EasyManua.ls Logo

Ricoh Aficio MP C3500 User Manual

Ricoh Aficio MP C3500
236 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Paper type: Wood Free 80g/m2, Paper Thickness=100 µm // Pages in book=232 // Print scale=81%
Gap (when printed at 81% scale) = Pages in book × Paper thickness / 2 = 11.600001 mm
Operating Instructions Security Reference
B2227900
Operating Instructions Security Reference
Operating Instructions
Security Reference
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
Getting Started
Authentication and its Application
Preventing Information Leaks
Managing Access to the Machine
Enhanced Network Security
Specifying the Extended Security Functions
Troubleshooting
Appendix
1
2
3
4
5
6
7
8
Printed in the Netherlands
GB GB B222-7900

Table of Contents

Other manuals for Ricoh Aficio MP C3500

Questions and Answers:

Ricoh Aficio MP C3500 Specifications

General IconGeneral
FunctionsPrint, Copy, Scan, Fax
Print TechnologyLaser
Print Speed (Black)35 ppm
Print Speed (Color)35 ppm
Copy Speed (Black)35 cpm
Copy Speed (Color)35 cpm
Copy Resolution600 x 600 dpi
Fax Transmission Speed3 seconds per page
Max Paper Size12" x 18"
Duplex PrintingYes
InterfaceEthernet 10/100Base-TX, USB 2.0
Power Source120V, 60Hz
TypeMultifunction
Zoom Range25% - 400%
Scan Resolution600 dpi
Scan Speed50 ipm
Memory (Maximum)1 GB
Hard Disk Drive40 GB
PDLPCL5c, PCL6, Adobe PostScript 3
Dimensions (W x D x H)26.4" x 26.7" x 29.1"
Operating System CompatibilityWindows, Mac OS, Linux
Print ResolutionUp to 1200 x 1200 dpi

Summary

Getting Started

Enhanced Security

Enhances machine security via user management and authentication.

Glossary

Defines key terms used throughout the manual.

Setting Up the Machine

Steps to configure the machine for higher security before initial use.

Security Measures Provided by this Machine

Details security features for managing access and preventing leaks.

Authentication and its Application

Administrators and Users

Explains roles of administrators and users in machine operation and security.

The Management Function

Describes the machine's authentication function for access limits and data protection.

About Administrator Authentication

Details four administrator types and their roles in machine security.

About User Authentication

Explains how user authentication prevents unauthorized access using login credentials.

Enabling Authentication

Steps to enable administrator and user authentication for controlling access.

Authentication Setting Procedure

Outlines the procedure for specifying administrator and user authentication methods.

Administrator Authentication

Details how administrators are authenticated and their privileges.

User Authentication

Explains various user authentication methods available on the machine.

If User Authentication is Specified

Describes machine operation when user authentication is set.

Preventing Information Leaks

Guarding Against Unauthorized Copying

Methods to discourage or prevent unauthorized copying using printer drivers.

Data Security for Copying

Enables printing documents with hidden text patterns to prevent unauthorized copying.

Printing Limitations

Lists limitations when using unauthorized copy prevention and data security.

Printing a Confidential Document

Utilizes the Locked Print function to store and retrieve confidential documents securely.

Choosing a Locked Print file

Specifies a Locked Print file using the printer driver for secure printing.

Deleting Locked Print Files

Procedure for deleting Locked Print files, requiring a password.

Changing Passwords of Locked Print Files

Allows file creators or administrators to change passwords for locked print files.

Unlocking Locked Print Files

Explains how to unlock files locked due to incorrect password attempts.

Specifying Access Permission for Stored Files

Defines who can access stored scan files and files in the Document Server.

Assigning Users and Access Permission for Stored Files

Specifies user access permissions for files stored in the Document Server.

Specifying Access Privileges for Files Stored using the Scanner and Fax Functions

Sets access privileges for files stored via scanner and fax functions.

Assigning the User and the Access Permission for the User’s Stored Files

Assigns access permissions to files stored by a particular user.

Specifying Passwords for the Stored Files

Sets passwords for stored files to enhance protection against unauthorized use.

Unlocking Files

Procedure to unlock files locked by "Enhance File Protection".

Preventing Data Leaks Due to Unauthorized Transmission

Limits destination entry to prevent data sent to unregistered locations.

Restrictions on Destinations

Disables direct entry of email/phone numbers for scanner and fax functions.

Protecting the Address Book

Protects address book data from unauthorized reading by encrypting it.

Address Book Access Permission

Specifies who can access data within the address book.

Encrypting the Data in the Address Book

Encrypts the data stored in the machine's address book for security.

Deleting Data on the Hard Disk

Discusses methods for erasing data from the machine's hard disk.

Overwriting the Data on the Hard Disk

Overwrites all hard disk data to prevent leakage before disposal.

Managing Access to the Machine

Preventing Modification of Machine Settings

Controls which machine settings users can modify based on administrator type.

Menu Protect

Limits users' access permission to machine settings and menus.

Limiting Available Functions

Specifies which functions users are allowed to access to prevent unauthorized operation.

Specifying Which Functions are Available

Sets available functions for registered users to limit their access.

Managing Log Files

Improves data security by deleting log files and checking history data.

Specifying Delete All Logs

Deletes all log information stored on the machine.

Transfer Log Setting

Configures log file transfer to a server for history checking.

Enhanced Network Security

Preventing Unauthorized Access

Limits IP addresses, disables ports/protocols to prevent network access.

Enabling/Disabling Protocols

Specifies which protocols are enabled or disabled for network access.

Access Control

Controls TCP/IP access by limiting IP addresses from which access is possible.

Specifying Network Security Level

Sets the security level to limit unauthorized access over the network.

Encrypting Transmitted Passwords

Encrypts passwords for transmission to prevent them from being revealed.

Driver Encryption Key

Specifies the driver encryption key to encrypt login passwords for user authentication.

Group Passwords for PDF Files

Allows specifying a group password for PDF files to enhance security.

Password for IPP Authentication

Encrypts the IPP authentication password for transmission.

Protection Using Encryption

Establishes encrypted communication using SSL or SNMPv3 to protect data.

SSL (Secure Sockets Layer)

Details the process of establishing encrypted communication using SSL.

User Settings for SSL (Secure Sockets Layer)

Explains installing SSL certificates on user computers for secure access.

Setting the SSL / TLS Encryption Mode

Changes the security level by specifying the SSL/TLS encrypted communication mode.

SNMPv3 Encryption

Encrypts transmitted data when using SmartDeviceMonitor for Admin.

Specifying the Extended Security Functions

Changing the Extended Security Functions

Outlines how to specify and change the machine's extended security functions.

Settings

Covers various extended security settings like encryption and access restrictions.

Other Security Functions

Explains settings for preventing information leaks and restricting functions.

Limiting Machine Operation to Customers Only

Restricts machine operation to authorized personnel or specific modes.

Troubleshooting

Authentication Does Not Work Properly

Addresses issues where users cannot operate the machine due to authentication problems.

A Message Appears

Explains common messages appearing during user authentication and their solutions.

Machine Cannot Be Operated

Provides instructions for dealing with conditions where the machine cannot be operated.

Appendix

Operations by the Supervisor

Details how a supervisor can manage administrator passwords and accounts.

Machine Administrator Settings

Lists all settings that can be specified by the machine administrator.

Network Administrator Settings

Outlines settings that can be specified by the network administrator.

File Administrator Settings

Lists settings that can be specified by the file administrator.

User Administrator Settings

Lists settings that can be specified by the user administrator.

Document Server File Permissions

Defines authorities for using files stored in the Document Server.

The Privilege for User Account Settings in the Address Book

Outlines user privileges for account settings within the address book.

Functions That Require Options

Lists functions requiring specific options or additional units for operation.

Related product manuals