Settings and Encryption Key Manual Settings 124 IPsec Settings 125 Encryption Key Auto Exchange Settings Configuration Flow 132 Encryption Key Manual Settings Co...

Страница 8: ...88 Network Administrator Settings 190 System Settings 190 Settings via Web Image Monitor 190 File Administrator Settings 193 System Settings 193 Settings via Web Image Monitor 193 User Administrator S...

Страница 9: ...INDEX 229 7...

Страница 10: ...This Machine Indicates points to pay attention to when using the machine and explanations of likely causes of paper misfeeds damage to originals or loss of data Be sure to read these explanations Ind...

Страница 11: ...t both administrators and users must be registered in order to authenticate users via their login user names and passwords Four types of administrators manage specific areas of machine usage such as s...

Страница 12: ...settings or accessing the machine over the network The user s login user name and password as well as other items of information are stored in the machine s Address Book Personal information can be o...

Страница 13: ...icate see Protection Using Encryption 9 Enable secure sockets layer SSL 10 Enter the administrator s user name and password For details about specifying the administrator user name and password see Re...

Страница 14: ...p 36 Using Web Image Monitor p 113 Protection Using Encryption p 28 Registering the Administrator 1 Getting Started 12 1...

Страница 15: ...red users By making this setting you can limit the functions available to users For details about specifying which functions are available see Limiting Available Functions p 23 Enabling Authentication...

Страница 16: ...Data on the Hard Disk Limiting and Controlling Access Preventing Modification or Deletion of Stored Data You can allow selected users to access files stored in Document Server You can permit selected...

Страница 17: ...inistrator authentication and user authentication For details about encrypting transmitted passwords see Encrypting Transmitted Passwords Safer Communication Using SSL SNMPv3 and IPsec Youcanencryptth...

Страница 18: ...1 Getting Started 16 1...

Страница 19: ...rk you can use the machine by accessing it using administrator authentication and disabling user authentication Do this if for instance you need to use the machine urgently p 43 Specifying Login User...

Страница 20: ...ion For instructions on registering the network administrator see Registering the Administrator File Administrator This is the administrator who manages permission to access stored files You can speci...

Страница 21: ...For details about registering users in the Address Book see Administrator Tools General Settings Guide or see Web Image Monitor Help Administrators and Users 19 2...

Страница 22: ...ogin user name and login password If an administrator login user name or login password is forgotten a new password must be specified using the supervisor s authority Be sure not to forget the supervi...

Страница 23: ...he network administrator only 4 File Administrator This administrator manages permission to access stored files You can specify passwords for Locked Print files stored in the Document Server so that o...

Страница 24: ...ication Using a login user name and password user authentication is performed 4 This Machine 5 Access Limit Using authentication unauthorized users are prevented from accessing the machine 6 Authorize...

Страница 25: ...See Administrator Authentication Specifying Administrator Privileges See Specifying Administrator Privileges Registering the Administrator See Registering the Administrator User Authentication See Use...

Страница 26: ...r Authentication p 25 Specifying Administrator Privileges p 28 Registering the Administrator p 39 User Code Authentication p 41 Basic Authentication p 48 Windows Authentication p 54 LDAP Authenticatio...

Страница 27: ...ddress Book and then be authenticated as the user Administrator authentication can also be specified via Web Image Monitor For details see Web Image Monitor Help Specifying Administrator Privileges To...

Страница 28: ...ettings 3 Press Administrator Tools 4 Press Administrator Authentication Management If the setting to be specified does not appear press Next to scroll down to other settings 2 Authentication and its...

Страница 29: ...e settings to manage from Available Settings The selected settings will be unavailable to users Available Settings varies depending on the administrator For details about Available Settings see Managi...

Страница 30: ...n by a single administrator You can register up to four login user names Administrators 1 4 to which you can grant administrator privileges Administrator authentication can also be specified via Web I...

Страница 31: ...2 Press System Settings 3 Press Administrator Tools 4 Press Program Change Administrator Administrator Authentication 29 2...

Страница 32: ...ress Administrator 1 Administrator 2 Administrator 3 or Administrator 4 and then press Change If you allocate each administrator s authority to a different person the screen appears as follows 6 Press...

Страница 33: ...d and then press OK Follow the password policy to make the login password more secure For details about the password policy and how to specify it see Specifying the Extended Security Functions 10 If a...

Страница 34: ...t passwords are case sensitive User names cannot contain numbers only a space colon or quotation mark nor can they be left blank Do not use Japanese Traditional Chinese Simplified Chinese or Hangul do...

Страница 35: ...n describes how to log on 1 Press the Login Logout key BTD008S The message Press Login then enter the login user name and login password appears 2 Press Login If you do not want to log in press Cancel...

Страница 36: ...inistrator logging on appears If you log on using a login user name with the authority of more than one administrator Administrator appears If you try to log on from an operating screen Selected funct...

Страница 37: ...r example to assign machine administrator authority and user administrator authority to Administrator 1 press Administrator 1 in the lines for the machine administrator and the user administrator For...

