Savin LD330 Especificações

Consulte online ou descarregue Especificações para Impressora multifunções Savin LD330. Savin LD330 Specifications Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 92
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
Print Controller Design Guide for Information Security
Copyright
2010 RICOH Americas Corporation. All rights reserved. Page 1 of 92
Visit our Knowledgebase at:
http://www.ricoh-usa.com/support/knowledgebase.asp
07/27/2010
Print Controller Design Guide for
Information Security 06A
Version 1.00
Gestetner Lanier Savin Ricoh
DSm416
DSm416f
DSm416pf
LD016
LD016f
LD016spf
816
816f
816mf
MP161
MP161f
MP161spf
DSm715
DSm716
DSm721d
DSm716s
DSm721ds
LD315
LD316
LD320d
LD316L
LD320Ld
9016
9021d
9016s
9021ds
MP1500
MP1600
MP2000
MP1600L
MP2000L
DSm625 LD125 7025 MP2500
DSm725e
DSm730e
LD325
LD330
8025e
8030e
MP2510
MP3010
DSm735e
DSm745e
LD335
LD345
8035e
8045e
MP3500
MP4500
GWD2004
GWD2006
LW324
LW336
2404WD
2406WD
MPW2400
MPW3600
Vista de página 0
1 2 3 4 5 6 ... 91 92

Resumo do Conteúdo

Página 1 - Version 1.00

Print Controller Design Guide for Information Security Copyright  2010 RICOH Americas Corporation. All rights reserved. Page 1 of 92 Visit ou

Página 2 - Page 2 of 92

Print Controller Design Guide for Information Security: Page 10 of 92 Principal Machine Functions Copier Activates the scanning engine, which read

Página 3 - TABLE OF CONTENTS

Print Controller Design Guide for Information Security: Page 11 of 92 3. Data Security External I/F The MFP/LP is equipped with the following inter

Página 4 - Applicable Products

Print Controller Design Guide for Information Security: Page 12 of 92 4. Communication between the MFP/LP and its peripherals is conducted via the

Página 5 -  Note:

Print Controller Design Guide for Information Security: Page 13 of 92 9. The USB I/F (Type A) only allows connection with devices that support eith

Página 6 - 2-1 Hardware Configuration

Print Controller Design Guide for Information Security: Page 14 of 92 • This use of a public key to decrypt the digital signature allows the MFP/LP

Página 7 - Page 7 of 92

Print Controller Design Guide for Information Security: Page 15 of 92 Remote Firmware Installation • In addition to using an SD card, it is also pos

Página 8 - 2-2 Software Configuration

Print Controller Design Guide for Information Security: Page 16 of 92 RC-GateInstallationvia RC-GateRicoh Licenese ServerDownloadDigital signaturePr

Página 9 - Page 9 of 92

Print Controller Design Guide for Information Security: Page 17 of 92 5. Authentication, Access Control Authentication • When enabled, User Auth

Página 10 - Page 10 of 92

Print Controller Design Guide for Information Security: Page 18 of 92 • Before authentication at the MFP/LP operation panel can be perform

Página 11 - 3. Data Security

Print Controller Design Guide for Information Security: Page 19 of 92 LAN PCWindows ServerJob + Auth. Info.Integration ServerAuthenticationLDAP Serve

Página 12 - Page 12 of 92

Print Controller Design Guide for Information Security: Page 2 of 92 Notice: THIS DOCUMENT MAY NOT BE REPRODUCED OR DISTRIBUTED IN WHOLE OR IN PART,

Página 13 - 4. Firmware Update

Print Controller Design Guide for Information Security: Page 20 of 92 • IC Authentication using the serial number/IDm (Felica cards or those contai

Página 14

Print Controller Design Guide for Information Security: Page 21 of 92 • On MFP/LPs with email transmission applications, to prevent the impersonati

Página 15 - (from a client PC)

Print Controller Design Guide for Information Security: Page 22 of 92 6. Administrator Settings In order to spread the risk of malicious operations

Página 16 - (performed by the end user)

Print Controller Design Guide for Information Security: Page 23 of 92 7. Data Erase/Overwrite Overview • A wide variety of data is stored in MFP/LP

Página 17 - Page 17 of 92

Print Controller Design Guide for Information Security: Page 24 of 92 Auto Erase Memory • The main purpose of this feature is to automatically overw

