background image

13.

Set the "Certificate database location:" and the "Certificate database log location:"
settings to their defaults, and then click [Next>].

14.

Read the notes, and then click [Next>].

15.

Select the role service you want to use, and then click [Next>].

16.

Click [Install].

17.

When the installation is complete, click [Close].

18.

Close [Server Manager].

Installation under Windows Server 2012

1.

On the Start screen, click [Server Manager].

2.

On the [Manage] menu, click [Add Roles and Features].

3.

Click [Next>].

4.

Select [Role-based or feature-based installation], and then click [Next>].

5.

Select a server, and then click [Next>].

6.

Select the "Active Directory Certificate Services" and "Web Server (IIS)" check boxes, and
then click [Next>].

If a confirmation message appears, click [Add Features].

7.

Check the features you want to install, and then click [Next>].

8.

Read the content information, and then click [Next>].

9.

Make sure that [Certification Authority] is selected in the [Role Services] area in [Active
Directory Certificate Services], and then click [Next>].

10.

Read the content information, and then click [Next>].

11.

Check the role services you want to install under [Web Server (IIS)], and then click
[Next>].

12.

Click [Install].

13.

After completing the installation, click the Server Manager's Notification icon , and then
click [Configure Active Directory Certificate Services on the destination server].

14.

Click [Next>].

15.

Click [Certification Authority] in the [Role Services] area, and then click [Next>].

16.

Select [Enterprise CA], and then click [Next>].

17.

Select [Root CA] , and then click [Next>].

18.

Select [Create a new private key], and then click [Next>].

19.

Select a cryptographic provider, key length, and hash algorithm to create a new private
key, and then click [Next>].

Windows Authentication

37

Содержание PRO C9100

Страница 1: ...Operating Instructions Security Guide For safe and correct use be sure to read the Safety Information in Read This First before using the machine...

Страница 2: ......

Страница 3: ...d 19 Logging out Using the Control Panel 19 Logging out Using Web Image Monitor 19 Supervisor 20 Resetting the Administrator s Password 20 Changing the Supervisor 21 2 Configuring User Authentication...

Страница 4: ...ncrypting Data in the Address Book 53 Encrypting Data on the Machine 55 Enabling the Encryption Settings 56 Backing Up the Encryption Key 58 Updating the Encryption Key 59 Canceling Data Encryption 61...

Страница 5: ...Encryption Key Auto Exchange Settings 92 IPsec Settings 93 Encryption Key Auto Exchange Settings Configuration Flow 99 telnet Setting Commands 103 Configuring IEEE 802 1X Authentication 108 Installin...

Страница 6: ...y Importing the Device Setting Information File of a Server 155 Troubleshooting 156 Managing Eco friendly Counter 159 Configuring Eco friendly Counters 159 Resetting a Machine s Eco friendly Counter 1...

Страница 7: ...ings 200 Maintenance 201 Web Image Monitor Display Eco friendly Counter 202 Web Image Monitor Job 203 Web Image Monitor Device Settings 204 Web Image Monitor Interface 212 Web Image Monitor Network 21...

Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...

Страница 9: ...e required security settings there is a risk of security breaches by users Before setting this machine s security features and to ensure appropriate operation by users administrators must read the Sec...

Страница 10: ...n System Settings 7 Press Administrator s Email Address and then specify the e mail address of the administrator of this machine 8 Create and install the device certificate from the control panel For...

Страница 11: ...pecify the settings for operating the machine Their access privileges depend on the administrator type Administrators cannot perform normal operations such as printing documents Supervisor There is on...

Страница 12: ...administrator Sharing administrator tasks facilitates each administrator s tasks while at the same time preventing unauthorized administrator operations Multiple administrator roles can be assigned t...

Страница 13: ...14 Registering and Changing Administrators You can specify the login user name and password and encryption password for each administrator The encryption password is used for encrypting data transmit...

Страница 14: ...e administrator Manages permission to access files Administrator authentication can also be specified via Web Image Monitor For details see Web Image Monitor Help You can specify User Code Authenticat...

Страница 15: ...thentication to On Available Settings appears 8 Select the settings to manage from Available Settings The selected settings will be unavailable to users The available settings depend on the administra...

Страница 16: ...the relevant privileges Be sure to assign all administrator privileges so that each administrator privilege is associated with at least one administrator For details about logging in and logging out w...

Страница 17: ...ollow the password policy to strengthen the login password For details about the password policy and how to specify it see page 162 Specifying the Extended Security Functions 11 Enter the login passwo...

Страница 18: ...rs is less easily guessed by others In Password Policy in Extended Security you can specify a password consisting of uppercase or lowercase characters numbers and symbols as well as the minimum number...

Страница 19: ...key 2 Press the Login Logout key DER049 The login screen appears The login screen can also be made to appear by pressing Login in the User Tools menu 3 Press Login 4 Enter the login user name and then...

Страница 20: ...bar When entering an IPv4 address do not begin segments with zeros For example If the address is 192 168 001 010 you must enter it as 192 168 1 10 to connect to the machine Enter the IPv6 address wit...

Страница 21: ...n the same way Logging out Using the Control Panel 1 Press the Login Logout key and then press Yes You can log out using the following procedures also Press the Energy Saver key Logging out Using Web...

Страница 22: ...ine to its default state This will result in the machine setting data counters logs and other data being lost The service call may not be free of charge For the characters that can be used for login u...

Страница 23: ...the settings under Administrator Authentication Management For details see page 12 Specifying Administrator Privileges 1 Log in as the supervisor from the control panel For details on how to log in s...

Страница 24: ...1 Getting Started 22...