Страница 38: ...Press OK twice You will be logged off 9 Press the User Tools Counter key p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Authentication Using Web Image Monitor...

Страница 39: ...192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login 4 Enter the login name and password of an administrator and then click Login 5 Make settings as desired...

Страница 40: ...Code authentication does not have a password the login password is set as blank When authentication switches to an external authentication method Windows authentication or LDAP authentication authent...

Страница 41: ...e can be used by more than one user For details about specifying user codes see Authentication Information General Settings Guide Specifying User Code Authentication This can be specified by the machi...

Страница 42: ...t which of the machine s functions you want to limit Keys for the selected functions are available to users only when a user code is entered For details about limiting available functions for individu...

Страница 43: ...Basic authentication the administrator must specify the functions available to each user registered in the Address Book Specifying Basic Authentication This can be specified by the machine administra...

Страница 44: ...he machine s functions you want to permit Basic Authentication will be applied to the selected functions Users can use the selected functions only For details about specifying available functions for...

Страница 45: ...setting in the Address Book for each user Users must have a registered account in the Address Book in order to use the machine when User Authentication is specified For details about user registratio...

Страница 46: ...5 Select the user 6 Press Auth Info 7 Press Change for Login User Name 8 Enter a login user name and then press OK 2 Authentication and its Application 44 2...

Страница 47: ...s enter the login password and then press OK 12 Press OK 13 Press Exit twice 14 Press the User Tools Counter key 15 Press System Settings 16 Press Administrator Tools 17 Press Address Book Management...

Страница 48: ...18 Select the user 19 Press Auth Info 20 Select Use Auth Info at Login in SMTP Authentication 2 Authentication and its Application 46 2...

Страница 49: ...folder authentication select Use Auth Info at Login in Folder Authentication For LDAP authentication select Use Auth Info at Login in LDAP Authentication 21 Press OK 22 Press Exit 23 Press the User T...

Страница 50: ...sion of Windows that supports TLS v1 SSL v2 or SSL v3 is required Windows NT 4 0 Server Windows 2000 Server Windows Server 2003 Operational Requirements for Kerberos authentication To specify Kerberos...

Страница 51: ...he functions available to those groups A user registered in two or more global groups can use all the functions available to members of those groups If the Guest account on the Windows server is enabl...

Страница 52: ...3 Press Administrator Tools 4 Press User Authentication Management 5 Select Windows Auth If you do not want to use user authentication management select Off 2 Authentication and its Application 50 2...

Страница 53: ...entication a realm must be registered beforehand The realm name must be registered in capital letters For details about registering a realm see Programming the Realm General Settings Guide Up to 5 rea...

Страница 54: ...te is created Installing the Device Certificate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor This section explains the use of a certificate issu...

Страница 55: ...rtificate Request box enter the contents of the device certificate received from the certificate authority 9 Click OK Installed appears under Certificate Status to show that a device certificate for t...

Страница 56: ...such as the user name is automatically registered in the machine If user information on the server is changed information registered in the machine may be overwritten when authentication is performed...

Страница 57: ...e it The first time an unregistered user accesses the machine after LDAP authentication has been specified the user is registered in the machine and can use the functions available under Available Fun...

Страница 58: ...2 Press System Settings 3 Press Administrator Tools 4 Press User Authentication Management 2 Authentication and its Application 56 2...

Страница 59: ...to use user authentication management select Off 6 Select the LDAP server to be used for LDAP authentication p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Au...

Страница 60: ...he control panel within a given time Consult the User Administrator about your login user name password and user code For user code authentication enter a number registered in the Address Book as User...

Страница 61: ...1 Press the Login Logout key BTD008S 2 Press Login 3 Enter the login user name and then press OK If User Authentication is Specified 59 2...

Страница 62: ...ating Please wait appears Log Off Using the Control Panel Follow the procedure below to log off when Basic Authentication Windows Authentication or LDAP Authentication is set 1 Press the Login Logout...

Страница 63: ...Monitor after logging off User Lockout Function If an incorrect password is entered several times the User Lockout function prevents further login attempts under the same user name Even if the locked...

Страница 64: ...Administrators with unlocking privileges are as follows Locked out User Unlocking administrator general user user administrator user administrator network administrator file administrator machine admi...

Страница 65: ...can be unlocked by the administrator or supervisor with unlocking privileges using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When ent...

Страница 66: ...panel within a given time This feature is called Auto Logout Specify how long the machine is to wait before performing Auto Logout 1 Press the User Tools Counter key 2 Press System Settings 3 Press T...

Страница 67: ...ect On If you do not want to specify Auto Logout Timer select Off 6 Enter 60 to 999 seconds using the number keys and then press 7 Press the User Tools Counter key If User Authentication is Specified...

Страница 68: ...2 Authentication and its Application 66 2...

Страница 69: ...and edit files Full Control You can specify the user and access permission This includes permission to view edit and edit delete files Files can be stored by any user who is allowed to use the Documen...

