EasyManua.ls Logo

Ricoh Aficio MP C2550 User Manual

Ricoh Aficio MP C2550
328 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
9
7
8
10
Getting Started
Administrators/Authentication and its Application
Users/Authentication and its Application
Protecting Document Data Information from Leaks
Protecting Information Transmitted Through the Network or
Stored on the Hard Disk from Leaks
Managing Access to the Machine
Enhanced Network Security
Specifying the Extended Security Functions
Troubleshooting
Appendix
1
2
3
4
5
6
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
Security Reference
Operating Instructions

Table of Contents

Questions and Answers:

Ricoh Aficio MP C2550 Specifications

General IconGeneral
Print TechnologyLaser
FunctionsPrint, Copy, Scan, Fax
Print Speed (Color)25 ppm
Print Speed (Monochrome)25 ppm
Print Resolution600 x 600 dpi
Maximum Print Resolution2400 x 600 dpi
Duplex PrintingYes
Copy Speed (Color)25 cpm
Copy Speed (Monochrome)25 cpm
Copy Resolution600 x 600 dpi
Memory (Maximum)1 GB
Hard Disk Drive (Optional)80 GB
InterfaceUSB 2.0, Ethernet 10/100Base-TX
Fax Transmission Speed33.6 Kbps
Maximum Paper SizeA3
Scan Resolution600 dpi
Zoom Range25% - 400%
Paper SizeA4, A5, B5
Paper Weight52 - 256 g/m²
PDLPCL 6, PostScript 3
Network ConnectivityEthernet
Operating System CompatibilityWindows, Mac OS

Summary

1 Getting Started

Before Using the Security Functions

Essential precautions and preparation steps before configuring security features.

Setting Up the Machine

Steps to configure the machine for enhanced security, including encryption and administrator accounts.

Enhanced Security

How to improve machine security using authentication and access control functions.

Security Measures Provided by this Machine

Overview of security features like authentication, access limits, and data encryption.

2 Administrators/Authentication and Its Application

Administrators

Details on different administrator roles (User, Machine, Network, File) and their responsibilities.

User Administrator

Specific role of the user administrator in managing Address Book information and user accounts.

Machine Administrator

Role of the machine administrator in managing default settings and machine security.

Network Administrator

Role of the network administrator in managing network settings and security.

File Administrator

Role of the file administrator in managing access permissions for stored files.

Supervisor

Role of the supervisor in managing administrator passwords and providing support.

About Administrator Authentication

Explanation of how administrators are authenticated using login credentials.

Enabling Administrator Authentication

Procedure to enable administrator authentication for controlling access and settings.

Specifying Administrator Privileges

How to assign specific privileges to administrators for managing machine settings.

3 Users/Authentication and Its Application

Users

Describes users' roles and how their access is managed by administrators.

About User Authentication

Explains the user authentication function for preventing unauthorized access using login credentials.

Authentication Setting Procedure

Guide to specifying administrator and user authentication methods, including external devices.

Enabling User Authentication

Steps to enable user authentication methods like User Code, Basic, Windows, LDAP, and Integration Server.

User Code Authentication

Method to limit access to functions based on a user code.

Basic Authentication

Authentication method using the Address Book to authenticate users and manage access.

Windows Authentication

Authentication using Windows domain controller for users with directory server accounts.

LDAP Authentication

Authentication using an LDAP server for users with accounts on that server.

Integration Server Authentication

Authentication using a server with ScanRouter software for centralized user authentication.

4 Protecting Document Data Information from Leaks

Preventing Unauthorized Copying

Embedding patterns in printed documents to discourage or prevent unauthorized copying.

Data Security for Copying

Embedding hidden text to prevent document information leaks by graying out copies.

Printing a Confidential Document

Using the Locked Print function to store and print confidential documents securely.

Specifying Access Permission for Stored Files

Defining access permissions (Read-only, Edit, etc.) for files stored in the Document Server.

Assigning Users and Access Permission for Stored Files

Specifying which users or groups have access to specific stored files.

Specifying Passwords for Stored Files

Setting passwords for stored files to enhance protection against unauthorized use.

Unlocking Files

How to unlock files that have been locked by the "Enhance File Protection" feature.

5 Protecting Information Transmitted Through the Network or Stored on the Hard Disk from Leaks

Preventing Data Leaks Due to Unauthorized Transmission

Measures to prevent data leaks during transmission, including restricting destinations.

Restrictions on Destinations

Limiting destinations for faxes and emails to registered entries in the Address Book.

Using S/MIME to Protect Email Transmission

Using S/MIME for encrypted email transmission and sender verification with digital signatures.

E-mail Encryption

Steps to encrypt email messages using S/MIME and user certificates.

Protecting the Address Book

Securing Address Book data through access permissions and encryption.

Encrypting Data in the Address Book

Enabling the encryption of Address Book data for enhanced security.

Encrypting Data on the Hard Disk

Encrypting data stored on the hard disk to prevent information leakage.

Enabling the Encryption Settings

Procedure to enable data encryption settings for the hard disk.

Printing the Encryption Key

How to print the encryption key for backup and recovery purposes.

Updating the Encryption Key

Procedure to update or change the encryption key for data on the hard disk.

Canceling Data Encryption

How to disable data encryption settings.

Deleting Data on the Hard Disk

Overwriting and erasing data from the hard disk for secure disposal.

Using Auto Erase Memory

Automatically erasing temporary data from the hard disk.

Erase All Memory

Erasing all data on the hard disk, including settings and user data.

6 Managing Access to the Machine

Preventing Modification of Machine Settings

Restricting changes to machine settings by users, controlled by administrator types.

Menu Protect

Limiting user access to machine settings menus and functions based on protection levels.

Set up Menu Protect

Configuring menu protection levels ([Off], [Level 1], [Level 2]) for users.

Limiting Available Functions

Specifying which functions are accessible to registered users.

Managing Log Files

Overview of job and access logs for monitoring machine usage and security events.

7 Enhanced Network Security

Preventing Unauthorized Access

Limiting network access by IP address, ports, or protocols to prevent unauthorized entry.

Enabling/Disabling Protocols

Enabling or disabling network protocols (IPv4, IPv6, IPsec, FTP, etc.) to enhance security.

Access Control

Configuring IP address ranges to control access to the machine over the network.

Specifying Network Security Level

Setting the overall network security level ([Level 0], [Level 1], [Level 2]) to protect confidential information.

Encrypting Transmitted Passwords

Encrypting passwords for transmission to prevent them from being analyzed.

Protection Using Encryption

Establishing encrypted communication using SSL, SNMPv3, and IPsec.

SSL (Secure Sockets Layer) Encryption

Protecting communication paths and establishing encrypted connections using SSL certificates.

SNMPv3 Encryption

Encrypting transmitted data using SNMPv3 for protection against tampering.

Transmission Using IPsec

Securing data packets using IPsec for secure communication.

8 Specifying the Extended Security Functions

Specifying the Extended Security Functions

Overview of extended security features for enhancing machine security beyond basic functions.

Restrict Adding of User Destinations

Preventing users from directly adding destinations for fax/scanner transmissions.

Enhance File Protection

Locking files and making them inaccessible after multiple incorrect password attempts.

Service Mode Lock

Locking service mode to prevent unauthorized access for inspection or repair.

9 Troubleshooting

Authentication Does Not Work Properly

Solutions for issues related to user authentication failures and error messages.

An Error Code Appears

Lists error codes related to authentication failures, their causes, and resolution steps.

Machine Cannot Be Operated

Solutions for scenarios where the machine cannot be operated due to authentication or other issues.

10 Appendix

Supervisor Operations

How supervisors can manage administrator passwords and accounts.

Machine Administrator Settings

Details of settings configurable by the machine administrator.

Network Administrator Settings

Configuration options available to the network administrator.

File Administrator Settings

Settings configurable by the file administrator.

User Administrator Settings

Settings configurable by the user administrator.

Document Server File Permissions

Defines authorities for accessing and managing files stored in the Document Server.

The Privilege for User Account Settings in the Address Book

Details the privileges for user account settings within the Address Book.

Copier / Document Server Features

Settings related to copier and document server features, controllable via menu protect levels.

Printer Features

Details of printer features and their accessibility based on menu protect levels.

Scanner Features

Settings related to scanner functions and their availability based on menu protect levels.

Facsimile Features

Settings related to facsimile features, controllable via menu protect levels.

System Settings

Overview of system settings and their availability based on user authorization and available functions.

Interface Settings

Configuration of network interface settings like Ethernet, Bluetooth, and Wireless LAN.

Network

Network configuration settings including IPv4, IPv6, NetWare, AppleTalk, SMB, Bonjour, and Security configurations.

User Authentication Management

Settings for various user authentication methods (User Code, Basic, Windows, LDAP, Integration Server).

LDAP Server

Settings related to configuring and managing the LDAP server.

Printer

Details of printer settings and their availability based on menu protect levels.

Scanner

Settings related to scanner functions and their availability based on menu protect levels.

Fax

Settings related to fax functions and their availability based on menu protect levels.

Interface

Configuration of interface settings like Ethernet, Bluetooth, and Wireless LAN.

Functions That Require Options

Lists functions that require additional hardware options or software units.

Trademarks

List of registered trademarks and product names mentioned in the manual.

Related product manuals