Страница 25: ...s Address Book and can only use the functions they are permitted to access by administrators By enabling user authentication you can allow only people registered in the Address Book to use the machin...

Страница 26: ...ng users to operate the machine or access the machine over the network 1 2 3 4 CZB010 1 User A user performs normal operations on the machine such as printing 2 Group A group performs normal operation...

Страница 27: ...at the same time User authentication configuration flow Configuration procedure Details Configuring administrator authentication page 12 Specifying Administrator Privileges page 14 Registering and Cha...

Страница 28: ...od Windows authentication or LDAP authentication authentication cannot be enabled unless the external authentication device has the carried over user code account previously registered However the use...

Страница 29: ...ine administrator from the control panel 2 Press System Settings 3 Press Administrator Tools 4 Press Next 5 Press User Authentication Management 6 Select User Code Auth If you do not want to enable us...

Страница 30: ...inter under Functions to Restrict For details about printer job authentication see page 43 Printer Job Authentication 9 Press OK 10 Press the Login Logout key A confirmation message appears If you pre...

Страница 31: ...ation is properly configured under Administrator Authentication Management 1 Log in as the machine administrator from the control panel 2 Press System Settings 3 Press Administrator Tools 4 Press Next...

Страница 32: ...is specified For details about user registration in the Address Book see Registering User Information Connecting the Machine System Settings User authentication can also be specified via Web Image Mo...

Страница 33: ...me 6 Enter a login user name and then press OK 7 Press Change for Login Password 8 Enter a login password and then press OK 9 Re enter the login password for confirmation and then press OK 10 Press OK...

Страница 34: ...ser information automatically registered in the machine s address book is edited on the machine it is overwritten by the information from the directory server when authentication is performed Users ma...

Страница 35: ...s Server 2003 2003 R2 Windows Server 2008 2008 R2 Windows Server 2012 2012 R2 To use Kerberos authentication under Windows Server 2008 install Service Pack 2 or later Data transmission between the mac...

Страница 36: ...elect Windows Auth If you do not want to enable user authentication select Off 7 If you want to use Kerberos authentication press On If you want to use NTLM authentication press Off and proceed to Ste...

Страница 37: ...h group the users to be authenticated You also need to register in the machine the functions available to the global group members Create global groups in the machine by entering the names of the glob...

Страница 38: ...nstallation under Windows Server 2008 R2 1 On the Start menu point to Administrative Tools and then click Server Manager 2 Click Roles in the left column click Add Roles from the Action menu 3 Click N...

Страница 39: ...e features you want to install and then click Next 8 Read the content information and then click Next 9 Make sure that Certification Authority is selected in the Role Services area in Active Directory...

Страница 40: ...procedure 1 On the Start menu point to Administrative Tools and then click Internet Information Services IIS Manager Under Windows Server 2012 click Internet Information Services IIS Manager on the St...

Страница 41: ...onfigured in capital letters For details about registering a realm see Programming the Realm Connecting the Machine System Settings If you use LDAP authentication user information registered in the LD...

Страница 42: ...tive The first time an unregistered user accesses the machine after LDAP authentication has been specified the user is registered in the machine and can use the functions available under Available Fun...

Страница 43: ...ctions for individuals or groups see page 50 Limiting Available Functions 10 Press Next 11 Press Change for Login Name Attribute 12 Enter the login name attribute and then press OK Use the login name...

Страница 44: ...Specify unique attribute on the machine to match the user information in the LDAP server with that in the machine By doing this if the unique attribute of a user registered in the LDAP server matches...

Страница 45: ...lor B C User Code Auth Color B C User Code Auth PC Control A A User Code Auth Do not Restrict A A A Printing is possible B Printing is possible if the user is authorized to print in black and white or...

Страница 46: ...tems Login User Name Login Password Registration No Name 1 Key Display 1 1 If this information cannot be obtained the login user name is registered in this field You can automatically delete old user...

Страница 47: ...g items The lockout function settings can be made using Web Image Monitor Setting item Description Setting values Default setting Lockout Specify whether or not to enable the lockout function Active I...

Страница 48: ...7 In the Lock Out User for field enter the number of minutes until lockout is disabled 8 Click OK User Lockout Policy is set 9 Log out Canceling Password Lockout 1 Log in as the user administrator fr...

Страница 49: ...in as the machine administrator from the control panel 2 Press System Settings 3 Press Timer Settings 4 Press Auto Logout Timer 5 Select On If you do not want to specify Auto Logout Timer select Off 6...

Страница 50: ...You can specify Auto Logout settings for Web Image Monitor in Webpage For details see the Web Image Monitor Help 2 Configuring User Authentication 48...

Страница 51: ...tor Network administrator File administrator For details on the settings that can be made by each administrator see page 187 List of Operation Privileges for Settings Register the administrators befor...

Страница 52: ...f the printer browser functions and extended features 1 Log in as the user administrator from the control panel 2 Press Address Book Mangmnt 3 Select the user 4 Press Auth Info 5 In Printer and Other...

Страница 53: ...Book To protect the data from unauthorized users you can also encrypt the data in the Address Book Specifying Address Book Access Permissions Access permissions can be specified by the users register...

Страница 54: ...9 Select the user to whom you want to assign access permissions and then specify the permission Select one of Read only Edit Edit Delete or Full Control 10 Press Exit 11 Press OK 12 Log out Edit Edit...

Страница 55: ...ess System Settings 3 Press Administrator Tools 4 Press Next 5 Press Extended Security 6 Press On for Encrypt User Custom Settings Address Book 7 Press Change for Encryption Key 8 Enter the encryption...