Страница 70: ...on Logging off Using Administrator Authentication If files become inaccessible reset their access permission as the file creator owner This can also be done by the file administrator If you want to ac...

Страница 71: ...han one user By pressing All Users you can select all the users 8 Press Exit 9 Select the user who you want to assign access permission to and then select the permission Select the access permission f...

Страница 72: ...inistrator Specify passwords for stored files This provides increased protection against unauthorized use of files For details about logging on and logging off with administrator authentication see Lo...

Страница 73: ...ation p 34 Logging off Using Administrator Authentication Unlocking Files If you specify Enhance File Protection the file will be locked and become inaccessible if an invalid password is entered ten t...

Страница 74: ...hentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the Document Server key 2 Select the file 3 Press File Management 4 Press Unlock Fi...

Страница 75: ...p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Authentication Specifying Access Permission for Stored Files 73 3...

Страница 76: ...r You can encrypt the data in the Address Book using the extended security function Encrypt Address Book For details about this and other extended security functions see Specifying the Extended Securi...

Страница 77: ...lphanumeric characters 8 Press Encrypt Decrypt 9 Press Yes Do not switch the main power off during encryption as doing so may corrupt the data Encrypting the data in the Address Book may take a long t...

Страница 78: ...ypted 10 Press Exit 11 Press OK 12 Press the User Tools Counter key If you register additional users after encrypting the data in the Address Book those users are also encrypted p 33 Logging on Using...

Страница 79: ...I F setting information System settings information Enabling the Encryption Settings Use the following procedure to enable the encryption settings at initial set up or after encryption settings have...

Страница 80: ...User Tools Counter key 2 Press System Settings 3 Press Administrator Tools 4 Press Machine Data Encryption Settings If the setting to be specified does not appear press Next 3 Ensuring Information Se...

Страница 81: ...carry all of the data over to the hard disk select All Data To carry over only the machine settings data select File System Data Only To reset all of the data select Format All Data 7 Press the Start...

Страница 82: ...er see Turning On the Power About This Machine Printing the Encryption Key Use the following procedure to print the key again if it has been lost or misplaced The encryption key is required for data r...

Страница 83: ...3 Press Administrator Tools 4 Press Machine Data Encryption Settings 5 Press Print Encryption Key The encryption key for retrieving backup data is printed Encrypting Data on the Hard Disk 81 3...

Страница 84: ...e sure to store the encryption key safely for retrieving back up data When the encryption key is updated encryption is performed using the new key After completing the procedure on the machine s contr...

Страница 85: ...ey 6 Select the data to be carried over to the hard disk and not be reset To carry all of the data over to the hard disk select All Data To carry over only the machine settings data select File System...

Страница 86: ...nter key 12 Turn off the power and the main power switch and then turn the main power switch back on For details about turning off the power see Turning On the Power About This Machine Canceling Data...

Страница 87: ...start the machine to enable the new settings Restarting can be slow when there is data to be carried over to the hard disk 1 Press the User Tools Counter key 2 Press System Settings 3 Press Administra...

Страница 88: ...achine settings data select File System Data Only To reset all of the data select Format All Data 7 Press OK 8 Press Exit 9 Press Exit 10 Press the User Tools Counter key 11 Turn off the power and the...

Страница 89: ...ses the temporary data on the hard disk by writing over it Overwriting starts automatically once the job is completed The copier function take priority over the Auto Erase Memory function If a copy jo...

Страница 90: ...s Temporary data is overwritten multiple times with random numbers The number of overwrites can be selected from 1 to 9 The default is 3 times 1 National Security Agency U S A 2 Department of Defense...

Страница 91: ...eted overwriting will stop and data will be left on the hard disk Do not stop the overwrite mid process Doing so will damage the hard disk Should the main power switch be turned to Off before Auto Era...

Страница 92: ...dministrator Authentication Types of Data that Can or Cannot Be Overwritten The following table shows the types of data that can or cannot be overwritten by Auto Erase Memory Data overwritten by Auto...

Страница 93: ...process Doing so will damage the hard disk Other than pausing no operations are possible during the Erase All Memory process If Random Numbers is specified the erasure process can take up to three hou...

Страница 94: ...rwriting is completed turn off the main power Turn it on again and then repeat from step 2 If you specify to both overwrite and encrypt the data the data will all be encrypted p 33 Logging on Using Ad...

Страница 95: ...To resume overwriting turn on the main power Deleting Data on the Hard Disk 93 3...

Страница 96: ...3 Ensuring Information Security 94 3...

Страница 97: ...ttings in Admin Authentication to prevent users from specifying certain settings Administrator type determines which machine settings can be modified The following administrator types are possible Use...

Страница 98: ...strator Settings p 185 Machine Administrator Settings p 190 Network Administrator Settings p 193 File Administrator Settings p 201 User Settings Control Panel Settings p 214 User Settings Web Image Mo...