Página 18 - Authentication information

Print Controller Design Guide for Information Security: Page 25 of 92 8. Data Protection Protection of Address Book Data • The tables below show t

Página 19

Print Controller Design Guide for Information Security: Page 26 of 92 View Make Changes Delete Entries Change ACL Settings R View Yes RW

Página 20 - Page 20 of 92

Print Controller Design Guide for Information Security: Page 27 of 92 General Users Document Owner (User) Document Administrator Document No

Página 21 - Page 21 of 92

Print Controller Design Guide for Information Security: Page 28 of 92 9. Additional Methods for Increased Security In addition to the above, adminis

Página 22 - 6. Administrator Settings

Print Controller Design Guide for Information Security: Page 29 of 92 10. Job/Access Logs • Job logs and access logs for the principal machine fun

Página 23 - 7. Data Erase/Overwrite

Print Controller Design Guide for Information Security: Page 3 of 92 TABLE OF CONTENTS 1. Overview ...

Página 24 - Page 24 of 92

Print Controller Design Guide for Information Security: Page 30 of 92 • The MFP/LP does not allow any changes to be made to the log data itself, i.

Página 25 - 8. Data Protection

Print Controller Design Guide for Information Security: Page 31 of 92  Access log Capacity: With HDD: 6000 entries Without HDD: 500 entries Tim

Página 26 - Page 26 of 92

Print Controller Design Guide for Information Security: Page 32 of 92 11. Capture (MFP Models Only) Overview of Capture Operations • When a user ma

Página 27 - Page 27 of 92

Print Controller Design Guide for Information Security: Page 33 of 92 Operations that Generate Captured Images • Images are captured and sent to Sc

Página 28 - Page 28 of 92

Print Controller Design Guide for Information Security: Page 34 of 92 Capture Settings • ScanRouter is used to program all settings for the Capture

Página 29 - 10. Job/Access Logs

Print Controller Design Guide for Information Security: Page 35 of 92 Security Considerations • Three transfer protocols are available for sending

Página 30 - Page 30 of 92

Print Controller Design Guide for Information Security: Page 36 of 92 12. Principal Machine Functions Copier (MFP Models Only) Overview of Copier Op

Página 31 - Page 31 of 92

Print Controller Design Guide for Information Security: Page 37 of 92 Data Security Considerations • Since the page location data is erased at the

Página 32 - Page 32 of 92

Print Controller Design Guide for Information Security: Page 38 of 92 Restricting the Available Functions for Each Individual User • When User Auth

Página 33 - Page 33 of 92

Print Controller Design Guide for Information Security: Page 39 of 92 Print Backup • After a job is performed, it is possible to store a copy of th

Página 34 - Page 34 of 92

Print Controller Design Guide for Information Security: Page 4 of 92 1. Overview This document describes the structural layout and functional opera

Página 35 - Page 35 of 92

Print Controller Design Guide for Information Security: Page 40 of 92 13. Printer Overview of Printer Operations • The Printer function can be div

Página 36 - Page 36 of 92

Print Controller Design Guide for Information Security: Page 41 of 92 • From the printer driver, it is possible to select the following printing me

Página 37 - Page 37 of 92

Print Controller Design Guide for Information Security: Page 42 of 92 • When Normal Print is selected as the print job, the print management data*1

Página 38 - Page 38 of 92

Print Controller Design Guide for Information Security: Page 43 of 92 Printing Encrypted Image Data • With PDF Direct Print, it is possible to prin

Página 39 - Page 39 of 92

Print Controller Design Guide for Information Security: Page 44 of 92 • The password necessary for authentication is encrypted before the printer d

Página 40 - 13. Printer

Print Controller Design Guide for Information Security: Page 45 of 92 • It is possible to make a Stored Print or Store and Print document available

Página 41 - Page 41 of 92

Print Controller Design Guide for Information Security: Page 46 of 92 • As stated above, the PDF interpreter cross-references the password programm

Página 42 - Page 42 of 92

Print Controller Design Guide for Information Security: Page 47 of 92 14. Scanner (MFP Models Only) Overview of Scanner Operations • Depending on t

Página 43 - Page 43 of 92

Print Controller Design Guide for Information Security: Page 48 of 92 • When sending an email from the MFP via the SMTP server, the operator can ei