Страница 56: ...K 13 Log out If you register additional users after encrypting the data in the Address Book their data is also encrypted The backup copy of the Address Book data stored in the SD card is encrypted For...

Страница 57: ...yption algorithm is AES 256 Data that is encrypted This function encrypts data that is stored in the machine s NVRAM memory that remains even after the machine is turned off and on the hard disk The f...

Страница 58: ...tings will not be initialized to their system defaults even if Format All Data File System Data Only or All Data is specified Restoring Data To transfer data to a new machine restore the encrypted dat...

Страница 59: ...simultaneously and select overwrite 3 times for Random Numbers the process will take up to 7 hours and 45 minutes Re encrypting from an already encrypted state takes 7 hours and 15 minutes The Erase A...

Страница 60: ...int on Paper press the Start key and print out the machine s data encryption key 9 Press OK 10 Press Exit 11 Press Exit 12 Log out 13 Turn off the main power switch and then turn on the main power swi...

Страница 61: ...out the machine s data encryption key 8 Press Exit 9 Log out Updating the Encryption Key You can update the encryption key Applying the new encryption key takes the same amount of time as that for st...

Страница 62: ...yption Key 7 Select the data to be carried over to the hard disk and the one not to be deleted To carry all of the data over to the hard disk select All Data To carry over only the machine settings da...

Страница 63: ...be carried over to the hard disk Once the canceling of data encryption starts it cannot be stopped Make sure that the machine s main power is not turned off while the encryption process is in progres...

Страница 64: ...the main power switch and then turn on the main power switch again For details about turning off the main power see Turning On Off the Power Getting Started 4 Preventing Leakage of Information from M...

Страница 65: ...mpletely erase any unnecessary left behind after you edit or delete data on the machine s hard disk the data must be deleted by overwriting If you use Auto Erase Memory overwriting is done automatical...

Страница 66: ...was set to Off might not be overwritten If the main power switch is turned off before Auto Erase Memory is completed overwriting will stop and data will be left on the hard disk Do not stop the overwr...

Страница 67: ...he number keys and then press 10 Press OK Auto Erase Memory is set 11 Log out If you enable both overwriting and data encryption the overwriting data will also be encrypted Canceling Auto Erase Memory...

Страница 68: ...service representative If the machine enters Low Power mode when overwriting is in progress press the Energy Saver key to revive the display in order to check the icon If the Data Overwrite icon cont...

Страница 69: ...be possible Ensure that users do not save any data on the machine after Erase All Memory has completed Types of data that can be overwritten by Erase All Memory Information registered in the Address...

Страница 70: ...ted to the machine 2 Log in as the machine administrator from the control panel 3 Press System Settings 4 Press Administrator Tools 5 Press Next twice 6 Press Erase All Memory 7 Select the method of e...

Страница 71: ...wer Turn it on again and then repeat from Step 2 Suspending Erase All Memory To turn off the machine s power while Erase All Memory is enabled suspend Erase All Memory in advance Erase All Memory will...

Страница 72: ...4 Preventing Leakage of Information from Machines 70...

Страница 73: ...itor You cannot limit accesses from telnet or Device Manager NX when using SNMPv1 for monitoring 1 Log in as the network administrator from Web Image Monitor 2 Point to Device Management and then clic...

Страница 74: ...itor telnet All applications that operate over IPv6 cannot be used IPsec Control panel Web Image Monitor telnet Encrypted transmission using IPsec is disabled FTP TCP 21 Web Image Monitor telnet Devic...

Страница 75: ...re SSL transmission using the control panel or Web Image Monitor SMB TCP 139 Control panel Web Image Monitor telnet Device Manager NX Remote Communication Gate S SMB printing functions cannot be used...

Страница 76: ...ing settings on the control panel using Restrict Display of User Information SSDP UDP 1900 Web Image Monitor telnet Device discovery using UPnP from Windows cannot be used Bonjour UDP 5353 Web Image M...

Страница 77: ...col you want to enable or disable 6 Press OK 7 Log out Enabling and Disabling Protocols Using Web Image Monitor 1 Log in as the network administrator from Web Image Monitor 2 Point to Device Managemen...

Страница 78: ...ait for about one or two minutes and then click OK If the previous screen does not appear again after you click OK wait for a while and then click the web browser s refresh button 7 Log out 5 Enhanced...

Страница 79: ...rtant information Use this setting if the machine is connected to a local area network LAN FIPS140 Provides a security strength intermediate between Level 1 and Level 2 You can only use codes recommen...

Страница 80: ...urity under Security 4 Select the network security level in Security Level 5 Click OK 6 Updating appears Wait for about one or two minutes and then click OK If the previous screen does not appear agai...

Страница 81: ...ncryption Strength Setting RC4 FTP Active Active Active Active sftp Active Active Active Active ssh Active Active Active Active RSH RCP Active Active Inactive Inactive TELNET Active Inactive Inactive...

Страница 82: ...2 AES 256 Blowfish Arcfour 3DES AES 128 AES 192 AES 256 Arcfour 3DES AES 128 AES 192 AES 256 3DES AES 128 AES 192 AES 256 SNMPv3 Authentication Algorithm MD5 SHA1 SHA1 SHA1 SNMPv3 Encryption Algorithm...

Страница 83: ...nage the expiration of certificates and renew the certificates before they expire The administrator is required to check that the issuer of the certificate is valid Creating and Installing a Device Ce...

Страница 84: ...d certificate as the device certificate 1 Log in as the network administrator from Web Image Monitor 2 Point to Device Management and then click Configuration 3 Click Device Certificate under Security...