Страница 99: ...14 User Settings Web Image Monitor Settings Menu Protect You can set menu protect to Off Level 1 or Level 2 If you set it to Off no menu protect limitation is applied To limit access to the fullest ex...

Страница 100: ...3 Press Administrator Tools 4 Press Menu Protect 5 Select the menu protect level and then press OK 6 Press the User Tools Counter key 4 Managing Access to the Machine 98 4...

Страница 101: ...colour and black white select Full Colour Two Colour Black White Unless you select all items in the Copier the Auto Colour Selection key cannot be used Specifying Which Functions are Available Thiscan...

Страница 102: ...3 Press Administrator Tools 4 Press Address Book Management 5 Select the user 4 Managing Access to the Machine 100 4...

Страница 103: ...the setting to be specified does not appear press Next to scroll down to other settings 8 Press OK 9 Press Exit 10 Press the User Tools Counter key p 33 Logging on Using Administrator Authentication...

Страница 104: ...4 Managing Access to the Machine 102 4...

Страница 105: ...68 15 16 to 192 168 15 20 Using access control you can limit access involving Web Image Monitor You cannot limit access involving telnet when using the SNMPv1 monitoring 1 Open a Web browser 2 Enter h...

Страница 106: ...etails about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication Protocol Port Setting Method...

Страница 107: ...ssion methods using the control panel or Web Image Monitor SMB TCP 139 Control Panel Web Image Monitor telnet SMB printing functions cannot be used NBT UDP 137 UDP 138 telnet SMB printing functions vi...

Страница 108: ...smission methods using the control panel Web Image Monitor or telnet SSDP UDP 1900 Web Image Monitor telnet Device discovery using UPnP from Windows cannot be used Bonjour UDP 5353 Web Image Monitor t...

Страница 109: ...otocol 5 Press Inactive for the protocol you want to disable 6 Press OK 7 Press the User Tools Counter key p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Authe...

Страница 110: ...zed access You can make network security level settings on the control panel as well as Web Image Monitor However the protocols that can be specified differ Set the security level to Level 0 Level 1 o...

Страница 111: ...System Settings 3 Press Administrator Tools 4 Press Network Security Level If the setting you want to specify does not appear press Next to scroll down to other settings Preventing Unauthorized Acces...

Страница 112: ...r host name in the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine...

Страница 113: ...vailable Unavailable Unavailable SNMP v1v2 Browse Available Available Unavailable SNMP v3 Available Available Available SNMP v3 SNMP Encryption Automatic Automatic Ciphertext Only TELNET Available Una...

Страница 114: ...tted Passwords Prevent login passwords from being revealed by encrypting them for transmission Also encrypt the login password for administrator authentication and user authentication 5 Enhanced Netwo...

Страница 115: ...ecified by the network administrator To protect the communication path and establish encrypted communication create and install the device certificate There are two ways of installing a device certifi...

Страница 116: ...procedure specified by the certificate authority 2 Installing the device certificate Install the device certificate using Web Image Monitor 3 Enabling SSL Enable the SSL TLS setting using Web Image M...

Страница 117: ...thority Create the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image Monitor Help This section explains the use of a certificate issue...

Страница 118: ...ng the Device Certificate Certificate Issued by a Certificate Authority Install the device certificate using Web Image Monitor For details about the displayed items and selectable items see Web Image...

Страница 119: ...n the address bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page...

Страница 120: ...by following the Certificate Import Wizard instructions For details about how to install the certificate and about where to store the certificate when accessing the machine using IPP see Web Image Mo...

Страница 121: ...ng this setting you can change the security level For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Adm...

Страница 122: ...ing Web Image Monitor For details see Web Image Monitor Help p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Authentication SNMPv3 Encryption This can be specif...

Страница 123: ...s System Settings 3 Press Interface Settings 4 Press Permit SNMPv3 Communication If the setting to be specified does not appear press Next to scroll down to other settings Protection Using Encryption...

Страница 124: ...e data for transmission may not be encrypted or sent For details about specifying the network administrator s Encryption Password setting see Registering the Administrator p 33 Logging on Using Admini...

Страница 125: ...s Web Image Monitor due to IPsec configuration problems disable IPsec in System Settings on the control panel and then access Web Image Monitor For details about enabling and disabling IPsec using the...

Страница 126: ...ing the IPsec SA the ISAKMPSA Phase 1 settings are auto configured After this the IPsec SA Phase 2 settings which allow actual IPsec transmission are auto configured Also for further security the SA c...

Страница 127: ...Encryption Key Auto Exchange Security Level When you select a security level certain security settings are automatically configured The following table explains security level features Security Level...

Страница 128: ...ble lists the settings that are automatically configured according to the security level Setting Authentication Only Authentication and Low Level Encryption Authentication and High Level Encryption Se...

Страница 129: ...ddress type local address and remote address must still be configured manually After you specify a security level you can still make changes to the auto configured settings When you change an auto con...

