Do you have a question about the Ricoh Aficio MP 2852SP and is the answer not in the manual?
Functions | Print, Copy, Scan, Fax |
---|---|
Print Technology | Laser |
Print Speed (Black) | 28 ppm |
Print Resolution | 1200 x 1200 dpi |
Copy Speed (Black) | 28 cpm |
Copy Resolution | 600 x 600 dpi |
Scan Resolution | 600 x 600 dpi |
Fax Transmission Speed | 33.6 Kbps |
Duplex Printing | Yes |
Paper Capacity (Standard) | 250 sheets |
Max Print Resolution | 1200 x 1200 dpi |
Max Copy Resolution | 600 x 600 dpi |
Maximum Paper Size | A3 |
Paper Size | A3, A4, A5, B4, B5 |
Connectivity | USB 2.0, Ethernet |
Operating System Compatibility | Windows, Mac, Linux |
Interface | Ethernet |
Paper Weight | 60 to 220 g/m² |
Identification details of the Security Target document, including title, version, date, and author.
Identifies the TOE by MFP names and component versions.
Defines the TOE type, usage scenarios, and its major security features.
Details the TOE's physical boundary, guidance documents, user types, and logical boundary.
Defines the assets to be protected by the TOE, such as user data and TSF data.
Claims conformance to specific Common Criteria versions and components.
Claims conformance to the specified Protection Profile for Hardcopy Devices.
Explains the consistency between the Security Target and the Protection Profile.
Details assumed threats related to the TOE's use and environment.
Outlines the organisational policies governing the TOE's operation.
Defines the specific security goals and objectives for the TOE itself.
Defines security goals for the operational environment surrounding the TOE.
Justifies how security objectives satisfy threats, assumptions, and policies.
Defines requirements for the TSF to restrict direct data forwarding between external interfaces.
Lists the detailed security functional requirements for the TOE.
Specifies the assurance components required for TOE evaluation.
Explains how security requirements fulfill the defined security objectives.
Generates and provides audit logs for TOE use and security-relevant events.
Verifies users and grants access based on policies and roles.
Authorizes users to operate document data and user jobs based on roles.
Encrypts data on the HDD to prevent data leakage.
Manages TSF data, user roles, and security attributes.