Страница 85: ...te authority for the device certificate The application procedure depends on the certificate authority For details contact the certificate authority For the application click Web Image Monitor Details...

Страница 86: ...that a device certificate for the machine has been installed 9 Log out Installing an Intermediate Certificate Issued by a Certificate Authority This section explains how to use Web Image Monitor to i...

Страница 87: ...ill be installed on the device The Certificate Details screen will indicate whether or not the intermediate certificate has been installed For details about the Certificate Details screen see Web Imag...

Страница 88: ...ate and public key CZB002 2 The device certificate and public key are sent from the machine to the user s computer CZB003 3 The shared key created with the computer is encrypted using the public key s...

Страница 89: ...displayed message appears check the configuration because the current SSL TLS configuration is invalid Enabling SSL TLS After installing the device certificate in the machine enable the SSL TLS setti...

Страница 90: ...ernal LDAP server The following types of communication and data are always encrypted by SSL3 0 communication via Remote and logs transferred to Remote Communication Gate S User Setting for SSL TLS We...

Страница 91: ...rtificate specify SSL TLS encrypted communication mode By configuring this setting you can change the security level 1 Log in as the network administrator from the control panel 2 Press System Setting...

Страница 92: ...rk administrator from the control panel 2 Press System Settings 3 Press File Transfer 4 Press SMTP Server 5 In Use Secure Connection SSL press On If you are not using SSL for SMTP connections press Of...

Страница 93: ...by IPsec Web Image Monitor might become unusable when TCP is targeted by IPsec from the computer side If you cannot access Web Image Monitor due to IPsec configuration problems disable IPsec in Syste...

Страница 94: ...ion key are specified automatically AH protocol ESP protocol When combined the ESP and AH protocols provide secure transmission through both encryption and authentication These protocols provide heade...

Страница 95: ...more securely For example set the broadest IP range at the lowest priority 4 and then set specific IP addresses at a higher priority level 3 and higher This way when IPsec transmission is enabled for...

Страница 96: ...vel Encryption Authentication and High Level Encryption Select this level if you want to encrypt the data packets as well as authenticate the transmission partner and prevent unauthorized packet tampe...

Страница 97: ...28 AES 192 AES 256 Phase 2 PFS Inactive Inactive 2 Encryption key auto exchange settings items When you specify a security level the corresponding security settings are automatically configured but ot...

Страница 98: ...ress If you are not setting an address range enter 32 after an IPv4 address or enter 128 after an IPv6 address Security Policy Specify how IPsec is handled Apply Bypass Discard Encapsulation Mode Spec...

Страница 99: ...PSK authentication Enter the pre shared key required for PSK authentication Phase 1 Hash Algorithm Specify the Hash algorithm to be used in phase 1 auto setting MD5 SHA1 SHA256 SHA384 SHA512 Phase 1...

Страница 100: ...tting HMAC MD5 96 HMAC SHA1 96 HMAC SHA256 128 HMAC SHA384 192 HMAC SHA512 256 Phase 2 Encryption Algorithm Permissions Specify the encryption algorithm to be used in phase 2 auto setting Cleartext NU...

Страница 101: ...ec transmission on the computer side Also because the response is slow during initial key exchange it may take some time to confirm that transmission has been established Specifying Encryption Key Aut...

Страница 102: ...cting Communication Paths via a Device Certificate 1 Log in as the network administrator from Web Image Monitor 2 Point to Device Management and then click Configuration 3 Click Device Certificate und...

Страница 103: ...in minutes that is specified on the machine in Encryption Key Auto Exchange Settings Phase 1 and then click Methods 11 Check that the hash algorithm Integrity encryption algorithm Encryption and Diffi...

Страница 104: ...ified on the machine in Encryption Key Auto Exchange Settings Phase 2 36 Click OK 37 Click Next 38 Click Finish 39 Select the filter action that was just created and then click Next If you set Encrypt...

Страница 105: ...ations see Remote Maintenance Using telnet Connecting the Machine System Settings If you are using a certificate as the authentication method in encryption key auto exchange settings IKE install the c...

Страница 106: ...2 3 4 default disable To disable the settings 1 4 specify the number 1 4 To disable the default settings specify default Specify the user specific local address remote address msh ipsec ike 1 2 3 4 i...

Страница 107: ...ed When IPsec can be used IPsec transmission is performed Not specifying a requirement level displays the current setting Encapsulation mode setting msh ipsec ike 1 2 3 4 default mode transport tunnel...

Страница 108: ...s 3des aes128 aes192 aes256 Enter the separate setting number 1 4 or default and specify the ISAKMP SA phase 1 encryption algorithm Not specifying an encryption algorithm displays the current setting...

Страница 109: ...ec SA phase 2 PFS setting msh ipsec ike 1 2 3 4 default ph2 pfs none 1 2 14 Enter the separate setting number 1 4 or default and specify the IPsec SA phase 2 Diffie Hellman group number Specify the gr...

Страница 110: ...Install a site certificate root CA certificate for verifying the reliability of the authentication server You need to have at least a certificate issued by the certificate authority who signed the se...

Страница 111: ...while and then click the web browser s refresh button 7 Log out Setting Items of IEEE 802 1X for Ethernet 1 Log in as the network administrator from Web Image Monitor 2 Point to Device Management and...

Страница 112: ...he RADIUS server Select MSCHAPv2 or TLS in Phase 2 Method When you select TLS you must install IEEE 802 1X Client Certificate Make the following settings according to the operating system you are usin...

Страница 113: ...List in Interface Settings on the control panel and then print the network summary to check the status If you cannot identify the problem execute Restore IEEE 802 1X Authentication to Defaults in Netw...