Страница 130: ...inning and ending IP addresses Set the same address for the beginning point as you set in Local Address IPsec Requirement Level Specify whether to only transmit using IPsec or to allow cleartext trans...

Страница 131: ...Phase 2 auto setting ESP AH ESP AH Phase 2 Authentication Algorithm Specify the authentication algorithm to be used in phase 2 auto setting HMAC MD5 96 HMAC SHA1 96 Phase 2 Encryption Algorithm Permi...

Страница 132: ...y the address of the IPsec transmission partner You can also specify an address range The IPsec transmission partner s IPv4 or IPv6 address Ifyouarenotsettinganaddress range enter 32 after an IPv4 add...

Страница 133: ...uthentication algorithm HMAC MD5 96 HMAC SHA1 96 Authentication Key Specify the key for the authentication algorithm Specify a value within the ranges shown below according to the encryption algorithm...

Страница 134: ...48 digits AES 128 set 32 digits AES 192 set 48 digits AES 256 set 64 digits ASCII DES set 8 characters 3DES set 24 characters AES 128 set 16 characters AES 192 set 24 characters AES 256 set 32 charact...

Страница 135: ...ed Specifying Encryption Key Auto Exchange Settings This can be specified using Web Image Monitor 1 Open a Web browser 2 Enter http the machine s IP address or host name in the address bar When enteri...

Страница 136: ...68 001 010 you must enter it as 192 168 1 10 to connect to the machine The top page of Web Image Monitor appears 3 Click Login The network administrator can log on Enter the login user name and login...

Страница 137: ...tion algorithm onWindowsXP Encryption andtheDiffie Hellmangroupsettingsin Security method preference order match the settings specified on the machine in Encryption Key Auto Exchange Settings Phase 1...

Страница 138: ...2 34 Click OK three times 35 Click Next 36 Click Finish 37 Click OK 38 Click Close The new IP security policy IPsec settings is specified 39 Select the security policy that was just created right clic...

Страница 139: ...nd when ICMP is excluded from IPsec transmission Also because the response is slow during initial key exchange it may take some time to confirm that transmission has been established Specifying Encryp...

Страница 140: ...ing telnet the default login user name is admin and the password is blank For details about logging in to telnet and telnet operations see Using telnet Network Guide If you are using a certificate as...

Страница 141: ...ntly excluded from IPsec transmission Specify protocols to exclude msh ipsec exclude https dns dhcp wins all on off Specify the protocol and then enter on to exclude it or off to include it for IPsec...

Страница 142: ...r dual Not specifying a protocol displays the current setting SPI value setting msh ipsec manual 1 2 3 4 default spi SPI input value SPI output value Enter the separate setting number 1 4 or default a...

Страница 143: ...thm to null enter an encryption key of arbitrary numbers 2 64 digits long If you are setting an ASCII character string enter it as is If you have set the encryption algorithm to null enter an encrypti...

Страница 144: ...ou specify discard any packets that IPsec can be applied to are discarded Not specifying a security policy displays the current setting Security protocol setting msh ipsec ike 1 2 3 4 default proto ah...

Страница 145: ...te the certificate for IPsec must be installed and specified before it can be used To install and specify the certificate use Web Image Monitor PSK character string setting msh ipsec ike 1 2 3 4 defau...

Страница 146: ...rate multiple encryption algorithm entries with a comma The current setting values are displayed in order of highest priority Not specifying an authentication algorithm displays the current setting IP...

Страница 147: ...in seconds from 300 to 172800 Not specifying a validity period displays the current setting Reset setting values msh ipsec ike 1 2 3 4 default all clear Enter the separate setting number 1 4 or defaul...

Страница 148: ...5 Enhanced Network Security 146 5...

Страница 149: ...d how to specify them For details about when to use each function see the corresponding chapters Changing the Extended Security Functions To change the extended security functions display the extended...

Страница 150: ...2 Press System Settings 3 Press Administrator Tools 4 Press Extended Security 6 Specifying the Extended Security Functions 148 6...

Страница 151: ...tor checks the job history using SNMP in SNMP manager personal information can be displayed as so that users cannot be identified Because information identifying registered users cannot be viewed unau...

Страница 152: ...nt Job This can be specified by the machine administrator This setting lets you specify whether or not authentication is required for operations such as canceling jobs under the copier function If you...

Страница 153: ...Prohibit Do not Prohibit Change Firmware Structure This can be specified by the machine administrator Specify whether to prevent changes in the machine s firmware structure The Change Firmware Struct...

Страница 154: ...p 74 Protecting the Address Book p 118 Setting the SSL TLS Encryption Mode 6 Specifying the Extended Security Functions 152 6...

Страница 155: ...ode If the power is turned off when Weekly Timer Mode is set the Weekly Timer Code settings must be enabled and you must enter a code before you can turn the power back on Specifying the Weekly Timer...

Страница 156: ...y Timer Code 5 Press On Canceling Weekly Timer Code This can be specified by the machine administrator 1 Press the User Tools Counter key 2 Press System Settings 6 Specifying the Extended Security Fun...

