EasyManua.ls Logo

Ricoh PRO C9100 User Manual

Ricoh PRO C9100
236 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Operating Instructions
Security Guide
For safe and correct use, be sure to read the Safety Information in Read This First before using the machine.

Table of Contents

Other manuals for Ricoh PRO C9100

Questions and Answers:

Ricoh PRO C9100 Specifications

General IconGeneral
DuplexYes
Print TechnologyLaser
Duplex PrintingYes
Network ConnectivityEthernet, USB, Wi-Fi (optional)
Operating Systems SupportedWindows, macOS, Linux
Print Resolution1200 x 4800 dpi
Paper Weight52 gsm
Supported Media SizesA3, A4, A5, SRA3
Supported Media TypesPlain paper, Coated paper, Recycled paper, Envelopes, Thick paper
Warm-up TimeLess than 3 minutes

Summary

Getting Started

Before Configuring the Security Function Settings

Precautions before configuring security settings, including vulnerability to attacks and secure location.

Before Using This Machine

Steps to encrypt data and configure administrator accounts for high security before machine use.

Administrators and Users

Administrator

Defines administrator roles (user, machine, network, file) and their primary function.

Supervisor

Defines the supervisor's role in specifying administrator passwords.

Configuring Administrator Authentication

Configuring Administrator Authentication

Explains administrator authentication using login names and passwords for settings access.

Roles of each administrator

Illustrates the roles and responsibilities of different administrator types.

Registering and Changing Administrators

Registering and Changing Administrators

Procedures for registering and modifying administrator accounts and their privileges.

Administrator Login Method

Logging in Using the Control Panel

Step-by-step guide for logging in using the machine's control panel.

Logging in Using Web Image Monitor

Steps for logging in to the machine via a web browser.

Supervisor

Supervisor

Explains the supervisor's role in managing administrator passwords and accounts.

Resetting the Administrator's Password

Steps for a supervisor to reset an administrator's password.

2. Configuring User Authentication

Users

Defines users and how they are managed for machine access and function usage.

About User Authentication

Explains user authentication as a system for verifying users via login name and password.

User Code Authentication

User Code Authentication

Authentication method for limiting access to functions using user codes.

Basic Authentication

Basic Authentication

Authentication method using the Address Book to authenticate each user.

Specifying Basic Authentication

Steps to configure basic authentication, linking it to administrator authentication.

Windows Authentication

Windows Authentication

Authentication using Windows domain controller for users with directory server accounts.

Specifying Windows Authentication

Steps to specify Windows authentication from the control panel.

LDAP Authentication

LDAP Authentication

Authentication using an LDAP server for users with accounts on the LDAP server.

3. Restricting Machine Usage

Preventing Changes to Administrator Settings

How to prevent unauthorized changes to administrator settings by users.

Limiting Available Functions

Specifies who can access machine functions, limiting use for registered users.

4. Preventing Leakage of Information from Machines

Protecting the Address Book

Methods to specify access permissions and encrypt data within the Address Book.

Encrypting Data in the Address Book

Steps to encrypt Address Book data using an encryption key.

Encrypting Data on the Machine

Encrypting Data on the Machine

How to encrypt data stored in NVRAM and on the hard disk using AES-256.

Backing Up the Encryption Key

How to back up the encryption key for data recovery purposes.

Deleting Data on the Machine

Deleting Data on the Machine

Methods to prevent data leakage by overwriting stored data.

Auto Erase Memory

Automatically erases data by overwriting when editing or deleting.

5. Enhanced Network Security

Access Control

Controls TCP/IP access by limiting IP addresses that can access the machine.

Enabling and Disabling Protocols

Specifies which protocols are available or disabled to prevent unauthorized network access.

Specifying Network Security Levels

Specifying Network Security Levels

Allows changing security levels to limit unauthorized access.

Specifying Network Security Levels Using the Control Panel

Steps to set network security levels via the control panel.

Protecting Communication Paths via a Device Certificate

Protecting Communication Paths via a Device Certificate

Protects communication paths and enables encrypted communications using SSL/TLS, IPsec, or IEEE 802.1X.

Creating and Installing a Device Certificate from the Control Panel (Self-Signed Certificate)

Steps to create and install a self-signed device certificate using the control panel.

Configuring SSL/TLS Settings

Configuring SSL/TLS Settings

Configures the machine to use SSL/TLS for encrypted communication to prevent tampering.

Enabling SSL/TLS

Steps to enable the SSL/TLS setting after installing a device certificate.

Configuring IPsec Settings

Configuring IPsec Settings

Supports IPsec for secure data packets at the IP protocol level with shared key encryption.

IPsec Settings

Details individual IPsec setting items configurable via Web Image Monitor.

Configuring IEEE 802.1X Authentication

Configuring IEEE 802.1X Authentication

IEEE 802.1X is an authentication standard using RADIUS servers.

Installing a Site Certificate

Steps to install a site certificate (root CA certificate) for verifying the authentication server.

6. Managing the Machine

Managing Log Files

Collects logs to track access data, user identities, machine usage, and error histories.

Using Web Image Monitor to Manage Log Files

How to specify log types, bulk delete, or download log files using Web Image Monitor.

Downloading Logs

Downloading Logs

Converts stored logs into CSV files for batch download.

Deleting All Logs

Deleting All Logs

Procedure to delete all stored logs from the machine.

Configuring the Home Screen for Individual Users

Configuring the Home Screen for Individual Users

Allows each user to customize their home screen for personalized display.

Configuring the Browser Settings

Precautions for Using the Browser Function

Recommendations for secure browser use, including site certificates and Site Certificate Check.

Troubleshooting

How to handle security problems or messages when accessing websites.

Managing Device Information

Managing Device Information

How device information can be managed by administrators via export/import.

Exporting Device Information

Steps to export device information to an SD card via the control panel.

Managing Eco-friendly Counter

Managing Eco-friendly Counter

Displays eco-friendly counter info at login, showing printing usage and resource savings.

Configuring Eco-friendly Counters

Sets up data collection period for the eco-friendly counter and administrator messages.

Managing the Address Book

Specifying Auto Deletion for Address Book Data

Configures automatic deletion of old user accounts when the Address Book reaches its limit.

Deleting All Data in the Address Book

Procedure to delete all data registered in the Address Book.

Specifying the Extended Security Functions

Specifying the Extended Security Functions

Enhances security through user authentication, access limits, and data encryption.

Restrict Display of User Information

Controls whether personal information is displayed in job history.

Restricting a Customer Engineer Operation

Restricting a Customer Engineer Operation

Restricts customer engineer access to service mode unless the administrator logs in.

Additional Information for Enhanced Security

Additional Information for Enhanced Security

Explains settings to enhance machine security.

Settings You Can Configure Using the Control Panel

Lists security settings configurable via the control panel.

7. Troubleshooting

If a Message is Displayed

How to deal with problems when messages appear during user authentication.

If an Error Code is Displayed

Provides solutions for common error codes displayed during authentication failures.

8. List of Operation Privileges for Settings

How to Read

Explains how to interpret headers, symbols, and tables in the privilege list.

System Settings

Lists operation privileges for general features within System Settings.

Web Image Monitor: Device Settings

Web Image Monitor: Device Settings

Details operation privileges for device settings within Web Image Monitor.

Web Image Monitor: Network

Web Image Monitor: Network

Details operation privileges for network settings within Web Image Monitor.

Web Image Monitor: Security

Web Image Monitor: Security

Details operation privileges for security settings within Web Image Monitor.

List of Operation Privileges for Address Books

List of Operation Privileges for Address Books

Details operation privileges for Address Book entries.

Related product manuals