Do you have a question about the Ricoh Aficio MP 2852 and is the answer not in the manual?
Print Resolution | 600 x 600 dpi |
---|---|
Copy Resolution | 600 x 600 dpi |
Scan Resolution | 600 x 600 dpi |
Duplex Printing | Yes |
Monthly Duty Cycle | 50, 000 pages |
Functions | Print, Copy, Scan, Fax |
Warm-Up Time | 20 seconds |
First Print Time | 4.5 seconds |
Fax Modem Speed | 33.6 Kbps |
Maximum Paper Size | A3 |
Print Speed | 28 ppm |
Copy Speed | 28 cpm |
Original Size | A3 |
Zoom | 25% to 400% |
Scan Speed | 50 images per minute |
Fax Transmission Speed | 3 seconds per page |
Network Connectivity | Ethernet 10/100Base-TX |
Operating System Compatibility | Windows, Mac |
Power Consumption | 1.2 kW |
Identification information of the ST, including title, version, date, and author.
Identifies the TOE by MFP names and component versions.
Defines TOE Type, Usage, and Major Security Features.
Defines the physical components constituting the TOE.
Lists the available user guidance documents for the TOE.
Defines direct users: normal users, administrators, and RC Gate.
Defines indirect users: responsible manager and customer engineer.
Overview of basic functions like Copy, Printer, Scanner, Fax.
Describes security functions like Audit, Identification, Document Access Control.
Classifies user data into document and function data.
Classifies TSF data into protected and confidential data.
Lists MFP applications as protected assets subject to restrictions.
Provides definitions for specific terms used in the ST.
States CC conformance for ST and TOE based on CC versions.
Identifies the Protection Profile (PP) the ST conforms to.
Lists selected SFR Packages from the PP.
Explains TOE type consistency with the PP.
Rationale for augmented security problems and objectives.
Discusses consistency of SFRs, including augmentations and refinements.
Defines assumed threats related to the TOE use and environment.
Lists the organizational security policies relevant to the TOE.
Identifies and describes assumptions related to the TOE usage environment.
Lists the security objectives specifically for the TOE.
Defines security objectives for the TOE's operational environment.
Security objectives for the IT environment.
Security objectives for the non-IT environment.
Maps security objectives to assumptions, threats, and policies.
Describes the rationale for each security objective satisfying threats, assumptions, policies.
Defines requirements to restrict data forwarding between external interfaces.
Lists TOE security functional requirements from CC Part2 and PP.
Lists the evaluation assurance level and components.
Provides rationale for security requirements.
Shows relationship between security objectives and functional requirements.
Explains how TOE security objectives are fulfilled by functional requirements.
Analyzes dependencies between TOE security functional requirements.
Provides rationale for the chosen security assurance requirements.
Summarizes the audit function, including log generation and management.
Summarizes user identification and authentication methods.
Explains how the TOE controls access to document data and user jobs.
Authorizes users to use specific functions based on roles and privileges.
Provides network monitoring to prevent information leakage and detect tampering.
Overwrites data on HDD to prevent reuse of residual data.
Encrypts data on HDD to prevent data leakage.
Manages TSF data, user roles, and security attributes.
Verifies the integrity of MFP and FCU control software.
Receives only faxes from phone lines, prevents unauthorized intrusion.