Страница 157: ...3 Press Timer Settings 4 Press Weekly Timer Code 5 Press Off Other Security Functions 155 6...

Страница 158: ...the machine administrator Service mode is used by a service representative for inspection or repair If you set the service mode lock to On service mode cannot be used unless the machine administrator...

Страница 159: ...ress On and then press OK A confirmation message appears 6 Press Yes 7 Press the User Tools Counter key p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Authenti...

Страница 160: ...e mode lock For details about logging on and logging off with administrator authentication see Logging on Using Administrator Authentication Logging off Using Administrator Authentication 1 Press the...

Страница 161: ...s Counter key The service representative can switch to service mode p 33 Logging on Using Administrator Authentication p 34 Logging off Using Administrator Authentication Limiting Machine Operation to...

Страница 162: ...6 Specifying the Extended Security Functions 160 6...

Страница 163: ...e appears deal with the problem according to the information contained in the message Messages Cause Solutions You do not have the privileges to use this function The authority to use the function is...

Страница 164: ...erver error may have occurred Confirm the network in use with the LAN administrator If an error code appears follow the instructions next to the error code in the table below Theselectedfile s contain...

Страница 165: ...ied in the driver 3 A driver encryption key error occurred Make sure that the encryption key is correctly specified on the driver B0206 002 1 A login user name or password error occurred Make sure the...

Страница 166: ...B0208 000 The account is locked because you have reached the maximum number of failed authentication attempts allowed Ask the user administrator to unlock the account Windows Authentication Error Cod...

Страница 167: ...used at another location Wait a few minutes and then try again W0406 101 Authentication cannot be completed because of the high number of authentication attempts Wait a few minutes and then try again...

Страница 168: ...cified correctly W0406 104 4 Cannot resolve the domain name Specify the IP address in the domain name and confirm that authentication is successful If authentication was successful 1 If the top level...

Страница 169: ...rol firewall and the firewall on the machine to the domain control connection path are open If you are using a Windows firewall open Network Connection Properties Then click detail settings Windows fi...

Страница 170: ...ference between the KDC and machine timing is more than 5 minutes Make sure the timing matches 3 Kerberos authentication will fail if the realm name is specified in lower case letters Make sure the re...

Страница 171: ...re the account has been added to user group Makesuretheusergroupname registered on the machine and the group name on the DC domain controller are exactly the same The DC is case sensitive Make sure th...

Страница 172: ...t correctly and log in again W0409 000 Authentication timed out because the server did not respond Check the network configuration or settings on the authenticating server W0511 000 The authentication...

Страница 173: ...1 A password error occurred Make sure the password is entered correctly 2 Restrict Use of Simple Encryption is enabled The administrator has restricted use of simple encryption You can use the encrypt...

Страница 174: ...n test is successful with the current LDAP server configuration L0307 001 An authentication error occurred because the Address Book is being used at another location Wait a few minutes and then try ag...

Страница 175: ...pecified correctly in the LDAP authentication settings 3 Make sure the login name attribute is entered correctly in the LDAP authentication settings 4 Make sure the SSL settings are supported by the L...

Страница 176: ...ver name login user name password or information entered for the search filter L0406 204 Kerberos authentication failed 1 Kerberos authentication settings are not correctly configured Make sure the re...

Страница 177: ...er or network administrator If the situation does not return to normal contact your service representative L0511 000 The authentication server login name is the same as a user name already registered...

Страница 178: ...not set correctly Alternatively SSL TLS has been enabled although the requiredcertificateisnotinstalled in the computer Set Restrict Use of Simple Encryption to On Alternatively enable SSL TLS instal...

Страница 179: ...ons that did not appear For details about enabling All Users see Protecting the Address Book If you try to interrupt a job while copyinganauthenticationscreen appears With this machine you can log off...

Страница 180: ...7 Troubleshooting 178 7...

Страница 181: ...specify up to 32 alphanumeric characters and symbols Keep in mind that user names and passwords are case sensitive Be sure not to forget the supervisor login user name and login password If you do fo...

Страница 182: ...2 Press the Login Logout key BTD008S 3 Press Login 4 Enter a login user name and then press OK When you assign the administrator for the first time enter supervisor 8 Appendix 180 8...

Страница 183: ...tion has been specified be sure to log off after completing settings This section describes how to log off after completing settings 1 Press the Login Logout key BTD008S 2 Press Yes Changing the Super...

Страница 184: ...2 Press System Settings 3 Press Administrator Tools 4 Press Program Change Administrator 5 Under Supervisor press Change 8 Appendix 182 8...

Страница 185: ...twice 12 Press the User Tools Counter key Resetting an Administrator s Password This section describes how to reset the administrators passwords For details about logging on and logging off as the sup...

Страница 186: ...wish to reset 8 Press Change for the login password 9 Enter the login password and then press OK 10 If a password reentry screen appears enter the login password and then press OK 11 Press OK twice 12...

