EasyManua.ls Logo

Ricoh Pro C900 User Manual

Ricoh Pro C900
192 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
8
Getting Started
Authentication and its Application
Ensuring Information Security
Managing Access to the Machine
Enhanced Network Security
Specifying the Extended Security Functions
Troubleshooting
Appendix
1
2
3
4
5
6
7
Security Reference
Operating Instructions

Table of Contents

Other manuals for Ricoh Pro C900

Questions and Answers:

Ricoh Pro C900 Specifications

Power IconPower
power requirements240V, 24A
maximum power consumptionLess than 5, 500W
Printing Specifications IconPrinting Specifications
maximum print resolution1200 dpi
output speed90 pages-per-minute
warm-up timeLess than 420 seconds
Media Capacity and Size IconMedia Capacity and Size
maximum input capacity11, 000 sheets
maximum output capacity13, 000 sheets
media size (standard input trays)8.5" x 11" to 13" x 18"
Media Weight IconMedia Weight
media weight (tray 1)16 lb. Bond – 80 lb. Cover
media weight (tray 2)16 lb. Bond – 80 lb. Cover
media weight (RT5020 tray)16 lb. Bond – 110 lb. Cover
EFI Fiery Print Controller IconEFI Fiery Print Controller
cpuIntel Core Duo 2.16 GHz
memory2 GB
hard disk drive500 GB (250 GB x 2)
Weight and Dimensions IconWeight and Dimensions
dimensions49.2" x 43.3" x 56.7"
weight1, 543.2 lbs. (700 kg)

Summary

Getting Started

Before Using the Security Functions

Explains risks of damage from malicious activity if security settings are not made.

Setting Up the Machine

Details how to enable data encryption and configure the administrator account.

Authentication and its Application

Enabling Authentication

Guides on controlling access by enabling administrator or user authentication methods.

Administrator Authentication

Explains the procedures and settings for various administrator authentication methods.

User Authentication

Covers different user authentication methods and their specific configuration requirements.

Ensuring Information Security

Protecting the Address Book

Details methods to secure the address book by managing access permissions and encryption.

Deleting Data on the Hard Disk

Describes secure methods for erasing data from the machine's hard disk before disposal.

Managing Access to the Machine

Preventing Modification of Machine Settings

Explains how administrator types control user access to modify machine settings.

Enhanced Network Security

Preventing Unauthorized Access

Details methods to prevent unauthorized network access via IP limits, port control, and protocols.

Troubleshooting

Authentication Does Not Work Properly

Provides solutions for various error codes and causes related to authentication failures.

Related product manuals