Página 44 - Page 44 of 92

Print Controller Design Guide for Information Security: Page 49 of 92 Protection of Data when Performing Scanning and Sending Operations It is possi

Página 45 - Page 45 of 92

Print Controller Design Guide for Information Security: Page 5 of 92 Note: Some of the hardware (e.g. external I/F) and functions described in this

Página 46 - Page 46 of 92

Print Controller Design Guide for Information Security: Page 50 of 92 • By enabling Basic Authentication, it is possible to protect the destination

Página 47 - Page 47 of 92

Print Controller Design Guide for Information Security: Page 51 of 92 • It is also possible to assign a password to individual documents when scann

Página 48 - Page 48 of 92

Print Controller Design Guide for Information Security: Page 52 of 92 • As explained above, the email forwarding feature sends data from the MFP to

Página 49 - Page 49 of 92

Print Controller Design Guide for Information Security: Page 53 of 92 15. FAX (MFP Models Only) Overview of FAX operations • The FAX function se

Página 50 - Page 50 of 92

Print Controller Design Guide for Information Security: Page 54 of 92 • With FAX reception, the incoming data is received by the FCU, which then se

Página 51 - Page 51 of 92

Print Controller Design Guide for Information Security: Page 55 of 92 Data Security Considerations • The FCU supports only G3 and G4 FAX protocols.

Página 52 - Page 52 of 92

Print Controller Design Guide for Information Security: Page 56 of 92 • When User Authentication is enabled, it is possible to set the authenticate

Página 53 - 15. FAX (MFP Models Only)

Print Controller Design Guide for Information Security: Page 57 of 92 Protection of FAX Transmission Operations • By setting restrictions on addres

Página 54 - Page 54 of 92

Print Controller Design Guide for Information Security: Page 58 of 92 Extended Security Feature • It is possible to set Extended Security to prohib

Página 55 - Page 55 of 92

Print Controller Design Guide for Information Security: Page 59 of 92 16. NetFile (GWWS) Overview of NetFile Operations • NetFile operates via comm

Página 56 - Page 56 of 92

Print Controller Design Guide for Information Security: Page 6 of 92 2. Internal System Configuration 2-1 Hardware Configuration MFP Processing an

Página 57 - Page 57 of 92

Print Controller Design Guide for Information Security: Page 60 of 92 Transferring Job Log and Access Log Data to Web SmartDeviceMonitor for Admin •

Página 58 - Page 58 of 92

Print Controller Design Guide for Information Security: Page 61 of 92 Creating Thumbnails (MFP models only) • The MFP creates thumbnail images in J

Página 59 - 16. NetFile (GWWS)

Print Controller Design Guide for Information Security: Page 62 of 92 Downloading Document Server Files to the PC (MFP models only) • From DeskTop

Página 60 - Page 60 of 92

Print Controller Design Guide for Information Security: Page 63 of 92 Forwarding Image Data with Capture • With the Capture feature, the primary ma

Página 61 - Page 61 of 92

Print Controller Design Guide for Information Security: Page 64 of 92 Viewing and Changing User Data Settings Stored in the MFP/LP • From SmartDev

Página 62 - Page 62 of 92

Print Controller Design Guide for Information Security: Page 65 of 92 Transferring the Job Log and Access Log Data • To send log data from the MFP/

Página 63 - Page 63 of 92

Print Controller Design Guide for Information Security: Page 66 of 92  User Authentication Tickets (MFP models only) When using User Authenticatio

Página 64 - Page 64 of 92

Print Controller Design Guide for Information Security: Page 67 of 92 17. Data Security Considerations SOAP Communication Sessions • SOAP communic

Página 65 - Page 65 of 92

Print Controller Design Guide for Information Security: Page 68 of 92 Restoring Files Back to the MFP (MFP models only) • Netfile will reject any da

Página 66 - Page 66 of 92

Print Controller Design Guide for Information Security: Page 69 of 92 Deleting, Pausing or Resuming Print Jobs • To delete the current job or all a

Página 67 - Page 67 of 92

Print Controller Design Guide for Information Security: Page 7 of 92 LP Processing andControl Unit - CPU - RAMNVRAM ・Settings ・CountersI/O Controll

Página 68 - Page 68 of 92

Print Controller Design Guide for Information Security: Page 70 of 92 18. Web Applications Web Server Framework The MFP/LP Web Server was developed

Página 69 - Page 69 of 92

Print Controller Design Guide for Information Security: Page 71 of 92 Protection Against URL Buffer Overflows • URL buffer overflow attacks occur w

Página 70 - 18. Web Applications

Print Controller Design Guide for Information Security: Page 72 of 92 19. WebDocBox (MFP models only) Overview of WebDocBox Operations • WebDocBox

Página 71 - Page 71 of 92

Print Controller Design Guide for Information Security: Page 73 of 92 Sending Stored Image Data to the PC • When the MFP receives a request from

Página 72 - Page 72 of 92

Print Controller Design Guide for Information Security: Page 74 of 92 • It is possible to protect individual Document Server documents with a pass

Página 73 - Page 73 of 92

Print Controller Design Guide for Information Security: Page 75 of 92 20. Optional Features @Remote Overview of @Remote Operations • “@Remote” ref

Página 74 - Page 74 of 92

Print Controller Design Guide for Information Security: Page 76 of 92 The NCS module communicates with RC Gate via the host I/F over an SSL connecti

Página 75 - 20. Optional Features

Print Controller Design Guide for Information Security: Page 77 of 92 The NCS module communicates with the @Remote Center via the host I/F over an S

Página 76 - Page 76 of 92

Print Controller Design Guide for Information Security: Page 78 of 92 • The internal layout of the modules is such that the NRS module must always

Página 77 - Page 77 of 92

Print Controller Design Guide for Information Security: Page 79 of 92 21. CSS (Customer Support System) – MFP Models Only Overview of CSS Operations

Página 78 - Page 78 of 92

Print Controller Design Guide for Information Security: Page 8 of 92 2-2 Software Configuration SIMHNetBSD=-=-=-=-=-=-=-=-=-= Engine I/F =-=-=-=-=-

Página 79 - Page 79 of 92

Print Controller Design Guide for Information Security: Page 80 of 92 22. Copy Data Security Feature Overview of Copy Data Security Operations • Th

Página 80 - Page 80 of 92

Print Controller Design Guide for Information Security: Page 81 of 92 Data Flow Marking: • The data flow for when the Copy Data Security f

Página 81

Print Controller Design Guide for Information Security: Page 82 of 92 Other Conditions of Use On some MFP models, one or more of the following limit

Página 82 - Page 82 of 92

Print Controller Design Guide for Information Security: Page 83 of 92 23. Device SDK Applications (DSDK) Overview of Operations • DSDK applications

Página 83 - Page 83 of 92

Print Controller Design Guide for Information Security: Page 84 of 92 Installation • DSDK applications are installed via Type 1 or Type 2 SD cards i

Página 84 - Page 84 of 92

Print Controller Design Guide for Information Security: Page 85 of 92 Overview of SDK Application Functions • As mentioned above, Vendors can creat

Página 85 - SDK Application

Print Controller Design Guide for Information Security: Page 86 of 92 Data Flow Scanning Functions: Sending Data over the Network with the Copier and

Página 86 - Page 86 of 92

Print Controller Design Guide for Information Security: Page 87 of 92 Network Functions • As mentioned above, a Type 1 SDK application is able to p

Página 87 - Page 87 of 92

Print Controller Design Guide for Information Security: Page 88 of 92 24. Data Security Considerations Preventing the Installation of Illegal Applic

Página 88 - Page 88 of 92

Print Controller Design Guide for Information Security: Page 89 of 92 SDK Authentication (Types 1 and 2) • Once the development of the SDK applicat

Página 89 - Page 89 of 92

Print Controller Design Guide for Information Security: Page 9 of 92 FCS (FAX Control Service) Exchanges data and commands with the FCU (FAX

Página 90 - Page 90 of 92

Print Controller Design Guide for Information Security: Page 90 of 92 • As a general rule, Ricoh assigns relatively restricted access privileges to

Página 91 - Page 91 of 92

Print Controller Design Guide for Information Security: Page 91 of 92 Protection Against Attacks on Principal MFP/LP Functions, Prevention of Damage

Página 92 - Page 92 of 92

Print Controller Design Guide for Information Security: Page 92 of 92 Certification of the SDK Application • Having completed the development of th

Comentários a estes Manuais

Sem comentários