Страница 187: ...Timer Settings All the settings can be specified Interface Settings The following settings can be specified Network DNS Configuration You can perform a connection test File Transfer The following sett...

Страница 188: ...n to use You can also edit the settings for each function Administrator Authentication Management Machine Management Program Change Administrator Machine Administrator You can change the user name and...

Страница 189: ...e HDD Encryption Unit option must be installed Maintenance The following settings can be specified Auto Colour Calibration All the settings can be specified Copier Document Server Features The followi...

Страница 190: ...te Permit Firmware Structure Change Display IP Address on Device Display Panel Output Tray Paper Tray Priority Front Cover Sheet Tray Back Cover Sheet Tray Slip Sheet Tray Designation Sheet 1 Tray Des...

Страница 191: ...lable Settings for Machine Administrator Program Change Administrator You can specify the following administrator settings as the machine administrator Login User Name Login Password Encryption Passwo...

Страница 192: ...erver Name Port No E mail Communication Port E mail Reception Interval Max Reception E mail Size E mail Storage in Server Auto Specify Sender Name Administrator Tools Administrator Authentication Mana...

Страница 193: ...trator Program Change Administrator You can specify the following administrator settings for the machine administrator Login User Name Login Password Change Encryption Password Network IPv4 All the se...

Страница 194: ...ol All the settings can be specified SSL TLS All the settings can be specified ssh All the settings can be specified Site Certificates All the settings can be specified Device Certificates All the set...

Страница 195: ...ce File Protection Auto Delete File in Document Server Delete All Files in Document Server Settings via Web Image Monitor The following settings can be specified Document Server All the settings can b...

Страница 196: ...Login Password Change Encryption Password Webpage Download Help File 8 Appendix 194 8...

Страница 197: ...inistrator Authentication Management User Management Program Change Administrator User Administrator Extended Security Encrypt Address Book Password Policy Settings via Web Image Monitor The following...

Страница 198: ...The user administrator settings that can be specified are as follows Login User Name Login Password Change Encryption Password Webpage Download Help File 8 Appendix 196 8...

Страница 199: ...ll control Owner This is a user who can store files in the machine and authorize other users to view edit or delete those files File Administrator This is the file administrator A Granted authority to...

Страница 200: ...Settings Read only Edit Edit Delete Full Control Owner File Admin Unlocking Files A 1 This setting can be specified by the owner 8 Appendix 198 8...

Страница 201: ...on registered in the Address Book and has a login password and user name Full Control This is a user granted full control Abbreviations in the table columns A You can view and change the setting B You...

Страница 202: ...Settings Read only User Edit User Edit Delete User Full Control Register ed User User Admin Available Functions C C C C B A 1 You can only enter the password 8 Appendix 200 8...

Страница 203: ...the user settings that can be specified on the machine when user authentication is specified Settings that can be specified by the user vary according to the menu protect level and available settings...

Страница 204: ...st can only be viewed regardless of the menu protect level setting The default for Menu Protect is Level 2 General Features Settings Off Level 1 Level 2 Auto Image Density Priority R W R R Original Ph...

Страница 205: ...Left Right R W R R Front Margin Top Bottom R W R R Back Margin Top Bottom R W R R 1 Sided 2 Sided Auto Margin T to T R W R R 1 Sided 2 Sided Auto Margin T to B R W R R Creep Setting for Magazine R W...

Страница 206: ...amp Settings Off Level 1 Level 2 Stamp Language R W R W R Stamp Priority R W R W R Stamp Colour COPY R W R R Stamp Colour URGENT R W R R Stamp Colour PRIORITY R W R R Stamp Colour For Your Info R W R...

Страница 207: ...d but not specified User Stamp Settings Off Level 1 Level 2 Program Delete Stamp R W R W R Stamp Format 1 R W R W R Stamp Format 2 R W R W R Stamp Format 3 R W R W R Stamp Format 4 R W R W R Stamp Col...

Страница 208: ...R W R W R Stamp on Designating Slip Sheet R W R W R Stamp Position P1 P2 1 R W R W R Stamp Position 1 5 2 5 1 R W R W R Stamp Position 1 2 1 R W R W R Stamp Position P 1 P 2 1 R W R W R Stamp Position...

Страница 209: ...Face Method in Bypass Mode R W R R Memory Full Auto Scan Restart R W R R Insert Separation Sheet R W R R Letterhead Setting R W R W R Staple Position R W R W R Punch Type R W R W R Simplified Screen F...

Страница 210: ...en specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not Applicable Neither reading nor m...

Страница 211: ...heet Tray R W R N A Designation Sheet 1 Tray R W R N A Designation Sheet 2 Tray R W R N A Separation Sheet Tray R W R N A Timer Settings Settings A B C Auto Off Timer R W R N A Energy Saver Timer R W...

Страница 212: ...face Settings Settings A B C Print List R W N A N A Network Settings A B C Machine IPv4 Address 1 R W R N A IPv4 Gateway Address R W R N A Machine IPv6 Address 1 R R N A IPv6 Gateway Address R R N A I...