Страница 114: ...ypting the data for specifying settings you need to specify the network administrator s Encryption Password setting and Encrypted Password in SNMP Account Setting in Device Manager NX in addition to s...

Страница 115: ...2008 AES256 CTS HMAC SHA1 96 AES128 CTS HMAC SHA1 96 RC4 HMAC ARCFOUR HMAC MD5 DES CBC MD5 Windows Server 2008 R2 2012 2012 R2 AES256 CTS HMAC SHA1 96 AES128 CTS HMAC SHA1 96 RC4 HMAC ARCFOUR HMAC MD5...

Страница 116: ...5 Enhanced Network Security 114...

Страница 117: ...is machine job log access log and eco friendly log Job Log Stores details of control panel operations such as printing reports the configuration list for example Access Log Stores details of login and...

Страница 118: ...ntrol panel Access log information items Access Log Item Log Type Attribute Content Login Login Times of login and identity of logged in users Logout Logout Times of logout and identity of logged out...

Страница 119: ...g Firmware Invalid Firmware Invalid Details of checks for firmware validity made at times such as when the machine was switched on Date Time Change Date Time Change Details of changes made to date and...

Страница 120: ...ough user authentication The first log created after the power is turned on is the Firmware Structure log Eco friendly log information items Eco friendly Log Item Log Type Attribute Content Main Power...

Страница 121: ...e same log ID is assigned to all lines corresponding to a single job log entry CJD022 1 2 3 1 Common items Each item in the common items is displayed on a separate line 2 Source Result and Status in t...

Страница 122: ...y Failed The operation or event was unsuccessful Blank The operation or event is still in progress Operation Method Indicates the operation procedure Value Content Control Panel Control panel Driver D...

Страница 123: ...porting is executing by another user Connection Failed with Remote Machine A connection to an output destination failed Write Error to Remote Machine An error occurred in writing to an output destinat...

Страница 124: ...registered Invalid Password The entered password is not valid Processing The job is being processed Error An error has occurred Suspended The job has been suspended Cancelled Details Indicates the st...

Страница 125: ...was not entered Invalid Device Certificate Cases to be recorded are as follows The device certificate is missing The valid period has expired If the e mail address of the administrator and that of th...

Страница 126: ...operation If an administrator performed the operation his or her ID contains the login user name of the administrator Log ID Identifies the ID that is assigned to the log This is a hexadecimal ID tha...

Страница 127: ...es the authentication server is available Logout Mode Mode of logout Value Content by User s Operation Manual logout by the user by Auto Logout Timer Automatic logout following a timeout Login Method...

Страница 128: ...r name of the user whose data was accessed If the administrator s data was accessed the administrator s user name is logged Address Book Registration No Indicates the registration number of the user p...

Страница 129: ...be exported Value Content System Settings System Settings Web Image Monitor Setting Web Image Monitor Setting Web Service Settings Web Service Settings System Copier SP System SP Target File Name Ind...

Страница 130: ...s disabled Not Changed No changes have been made to the eco friendly log collection setting Transfer Logs Indicates the status of the log transfer setting Value Content Active Log transfer setting is...

Страница 131: ...dicates the protocol of the destination is not identified IP Address Destination IP address Port No Destination port number Port numbers are indicated in decimal numbers MAC Address Destination MAC ph...

Страница 132: ...n network attacks occur Value Content Violation Detected An attack on the network was detected Recovered from Violation The network recovered from an attack Max Host Capacity Reached The machine becam...

Страница 133: ...y Add Update Delete Firmware Indicates the method used to add update or delete the machine s firmware Value Content Updated with SD Card An SD card was used to perform the firmware update Added with S...

Страница 134: ...y An encryption key update was finished Machine Data Encryption Key Type Identifies the type of the encryption key Value Content Encryption Key for Hard Disk Encryption key for hard disk Encryption Ke...

Страница 135: ...e time until lockout release is recorded Auto Logout Timer Whether Auto Logout Timer is set to On or Off is recorded Auto Logout Timer seconds The time until the auto logout operates is recorded Opera...

Страница 136: ...s auto logout timer log is recorded in increments of one minute Update Firmware A log entry reporting changes to the Update Firmware setting is recorded Prohibit or Do not Prohibit is recorded Change...

Страница 137: ...ully Job log source Source Indicates the source of the job file Value Content Report The job file was a printed report Job log target Target Type of the job target Value Content Print Print Start Date...

Страница 138: ...information Paper Usage Paper usage Power Consumption Power consumption Log Result Whether the event has ended or not is displayed Value Content Completed Completed Failed Failed Result The result of...

Страница 139: ...nds Indicates the time that has elapsed from the start of a job to the end of it Paper Usage Large Size Indicates the number of one sided prints per hour on large paper Large size means A3 11 17 inche...

Страница 140: ...er Consumption Wh Indicates the power consumption in each power state Specifying Log Collect Settings Enable the collection settings for each kind of log and configure the collection level Job Log Col...

Страница 141: ...for about 1 or 2 minutes and then click OK If the previous screen does not appear again after you click OK wait for a while and then click the web browser s refresh button 8 Log out The greater Access...

Страница 142: ...on that supports UTF 8 For details about the items contained in the logs see page 118 Attributes of Logs You Can Download Number of Logs That Can Be Kept on the Machine When the limit of job log acces...

Страница 143: ...l panel or through Web Image Monitor Notes on Operation When the Number of Log Entries Reaches the Maximum If the number of logs that can be stored on the machine exceeds the specified limit old logs...

Страница 144: ...If logs are downloaded without overwriting CJD006 1 2 4 3 1 Access log 2 Job log 3 Download 4 Downloaded logs If logs are downloaded during overwriting CJD007 1 4 3 2 5 6 6 6 Managing the Machine 142...

Страница 145: ...ll Logs Use the following procedure to delete all logs stored on the machine Delete All Logs appears if one of the job log access log or eco friendly log is set to Active 1 Log in as the machine admin...

Страница 146: ...4 Select Inactive in the Transfer Logs area under Common Settings for All Logs 5 Click OK 6 Log out 6 Managing the Machine 144...

Страница 147: ...Log out 9 Turn off the main power switch and then turn on the main power switch again Disabling Log Transfer to the Log Collection Server Use the following procedure to disable log transfer from the m...

Страница 148: ...specified to collect job log access log or eco friendly log 1 Log in as the machine administrator from the control panel 2 Press System Settings 3 Press Administrator Tools 4 Press Next twice 5 Press...

Страница 149: ...e information for each user is maintained even when User s Own Customization is set to Prohibit When the setting is changed back to Allow the information can be used again Warnings About Using a User...

Страница 150: ...Because each user can customize his or her home screen the administrator cannot check the home information of each user 6 Managing the Machine 148...

Страница 151: ...icate Check settings can be specified only via Web Image Monitor See the related articles in the Web Image Monitor Help If Site Certificate Check is disabled and the user accesses an untrusted Web sit...

Страница 152: ...oot certificate for verification does not exist This site has a security problem Verification of the server to connect to cannot be performed This site has a security problem The http subcontents are...

Страница 153: ...age Monitor Setting Web Service Settings System Settings Browser Features Data that cannot be imported or exported Some System Settings 1 2 1 The setting for the date settings that require device cert...

Страница 154: ...d until the user completes the operation During export and import the machine cannot be otherwise operated For details about SD card handling see Inserting Removing a Memory Storage Device Getting Sta...

Страница 155: ...Press OK 10 Press Exit 11 Log out If import or export fails you can check the log for the error The log is stored in the same location as the exported device setting information file Importing Device...

Страница 156: ...Exclude the Device Unique Information Device Unique Information includes the IP address host name etc Enter the encryption key that was specified when the file was exported 8 Press Run Import 9 Press...

Страница 157: ...s encrypted configure an encryption key Select whether or not to send e mail notification to the machine administrator when importing fails 7 Press OK 8 Log out This can also be configured from Web Im...

Страница 158: ...tting Information Run Import Server 6 Press OK 7 Press Exit The machine restarts If import or export fails you can check the log for the error The log is stored in the same location as the exported de...

Страница 159: ...en different models or machines with different device configurations Import files exported from the same model with the same device configurations 4 INVALID OUTPUT DIR Failed to write the device infor...

Страница 160: ...on to edit the setting is unavailable 4 NOT EXIST The setting does not exist in the system 5 INTERLOCK ERROR The setting cannot be changed because of the system status or interlocking with other speci...

Страница 161: ...all eco friendly counter Configuring Eco friendly Counters Set up the period for collecting data for the eco friendly counter and an administrator s message 1 Log in as the machine administrator from...

Страница 162: ...Press System Settings 3 Press Administrator Tools 4 Press Display Clear Eco friendly Counter 5 Press Clear Current Value or Clear Crnt Prev Val 6 Press OK 7 Log out Resetting Users Eco friendly Counte...

Страница 163: ...ministrator from the control panel 2 Press System Settings 3 Press Administrator Tools 4 Press Auto Delete User in Address Book 5 Select On and then press OK 6 Log out The data is automatically delete...

Страница 164: ...ting Restrict Display of User Information The machine administrator can specify this if user authentication is specified When the job history is checked using a network connection for which authentica...

Страница 165: ...pecified with SNMPv1 v2 Default Do not Prohibit Authenticate Current Job This function is not available on this model Password Policy The user administrator can specify this This setting allows you to...

Страница 166: ...achine finishes startup with the updated firmware The administrator can check if the updated structure change is permissible or not by checking the firmware version displayed on the control panel scre...

Страница 167: ...e the number of authentication attempts by the user does not match the number of the attempts specified on the machine For example access may be denied when a print job for multiple sets of pages is s...

Страница 168: ...stem from becoming unresponsive when an access violation is detected In Simultns Access Host Limit you can specify the maximum number of hosts that access the machine at one time If the number of simu...

Страница 169: ...lue between 50 and 200 and then press Default 200 Depending on the values specified for the settings for Max Allowed No of Access and Measurement Time you may receive violation detection e mails frequ...

Страница 170: ...ly if you have logged in to the machine as an administrator Checking Firmware Validity When the machine starts up this function is used to check that the firmware is valid If an error occurs while a v...

Страница 171: ...machine and cancels the service mode lock to allow a customer engineer to operate the machine for inspection and repair This ensures that inspection and repair can be performed under the supervision...

Страница 172: ...ation Administrator Tools Administrator Authentication Management Machine Management Select On and then select each of Available Settings See page 11 Configuring Administrator Authentication Administr...

Страница 173: ...r Tools Machine Data Encryption Settings Select Encrypt and then select All Data for Carry over all data or file system data only without formatting or format all data If Encrypt has already been sele...

Страница 174: ...ut Function Network SNMPv3 SNMPv3 Function Inactive To use SNMPv3 functions set SNMPv3 Function to Active and set Permit SNMPv3 Communication to Encryption Only Because SNMPv3 enforces authentication...

Страница 175: ...hentication and High Level Encryption Settings you can configure when IPsec is unavailable If IPsec is not available configure the settings shown in the following table to enhance the security of the...

Страница 176: ...6 Managing the Machine 174...

Страница 177: ...pending on the machine settings users want to specify Using the list of settings the administrator who is responsible for the machine settings users want to specify must decide whether to additionally...

Страница 178: ...rd A password error occurred Make sure the password is entered correctly B0206 002 Case 1 A login user name or password error occurred Make sure the login user name and password are entered correctly...

Страница 179: ...from an application on the System Settings screen while only the administrator has authentication privileges Only the administrator has login privileges on this screen Log in as a general user from t...

Страница 180: ...in if the account name contains any of these prohibited characters If the account name was entered wrongly enter it correctly and log on again W0406 101 Authentication cannot be completed because of s...

Страница 181: ...rror occurred Make sure that the user is registered on the server Use a registered login user name and password W0406 107 Case 6 A domain name error occurred Make sure that the Windows authentication...

Страница 182: ...uthentication will fail if automatic retrieval for KDC fails Ask your service representative to make sure the KDC retrieval settings are set to automatic retrieval If automatic retrieval is not functi...

Страница 183: ...ing edited LDAP Authentication L0104 000 Failed to encrypt a password A password error occurred Make sure the password is entered correctly L0206 002 A user attempted authentication from an applicatio...

Страница 184: ...ed because of significant numbers of authentication attempts Wait a few minutes and then try again If the situation does not improve make sure that an authentication attack is not occurring Notify the...

Страница 185: ...he search filter L0406 204 Kerberos authentication failed Kerberos authentication settings are not correctly configured Make sure the realm name KDC Key Distribution Center name and supporting domain...

Страница 186: ...re users can be registered The number of users registered in the Address Book has reached its maximum Ask the user administrator to delete unused user accounts in the Address Book L0707 001 An authent...

Страница 187: ...Cannot print when user authentication has been enabled User code authentication may not be specified in the printer driver Specify user code authentication in the printer driver For details see the p...

Страница 188: ...7 Troubleshooting 186...

Страница 189: ...he network administrator has privileges for this operation File The file administrator has privileges for this operation Unset The logged in user has privileges for this operation In cases where no se...

Страница 190: ...W R Output Printer R R W R R R W R Output Tray Setting R R W R R R W R Paper Tray Priority Printer R R W R R R W R Key Repeat R R W R R R W R System Status Display Time R R W R R R W R Status Indicat...

Страница 191: ...R Binding Glue Heater Auto Off Timer R R W R R R W R Interface Settings Network Settings User Mach N W File Unset Set Machine IPv4 Address 1 R R R W R R W R IPv4 Gateway Address R R R W R R W R Machi...

Страница 192: ...Ethernet R R R W R R W R Restore IEEE 802 1X Authentication to Defaults R W R W 1 When auto obtain is set the data is read only 2 All administrators and users can run connection tests Print List Setti...

Страница 193: ...R W 4 R W 4 R W 5 R 5 Address Book Change Order R W R W Address Book Edit Title R W R W Address Book Switch Title R W R W R Backup Restore User Custom Settings Address Book R W R W Auto Delete User i...

Страница 194: ...of User Information R R W R R R W R Encrypt User Custom Settings Address Book R W R R R R R Enhance File Protection R R R R W R R Settings by SNMPv1 v2 R R R W R R W R Authenticate Current Job R R W...

Страница 195: ...Settings R W Program Delete Device Certificate R W Device Setting Information Import Setting Server 12 Device Setting Information Run Import Server 12 Device Setting Information Export Memry Strge De...

Страница 196: ...n the individual authentication function is used 9 Only the administrator privilege settings can be changed 10 Administrators can only change their own accounts 11 Can only be changed to Off 12 R W ca...

Страница 197: ...on the control panel When administrator authentication is set the restrictions to user operations differ depending on the configurations in Available Settings Tray Paper Settings Settings User Mach N...

Страница 198: ...depending on the configurations in Available Settings Edit Home Settings User Mach N W File Unset Set Move Icon R R W R R R W R Delete Icon R R W R R R W R Add Icon R W R W Restore Default Icon Displa...

Страница 199: ...Adjustment Settings for Operators Settings User Mach N W File Unset Set Adjustment Settings for Operators R W R W R W R W R W R W Adjustment Settings for Operators 197...

Страница 200: ...Adjustment Settings for Skilled Operators Settings User Mach N W File Unset Set Adjustment Settings for Skilled Operators R W 8 List of Operation Privileges for Settings 198...

Страница 201: ...et the restrictions to user operations differ depending on the configuration in Available Settings Settings User Mach N W File Unset Set Browser Default Settings R R W R R R W R Settings per Users R R...

Страница 202: ...R W R R R R Install R R W R R R R Uninstall R R W R R R R Extended Feature Info R R W R R R R Administrator Tools R W Add Program Startup Setting R R W R R R R Install Add Program R R W R R R R Uninst...

Страница 203: ...nistrator authentication is set the restrictions to user operations differ depending on the configuration in Available Settings Maintenance Settings User Mach N W File Unset Set Color Registration R W...

Страница 204: ...ly Counter These settings are in Status Information A user can only view their own counter Settings User Mach N W File Unset Set Download R W Device Total Counter R Counter per User R R R 8 List of Op...

Страница 205: ...Web Image Monitor Job These settings are in Status Information Job List Settings User Mach N W File Unset Set Current Waiting Jobs R R 1 1 A user can only view their own job Web Image Monitor Job 203...

Страница 206: ...Energy Saver Key to Change Mode R R W R R R W R Display IP Address on Device Display Panel R R W R R Output Tray R R W R R R W R Paper Tray Priority R R W R R R W R Function Key Allocation Function P...

Страница 207: ...ach N W File Unset Set Set Date R R W R R R W R Set Time R R W R R R W R SNTP Server Name R R W R R R W R SNTP Polling Interval R R W R R R W R Time Zone R R W R R R W R Timer Settings User Mach N W F...

Страница 208: ...ings User Mach N W File Unset Set Logs to Download R W Download R W Email Settings User Mach N W File Unset Set Administrator Email Address R W R W R Reception Protocol R W R W R Email Reception Inter...

Страница 209: ...Reception Port No R W R W R IMAP4 Reception Port No R W R W R Email Notification E mail Address R W R W R Receive Email Notification R W R W Email Notification User Name R W R W Email Notification Pa...

Страница 210: ...cation Settings R R W R R R W R Windows Authentication Settings R R W R R R W R Group Settings for Windows Authentication R R W R R R W R LDAP Authentication Settings R R W R R R W R Administrator Aut...

Страница 211: ...tings User Mach N W File Unset Set Change R W R W Delete R W R W Firmware Update Settings User Mach N W File Unset Set Update R W Firmware Version R Kerberos Authentication Settings User Mach N W File...

Страница 212: ...istrator privileges Import Export Device Setting Information Settings User Mach N W File Unset Set Export Device Setting Information 5 Import Device Setting Information 5 Export Image File for Home Sc...

Страница 213: ...Program Change USB Device List Settings User Mach N W File Unset Set Device 1 R R W R R R W R Device 2 R R W R R R W R Web Image Monitor Device Settings 211...

Страница 214: ...restrictions to user operations differ depending on the configuration in Available Settings Interface Settings Settings User Mach N W File Unset Set Network R R R R R R MAC Address R R R R R R Etherne...

Страница 215: ...R R W R DHCP R R R W R R W R Domain Name R R R W R R W R IPv4 Address R R R W R R W R Subnet Mask R R R W R R W R DDNS R R R W R R W R WINS R R R W R R W R Primary WINS Server R R R W R R W R Secondar...

Страница 216: ...etails R R R W R R W R 2 You cannot disable IPv6 when using Web Image Monitor through an IPv6 connection SMB Settings User Mach N W File Unset Set SMB R R R W R R W R Protocol R R R R R R Workgroup Na...

Страница 217: ...Communication Setting R W Account User R W Account Network Administrator R W Account Machine Administrator R W SSDP Settings User Mach N W File Unset Set SSDP R W UUID R Profile Expires R W TTL R W B...

Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...

Страница 219: ...802 1X R W Extended Security Restrict Display of User Information R R W R R R W R Encrypt User Custom Settings Address Book R W R R R R R Enhance File Protection R R R R W R R Authenticate Current Job...

Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...

Страница 221: ...settings are in Configuration in Device Management Settings User Mach N W File Unset Set Setup RC Gate R W Update RC Gate Firmware R W RC Gate Proxy Server R W Notify Functional Problems of Device R...

Страница 222: ...ding on the configuration in Available Settings Webpage Settings User Mach N W File Unset Set Webpage Language R R R W R R W R Web Image Monitor Auto Logout R R R W R R W R Set URL Target of Link Page...

Страница 223: ...W File Unset Set Startup Setting R W Extended Feature Info R R R R R R Install R W Uninstall R W Administrator Tools R W Additional Program Startup Setting R W Install Additional Program R W Uninstall...

Страница 224: ...are in Device Management Settings User Mach N W File Unset Set Add User R W R W R W Change R W R W R W Delete R W R W R W Add Group R W R W R W Maintenance R W Central Address Book Management R W 8 L...

Страница 225: ...vice Management This does not appear if you have user administrator privilege In this case specify it by accessing Device Management Address Book Settings User Mach N W File Unset Set Central Address...

Страница 226: ...Web Image Monitor Main Power Off These settings are in Device Management Settings User Mach N W File Unset Set Main Power Off Mode R W OK R W 8 List of Operation Privileges for Settings 224...

Страница 227: ...Device Management When administrator authentication is set the restrictions to user operations differ depending on the configuration in Available Settings Settings User Mach N W File Unset Set Reset t...

Страница 228: ...thentication is set the restrictions to user operations differ depending on the configuration in Available Settings Settings User Mach N W File Unset Set Edit Icons R R W R R R W R Restore Default Ico...

Страница 229: ...Web Image Monitor Screen Monitoring These settings are in Device Management Settings User Mach N W File Unset Set Display Device s Screen R W Web Image Monitor Screen Monitoring 227...

Страница 230: ...ars if User s Own Customization is set to Allow Users can only change their own settings Settings User Mach N W File Unset Set Edit Icons R W Restore Default Icon Display R W Function Priority per Use...

Страница 231: ...ho knows his or her user login name and password User Indicates the user administrator Understanding the symbols R W Executing changing and reading are possible R Reading is possible Executing changin...

Страница 232: ...ot be read Protection Settings Read Edit E D Full Entry User Protect Destination Permissions for Users Groups R W R W R W Add to Group Settings Read Edit E D Full Entry User Registration No R R W R W...

Страница 233: ...ction 163 Erase All Memory 66 Error code 176 Error message 175 ESP Protocol 91 92 Extended security functions 162 F Firmware validity 168 I IEEE 802 1X 108 device certificate 109 Ethernet 109 site cer...

Страница 234: ...LS encryption mode 88 Supervisor 20 System status check 168 U Update Firmware 164 User authentication 24 25 User Code authentication 27 Users 23 W Windows authentication 32 232 EN GB EN US EN AU M238...

Страница 235: ......

Страница 236: ...EN GB EN US EN AU M238 1022 2014...

Отзывы: