EasyManua.ls Logo

Ricoh Aficio MP C2050 User Manual

Ricoh Aficio MP C2050
328 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #169 background imageLoading...
Page #169 background image
5. Select the network security level in "Security Level".
6. Click [OK].
7. Click [OK].
8. Click [Logout].
Status of Functions under each Network Security Level
Tab Name:TCP/IP
Function Level 0 Level 1 Level 2
TCP/IP Active Active Active
HTTP> Port 80 Open Open Open
IPP> Port 80 Open Open Open
IPP> Port 631 Open Open Close
SSL/TLS> Port 443 Open Open Open
SSL/TLS> Permit SSL/TLS Communication Ciphertext
Priority
Ciphertext
Priority
Ciphertext Only
SSL/TLS> Certificate Status None None None
DIPRINT Active Active Inactive
LPR Active Active Inactive
FTP Active Active Active
sftp Active Active Active
ssh Active Active Active
RSH/RCP Active Active Inactive
TELNET Active Inactive Inactive
Bonjour Active Active Inactive
SSDP Active Active Inactive
SMB Active Active Inactive
NetBIOS over TCP/IPv4 Active Active Inactive
Preventing Unauthorized Access
167
7

Table of Contents

Other manuals for Ricoh Aficio MP C2050

Questions and Answers:

Ricoh Aficio MP C2050 Specifications

Ricoh Aficio MP C2050

General Specifications IconGeneral Specifications
output speed20 ppm BW & Full-Color
warm-up time25 seconds
first copy time full-color9.5 seconds
copy resolution600 x 600 dpi
original capacity50 sheets
dimensions23.1" x 25.8" x 33.3" (587 x 655 x 845 mm)
weight220 lbs
power requirements120V, 60Hz, 12A
Printer Controller IconPrinter Controller
cpuRM7035C @ 533MHz
memory768 MB (512 MB + 256 MB) RAM (Standard); 1GB RAM (Maximum)
max. print speed20 ppm BW & Full-Color
max. print resolution1200 x 1200 dpi
standard interfaces10Base-T/100Base-TX Ethernet (RJ-45), USB 2.0 Device, USB 2.0 Host I/F
Scanner Specifications IconScanner Specifications
scanner resolutionFrom 100 to 600 dpi (1200 dpi for TWAIN)
scanning speed bw41 ipm
scanning speed full-color26 ipm
scan area main scan11.7" (297mm)
scan area sub scan17" (432mm)

Ricoh Aficio MP C2550

General Specifications IconGeneral Specifications
output speed25 ppm BW & Full-Color
warm-up time25 seconds
first copy time full-color9.5 seconds
copy resolution600 x 600 dpi
original capacity50 sheets
dimensions23.1" x 25.8" x 33.3" (587 x 655 x 845 mm)
weight220 lbs
power requirements120V, 60Hz, 12A
Printer Controller IconPrinter Controller
cpuRM7035C @ 533MHz
memory768 MB (512 MB + 256 MB) RAM (Standard); 1GB RAM (Maximum)
max. print speed25 ppm BW & Full-Color
max. print resolution1200 x 1200 dpi
standard interfaces10Base-T/100Base-TX Ethernet (RJ-45), USB 2.0 Device, USB 2.0 Host I/F
Scanner Specifications IconScanner Specifications
scanner resolutionFrom 100 to 600 dpi (1200 dpi for TWAIN)
scanning speed bw41 ipm
scanning speed full-color26 ipm
scan area main scan11.7" (297mm)
scan area sub scan17" (432mm)

Summary

Getting Started

Setting Up the Machine

Step-by-step guide to configuring the machine's security settings and administrator account.

Enhanced Security

Explains how to improve security through authentication and access limits.

Security Measures Provided by this Machine

Outlines the machine's security features like authentication and encryption.

Limiting and Controlling Access

Covers methods to restrict access to machine settings and stored data.

Administrators/Authentication and Its Application

Administrators

Details the roles and responsibilities of different administrator types.

About Administrator Authentication

Explains the concept and types of administrator authentication.

Enabling Administrator Authentication

Provides instructions on how to activate and configure administrator authentication.

Registering the Administrator

Step-by-step guide for setting up administrator accounts and privileges.

Users/Authentication and Its Application

About User Authentication

Explains the purpose of user authentication for preventing unauthorized access.

Enabling User Authentication

Guides on activating and configuring user authentication methods.

User Code Authentication

Details the method of limiting access based on user codes.

Basic Authentication

Explains using the Address Book for user authentication.

Protecting Document Data Information from Leaks

Preventing Unauthorized Copying

Details embedding patterns to discourage or prevent unauthorized copying of documents.

Data Security for Copying

Explains securing copying by embedding hidden text patterns.

Specifying Access Permission for Stored Files

Covers setting permissions for accessing stored scan files and Document Server files.

Specifying Passwords for Stored Files

Explains setting passwords for stored files for enhanced protection.

Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks

Preventing Data Leaks Due to Unauthorized Transmission

Details methods to prevent data leaks during transmission via network.

Using S/MIME to Protect Email Transmission

Explains using S/MIME for encrypted email transmission and electronic signatures.

Encrypting Data on the Hard Disk

Guides on encrypting data stored on the hard disk to prevent leakage.

Deleting Data on the Hard Disk

Covers methods for overwriting and erasing data from the hard disk.

Managing Access to the Machine

Preventing Modification of Machine Settings

How to prevent unauthorized changes to machine settings by users.

Menu Protect

Setting permission levels for users to change machine settings.

Limiting Available Functions

Specifying which machine functions are accessible to users.

Managing Log Files

Covers viewing, deleting, and transferring machine log files.

Enhanced Network Security

Preventing Unauthorized Access

Methods to limit network access by IP address, ports, or protocols.

Encrypting Transmitted Passwords

How to encrypt passwords for transmission to prevent them from being analyzed.

Protection Using Encryption

Explains establishing secure communication using SSL, SNMPv3, and IPsec.

Transmission Using IPsec

Details on configuring IPsec for secure data packet transmission.

Specifying the Extended Security Functions

Specifying the Extended Security Functions

Overview of extended security features and their configuration.

Driver Encryption Key

Encrypting passwords transmitted during user authentication via printer drivers.

Encrypt Address Book

Guides on encrypting data stored in the machine's Address Book.

Enhance File Protection

Locking files with passwords to prevent unauthorized access and guessing attacks.

Troubleshooting

Authentication Does Not Work Properly

Addresses issues where users cannot operate the machine due to authentication problems.

Machine Cannot Be Operated

Provides solutions for scenarios where the machine is unresponsive to users.

Appendix

Supervisor Operations

Details supervisor roles in managing administrator accounts and passwords.

Machine Administrator Settings

Lists all settings configurable by the machine administrator.

Network Administrator Settings

Lists all settings configurable by the network administrator.

File Administrator Settings

Lists all settings configurable by the file administrator.