Страница 213: ...Obtain DHCP you can only read the setting File Transfer Settings A B C SMTP Server R W R N A SMTP Authentication 2 R W R N A POP before SMTP R W R N A Reception Protocol R W R N A POP3 IMAP4 Settings...

Страница 214: ...A N A N A Extended Security R W R N A Auto Delete File in Document Server R W R N A Delete All Files in Document Server R W N A N A Capture Priority 4 R R N A Capture Delete All Unsent Files 4 R R N...

Страница 215: ...password can be specified 3 The DataOverwriteSecurity Unit option must be installed 4 The File Format Converter option must be installed 5 The HDD Encryption Unit option must be installed System Sett...

Страница 216: ...ttings ThissectiondisplaystheusersettingsthatcanbespecifiedonWebImageMonitorwhenuserauthentication isspecified Settingsthatcanbespecifiedbytheuservaryaccordingtothemenuprotectlevelandavailable setting...

Страница 217: ...ing the setting are available R Read Reading only N A Not Applicable Neither reading nor modifying the setting is available System Settings A B C General Settings Device Name R W R W N A General Setti...

Страница 218: ...R W R N A Designation Sheet 2 Tray Apply Duplex R W R N A Designation Sheet 2 Tray Display Time R W R N A Separation Sheet Tray Tray to set R W R N A Separation Sheet Tray Display Time R W R N A Pape...

Страница 219: ...Thickness R W R N A Tray4 Apply Auto Paper Select R W R N A Tray4 Apply Duplex R W R N A Large Capacity Tray Paper Type R W R N A Large Capacity Tray Paper Thickness R W R N A Large Capacity Tray App...

Страница 220: ...ocument Server Auto Reset Timer R W R N A Auto Logout Timer R W R N A Weekly Timer Code R W R N A Weekly Timer Monday R W R N A Weekly Timer Tuesday R W R N A Weekly Timer Wednesday R W R N A Weekly T...

Страница 221: ...ail Size R W R N A E mail Storage in Server R W R N A SMTP Server Name R W R N A SMTP Port No R W R N A SMTP Authentication R W R N A SMTP Auth E mail Address R W R N A SMTP Auth User Name R W N A N A...

Страница 222: ...R W R N A Auto E mail Notification Settings A B C Notification Message R R N A Groups to Notify Address List R R N A Call Service R R N A Out of Toner R R N A Toner Almost Empty R R N A Paper Misfeed...

Страница 223: ...d E mail Notification Settings A B C Notification Subject R R N A Notification Message R R N A Restriction to System Config Info R R N A Restriction to Network Config Info R R N A Restriction to Suppl...

Страница 224: ...ication Unique Attribute R W R N A LDAP Authentication Available Function R W R N A Administrator Authentication Management Settings A B C User Administrator Authentication R R N A Available Settings...

Страница 225: ...Settings A B C Program Change Delete R W N A N A Device Settings 223 8...

Страница 226: ...he table heads A Authorized user when Available functions have not been specified B Authorized user when Available functions have been specified C Unauthorized user Abbreviations in the table columns...

Страница 227: ...when Available functions have been specified C Unauthorized user Abbreviations in the table columns R W Read and Write Both reading and modifying the setting are available R Read Reading only N A Not...

Страница 228: ...Address R W R N A DCHPv6 lite R W R N A DDNS R W R N A Default Gateway Address R W R N A DNS Server R W R N A SMB Settings A B C SMB R W R N A Protocol R R N A Workgroup Name R W R N A Computer Name...

Страница 229: ...Computer Name R W R N A Location R W R N A Webpage Settings A B C Language 1 R W R N A Language 2 R W R N A URL 1 R W R N A URL 2 R W R N A Set Help URL Target R W R N A Download Help Page R W R W N A...

Страница 230: ...ire Options The following functions require certain options and additional functions Hard Disk overwrite erase function DataOverwriteSecurity Unit Hard disk data encryption function HDD Encryption Uni...

Страница 231: ...n Key Auto Exchange Security Level 125 Encryption Key Auto Exchange Setting Items 127 Encryption Key Auto Exchange Settings Configuration Flow 132 Encryption Key Manual Settings Configuration Flow 137...

Страница 232: ...assword 43 SSL Secure Sockets Layer 113 SSL TLS Encryption 118 Supervisor 18 179 Symbols 8 System Settings 208 T Transmitted Passwords 112 Type of Administrator 95 U Update Firmware 151 User 10 18 Use...

Страница 233: ...MEMO 231...

Страница 234: ...MEMO 232 EN USA D0797508...

Страница 235: ...as follows The product names of Windows 2000 are as follows Microsoft Windows 2000 Professional Microsoft Windows 2000 Server Microsoft Windows 2000 Advanced Server The product names of Windows XP ar...

Страница 236: ...Operating Instructions Security Reference D079 7508 EN USA Type for Pro C550EX Type for Pro C700EX...

Отзывы: