EasyManua.ls Logo

Ricoh SP 4520DN - Page 150

Ricoh SP 4520DN
955 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Setting Security Method of Wireless LAN................................................................................................... 144
Setting a WEP Key....................................................................................................................................
144
Setting WPA...............................................................................................................................................145
Configuring IEEE 802.1X Authentication.....................................................................................................147
Installing a Site Certificate........................................................................................................................ 147
Selecting the Device Certificate............................................................................................................... 148
Setting Items of IEEE 802.1X for Ethernet................................................................................................148
Setting Items of IEEE 802.1X for Wireless LAN......................................................................................150
SNMPv3 Encryption......................................................................................................................................152
Encrypting Transmitted Passwords............................................................................................................... 153
Specifying a Driver Encryption Key......................................................................................................... 153
Specifying an IPP Authentication Password............................................................................................ 154
Kerberos Authentication Encryption Setting................................................................................................ 156
6. Preventing the Leaking of Documents
Managing Stored Files..................................................................................................................................157
Configuring Access Permission for Each Stored Print File......................................................................
157
Changing the Owner of a Stored Print File............................................................................................. 158
Changing the Password of a Locked/Stored Print File...............................................................................159
Changing the Password of a Locked Print File........................................................................................159
Unlocking a Locked Print File....................................................................................................................160
Deleting Locked/Stored Print Files...............................................................................................................163
Unauthorized Copy Prevention / Data Security for Copying................................................................... 165
Enabling Pattern Printing...........................................................................................................................165
Printing User Information on Paper...............................................................................................................168
Enforced Storage of Documents to be Printed on a Printer........................................................................ 170
7. Managing the Printer
Managing Log Files.......................................................................................................................................171
Using Web Image Monitor to Manage Log Files.......................................................................................
172
Logs That Can Be Managed Using Web Image Monitor......................................................................172
Attributes of Logs You Can Download.................................................................................................... 176
Specifying Log Collect Settings................................................................................................................ 195
Specifying Log Encryption........................................................................................................................ 196
Downloading Logs.................................................................................................................................... 197
4

Table of Contents

Related product manuals