Download Print this page
Ricoh Metis MF4 User Manual
Ricoh Metis MF4 User Manual

Ricoh Metis MF4 User Manual

Hide thumbs Also See for Metis MF4:

Advertisement

Quick Links

Enter the keyword(s) you search
Top Page
User Guide
IM
C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A/C4510/C4510A/C5510/C5510A/C
6010
Page Top
Copyright © 2023
D0E37529-EN 2023/2

Advertisement

loading

Summary of Contents for Ricoh Metis MF4

  • Page 1 Enter the keyword(s) you search Top Page User Guide C2010/C2010A/C2510/C2510A/C3010/C3010A/C3510/C3510A/C4510/C4510A/C5510/C5510A/C 6010 Page Top Copyright © 2023 D0E37529-EN 2023/2...
  • Page 2 Enter the keyword(s) you search Top Page > Troubleshooting > Getting Started > Checking the Indicators, Icons, and Messages on the Control Panel Alert Sounds When the Machine Cannot Be Operated Checking the Indicators, Icons, and Messages on the Control Panel The machine notifies you of the machine condition or status of an application with the [Check Status] indicator or a message displayed on the control panel.
  • Page 3 Paper is jammed. See the animated illustration displayed on the control panel, and remove the jammed paper. When Paper or an Original Is Jammed An original has jammed. See the animated illustration displayed on the control panel, and remove the jammed original.
  • Page 4 For the names and the contact information of consumables, check [Settings] [Inquiry]. Press [Home] ( ) after completing the operation to close [Settings]. Contact Information Section Top When the [Check Status] Indicator is lit or flashing The [Check Status] indicator notifies the user when the machine requires immediate attention. Flashing in red The machine is unavailable for use.
  • Page 5 1. Press [Check Status]. 2. Press [Check] to check the details, and perform the required procedure. When an Icon is Displayed with a Message : The machine cannot be used. : Some of the functions cannot be used, or the toner is almost depleted. Depending on the machine condition, such as a paper jam or open cover, the status confirmation screen may be displayed automatically without pressing [Check Status].
  • Page 6 Enter the keyword(s) you search Top Page > Settings > Managing Devices > Collecting Logs Confirming Log Files Specifying Menu Protect Collecting Logs You can collect logs stored in the machine to check the usage of the machine's various functions, error histories, and detailed access data to the machine.
  • Page 7 Main power ON and OFF Transitions in power status Job run times or time interval between jobs Paper consumption per hour Power consumption of the machine Section Top Specifying Logs to Collect Specify the types and items of logs to collect. Specifying logs to collect using the control panel...
  • Page 8 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 9 1. Log in to the machine as the machine administrator from Web Image Monitor. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 10 6. Click [OK]. 7. "Updating..." appears. Wait for about one or two minutes, and then click [OK]. If nothing appears on the screen after you click [OK], wait for a while, and then refresh the web browser screen. 8. Log out of the machine, and then exit the Web browser. When you changed Active/Inactive of Log Collect, delete all logs.
  • Page 11 Scanner: Storing Scanner: Storing Details of scan files stored in the Document Server. Scanner: Stored File Scanner: Stored File Details of scan files stored in the Document Server Downloading Downloading and downloaded using Web Image Monitor. Scanner: Stored File Scanner: Stored File Details of the stored scan files that were also sent.
  • Page 12 Printer: Hold Print File Printer: Hold Print File When a document is held for printing and stored Printing Printing temporarily on the machine, this records the time a user specified for the document to be printed from the control panel or Web Image Monitor. Report Printing Report Printing Details of reports printed from the control panel.
  • Page 13 File Storing File Storing Details of files stored in the Document Server. Stored File Deletion Stored File Deletion Details of files deleted from the Document Server. All Stored Files All Stored Files Details of deletions of all Document Server files. Deletion Deletion Internal Storage Format...
  • Page 14 Firmware: Invalid Firmware: Invalid Details of checks for firmware validity made at times such as when the machine was switched on. Date/Time Change Date/Time Change Details of changes made to date and time settings. File Access Privilege File Access Privilege Log for changing the access privilege to the stored Change Change...
  • Page 15 Insertion into another Insertion into another Log of combining or inserting to another file. File File *1 There is no "Login" log made for SNMPv3. *2 If the internal storage is formatted, all the log entries up to the time of the format are deleted and a log entry indicating the completion of the format is made.
  • Page 16 2. Click [Configuration] on the [Device Management] menu. 3. On the "Configuration" screen, click [Download Logs] in the "Device Settings" category. 4. Select the log type on "Logs to Download", and then click [Download]. The downloaded log files are stored in the "Download" folder. Security Logs: Downloads both job logs and access logs into a single file.
  • Page 17 Downloaded logs contain data of completed jobs recorded up to the time you click [Download]. The "Result" field of the log entry for uncompleted jobs will be blank. Download time may vary depending on the number of logs. If an error occurs while the CSV file is being downloaded or created, the download is canceled and details of the error are included at the end of the file.
  • Page 18 Maximum numbers of logs that can be stored in the machine are as follows: Log types Maximum number of logs Job logs 4,000 Access logs 12,000 Eco-friendly Logs 4,000 If the number of logs that can be stored on the machine exceeds the limit and new logs are generated, old logs are overwritten by new ones.
  • Page 19 Print log entries are recorded before the login entry is recorded in the access log. Details of jobs (reception, processing, output of the jobs' data, and so on) are recorded as single entries. When the machine receives a print job, it creates a log ID for the job and records information about data reception in the job log.
  • Page 20 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 21 1. Log in to the machine as the machine administrator from Web Image Monitor. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 22 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 23 1. Log in to the machine as the machine administrator from Web Image Monitor. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 24 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 25 1. Log in to the machine as the machine administrator from Web Image Monitor. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Data Management privilege as well.
  • Page 26 Enter the keyword(s) you search Top Page > Settings > System Settings Items > Date/Time/Timer Machine Sound Date/Time/Timer This section describes the settings in [Date/Time/Timer] under [System Settings]. How to Use the "Settings" Date/Time Setting Items Description...
  • Page 27 Daylight Saving Time Specify the period and time for daylight saving. (mainly Europe) Default: [Active] (mainly Asia) Default: [Inactive] (mainly North America) Default: [Active] Start Time/End Time Specify Month Week Day of the Week Time start/end the daylight saving time. Default of Month (mainly Europe) Start Time: [March]...
  • Page 28 Set Date Set the date and time for the machine's internal clock. Set Time (mainly Europe and Asia) Enter the time using the 24-hour format. (mainly North America) Enter the time using the 12-hour format. Time Zone Specify the standard time in the region where the machine is used.
  • Page 29 Fusing Unit Off Mode (Energy Saving) Specify whether to enable Fusing Unit Off mode when no On/Off operations are in progress for a certain period. Default: [On] When you select [On], specify the following items: Exit Fusing Unit Off Mode Specify when to exit Fusing Unit Off mode On Printing On Operating Control Panel...
  • Page 30 Displayed Application Switchover Timer Specify when to switch the screen if an event occurs in a different application because there have been no key inputs for a certain period of time on the application screen. • Default: [Set Time], [3] second(s) Weekly Timer Detailed Settings Specify whether to activate or inactivate the weekly timer.
  • Page 31 Weekly Timer Easy Settings When you specify the schedule of the weekly timer only, you can use the timer only by specifying this setting. If a day of the week and time is set here, [Weekly Timer Schedule] under [Weekly Timer Detailed Settings] is activated and the setting overwrites the schedule of the selected day.
  • Page 32 Enter the keyword(s) you search Top Page > Introduction and Basic Operations > User Authentication > Logging in to Web Image Monitor Registering the User Code in the Address… Confirming the Available Functions Logging in to Web Image Monitor Access the management screen of the machine from the Web browser of the computer using the same authentication information as that used when logging in from the control panel.
  • Page 33 Section Top Changing the Login Password by Using Web Image Monitor Only the administrator can change the user code. To change the user code, log in to Web Image Monitor as an administrator. 1. Launch the Web browser. 2. Enter "http://(IP address of the machine or host name)/" on the address bar of the Web browser, and then press the Enter key.
  • Page 34 Registering the User Code in the Address Book | Confirming the Available Functions Page Top Copyright © 2023...
  • Page 35 Enter the keyword(s) you search Top Page > Fax > Fax Transmission > Methods for Sending/Receiving a Fax Fax Transmission Basic Procedure for Transmitting Faxes Methods for Sending/Receiving a Fax You can scan an original and send it to a fax device at the destination via the telephone line or Internet.
  • Page 36 G3 fax The specifications for standard fax machines that use an analog telephone line. To send a fax, enter the fax number (telephone number) of the destination device such as an MFP or telephone with the fax function. IP-Fax Specify the IP address or host name of the supporting device to send a fax over an IP network (intranet).
  • Page 37 Use the machine's fax functions to reduce the communication time and cost and enhance security as needed. For details about the advantages of the transmission methods and Memory Transmission, see the following: G3 fax A fax is sent over a public telephone line to the destination. Specify the fax number (telephone number) of the destination.
  • Page 38 You can reduce communication costs because no call charges are incurred. You can communicate faster over an IP network compared to an analog phone line. Also, it does not require an e-mail server to relay the message, so you can send and receive documents without any delay.
  • Page 39 You can apply encryption and attach a digital signature to send the e-mail more safely and securely. Applying Encryption and Using a Signature for Enhanced Security When Sending an Internet Fax The Internet Fax function of the machine allows you to: Receive a reception confirmation from the destination of an Internet Fax.
  • Page 40 The machine stores the scanned original in the memory temporarily and then sends it. When sending a document with many pages, the machine dials the destination number and starts transmission before scanning all pages of the original is completed (Parallel Memory Transmission).
  • Page 41 In Parallel Memory Transmission, the machine dials the destination fax number while scanning the original and sends a fax. A fax is sent by Memory Transmission in the following cases: The destination line was busy and could not be connected The machine was communicating with another destination An original was placed on the exposure glass when sending a fax More than one destination was specified...
  • Page 42 Enter the keyword(s) you search Top Page > Introduction and Basic Operations > Basic Operation of the Machine > Names and Functions of the Control Panel Guide to Names and Functions of Compo… How to Use the Home Screen Names and Functions of the Control Panel The touch panel (Smart Operation Panel) that displays the operation screen of the machine is referred to as the "Control Panel".
  • Page 43 How to Use the Home Screen Intuitive Screen Operation Using Fingertips 3. Touch mark Used to connect the machine and a smart device with the RICOH Smart Device Connector. Using the Machine Functions from a Mobile Device Logging In Using a Mobile Device You can adjust the angle of the control panel to improve visibility.
  • Page 44 1. Fax indicator Indicates the status of the fax function. Flashing: transmitting and receiving data Lit: receiving data (Substitute RX File/Memory Lock Reception/Personal Box) 2. Data In indicator Flashes when the machine is receiving data sent from the printer driver or LAN-Fax driver.
  • Page 45 Enter the keyword(s) you search Top Page > Settings > Fax Settings Items > Reception Settings Send Settings Detailed Initial Settings Reception Settings This section describes the settings in [Reception Settings] under [Fax Settings]. How to Use the "Settings" Reception File Settings Setting Items Description...
  • Page 46 Action on Receiving File Specify the output method of the received document. Store: Store documents on the machine When [On] is selected, specify whether to notify that the document is stored and that memory is nearly full in [Store Notification Settings]. Default: [Off] Forwarding: Forward the document to a pre-registered destination...
  • Page 47 Output Mode Switch Timer Specify the output method of documents received during the specified time period from Print, ID Required Print, Forwarding, or Store. Default: [Do not Use] Configuring Output Mode Switch Timer Prohibit Auto Print Store the document as a standby to print document without printing it automatically.
  • Page 48 Store Reception File Per Line Setting Specify a folder to store received documents according to a line type. Default: [Same as Action on Receiving File] Download Stored Reception File Press [Start Download] to download the stored reception files to the USB memory in PDF format. When downloading, you (Permissions: File Administrator) can specify a reception date(s) by specifying [Specify Period] for "Specify Download File".
  • Page 49 Authorized Reception Select this to limit the sender of the incoming fax to receive. Default: [Off] Special Reception Function Specify whether to use the Special Sender function. Default: [Off] Print/Store when [Forwarding per Specify whether to print or store the document received from Sender] is On a Special Sender and forwarded to the specified destination.
  • Page 50 Stored Reception File User Setting Specify the user to manage the received documents stored on the internal storage (administrative user). When an administrative user is specified, you are asked to enter the user code or login information of the administrative user when viewing, printing, and deleting documents from Web Image Monitor.
  • Page 51 2 Sided Print Configure the following functions: Combine Two Originals Print the received document on both sides of paper or two pages on a sheet Checkered Mark Print a checkered mark or center mark on the output Center Mark sheets of the received document Default 2 Sided Print: [Off] Combine Two Originals: [Off]...
  • Page 52 Specify Tray for Lines Select whether to specify a tray to eject the printed sheets of the received document per line type and sender (telephone line, Internet Fax, or IP-Fax). Default: [Off] Print with Margin Specify whether to compress the received documents for printing.
  • Page 53 Remote Reception Setting per Line Setting Items Description Select whether to print documents received on the main machine from a sub-machine when using the Remote Fax function. *1 When using the G3 expanded line, [G3-1], [G3-2], and [G3-3] are displayed. Section Top Delivery per Line Setting Items...
  • Page 54 Trays for Paper Tray Selection Setting Items Description Trays for Paper Tray Selection Specify whether to use the paper tray with the Fax function for each tray. Default Tray 1 - 4, LCT: [On] Section Top Page Top Send Settings | Detailed Initial Settings Copyright ©...
  • Page 55 Enter the keyword(s) you search Top Page > Introduction and Basic Operations > User Authentication > Registering a User in the Address Book and Specifying the Login Information Logging In from the Control Panel Registering the User Code in the Address… Registering a User in the Address Book and Specifying the Login Information When "Basic Authentication"...
  • Page 56 1. Enter the Login User Name. 2. Enter the password in [Login Password], and then re-enter the password in [Confirm Login Password] for confirmation. 3. Press [OK]. For LDAP Authentication 1. Press [LDAP Authentication Info]. 2. Select [Specify Other Authentication Information] in "LDAP Authentication Info", and then enter the Login User Name and Login Password to access the LDAP Server.
  • Page 57 If a message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book. If you select [Close], you can close the address book without backing up and go back to the Home screen.
  • Page 58 Enter the keyword(s) you search Top Page > Introduction and Basic Operations > Address Book > Registering/Changing/Deleting Fax Numbers in the Address Book How to Use the Address Book Registering Destinations in the Address B… Registering/Changing/Deleting Fax Numbers in the Address Book By registering the destinations to which you frequently send faxes together with the send conditions in the address book, you can easily send faxes.
  • Page 59 4. Press [Destinations] tab [Fax]. 5. Specify the Fax Destinations and send conditions. Select Line: Select the line to use. International Transmission Mode: Specify whether to reduce errors occurring when sending abroad. Fax Header: Select the name of the sender printed on the reception sheet of the destination.
  • Page 60 If a message prompting you to contact the administrator to back up the address book appears on the screen, ask the administrator to back up the address book. If you select [Close], you can close the address book without backing up and go back to the Home screen.
  • Page 61 Section Top How to Use the Address Book | Registering Destinations in the Address Book from the Fax Screen Page Top Copyright © 2023...
  • Page 62 Enter the keyword(s) you search Top Page > Settings > System Settings Items > Settings for Administrator Send (Email/Folder) Machine/Control Panel Information Settings for Administrator This section describes the settings in [Settings for Administrator] under [System Settings]. How to Use the "Settings" Security Pattern/Stamp Setting Items Description...
  • Page 63 Setting Items Description Auto Erase Memory Setting Specify whether to erase files printed on the printer driver or (This setting item is displayed only image of the scanned original for each job automatically. when the machine is equipped with the Default: [Off] HDD Option.) Enabling the Auto Erase Memory Setting Function...
  • Page 64 Device Setting Information: Export You can export the machine's device information to an (Memory Storage Device) external device as a device setting information file, or import the exported device setting information file to the machine to Device Setting Information: Import restore the previous settings.
  • Page 65 Default Privilege for Stored File Specify the default access privilege for the stored files granted to the users who are automatically registered in the address book when logging in to the machine with active Windows or LDAP authentication. Default: [Read-only] Specifying the Default Privilege for Stored Files PDF File Type: PDF/A Fixed Specify the PDF file format to PDF/A only that can be stored...
  • Page 66 Service Mode Lock Specify whether to lock the machine changing to Service Mode when a customer engineer performs maintenance and repair. Default: [Off] Restricting Operations of the Customer Engineer without the Supervision of the Machine Administrator SSD Authentication Code Enter the Authentication code of the Solid State Drive (SSD) of the machine within the range of 8 to 32 characters.
  • Page 67 This section describes settings displayed in [Extended Security Settings]. You can encrypt transmitted data and data in the Address Book. An administrator who can changes the settings depends on the setting item. Setting Items Description Driver Encryption Key Specify a text string to decrypt login passwords or file passwords sent from each driver when user (Permissions: Network Administrator) authentication is specified to ON.
  • Page 68 Enhance File Protection Specify whether to lock the files to be inaccessible if an invalid password is entered ten times. This can protect (Permissions: File Administrator) files from unauthorized access attempts to release the password using random passwords. If the Enhance File Protection function is specified, the icon ( ) appears at the bottom left of the screen.
  • Page 69 Authenticate Current Job This is a setting item to specify when Basic authentication, Windows authentication, or LDAP (Permissions: Machine authentication is activated. Specify whether Administrator) authentication is required for operations such as interrupting jobs under the Copier function or canceling jobs under the Printer function.
  • Page 70 Password Policy Specify whether to limit the text and the number of characters for the user password when using Basic (Permissions: User Administrator) Authentication. Specify a password using a combination of 2 or more types of characters for [Level 1] and 3 or more types of characters for [Level 2] selected from the types described below.
  • Page 71 Device Access Violation Specify the standards that the system recognizes the access as an access violation. If the number of login (Permissions: Machine requests exceeds the number specified by the setting, Administrator) the access is recorded in the Access Log and the log data is sent to the machine administrator by e-mail.
  • Page 72 Section Top Remote Panel Operation Setting Items Description Remote Operation/Monitoring Specify whether to enable remote operation of the machine. Default: [Inactive] Section Top Function Restriction Setting Items Description Menu Protect Specify the level of access privilege to allow changing the settings for the functions that can be changed by non- administrative users.
  • Page 73 Setting Items Description Administrator Authentication Specify whether an Administrator manages the settings Management of the machine. Register the user name and password of the administrator to prevent the settings changed by the Register/Change Administrator user other than the administrator. You can manage four categories; user management, machine management, network management, and file management.
  • Page 74 Register/Change/Delete Realm Register the realm to be used for Kerberos authentication. Be sure to specify both Realm Name and KDC Server Name when registering a realm. Registering the Realm Register/Change/Delete LDAP You can register up to five settings for the LDAP Server. Server Registering the LDAP Server LDAP Search...
  • Page 75 Setting Items Description Machine Action When Limit is Specify whether to continue printing when Print Volume Reached Use reaches the limit. Default: [Allow Continue Use] Volume Use Counter: Specify whether to reset the Volume Use Counter Scheduled/Specified Reset Settings periodically. Default: [Do not Specify] Print Volume Use Limitation: Default Specify the limit value of the Print Volume Use.
  • Page 76 Setting Items Description Auto Firmware Update Settings Specify whether to update the firmware automatically. Default: [Active] When [Auto Firmware Update Settings] is set to [Active], you can set the timers to prohibit updates as well. Last Update Information Information about the previous auto firmware update is displayed.
  • Page 77 Enter the keyword(s) you search Top Page > Document Server > Managing Saved Documents > Specifying Access Privileges for Documents Saved in Document Server Changing the Storage Period of Documen… Managing Folders as a File Administrator Specifying Access Privileges for Documents Saved in Document Server You can specify access privileges (authority to read or edit a document) for documents saved in the document server so as to prevent unauthorized use.
  • Page 78 3. Press [Open]. Press [Search Folder] to search for a folder by folder name or number. If you select a password-protected folder, enter the password, and then press [OK]. 4. Select the document to specify the access privileges, and then press [Access Privileges].
  • Page 79 9. Press [OK] [Close]. To cancel access privileges, select a user and press [Delete] in [Access Privileges Administration] screen after Step 4, and then press [Delete]. Access privileges to saved print documents sent from the printer driver and saved on the machine can only be specified in Web Image Monitor.
  • Page 80 Enter the keyword(s) you search Top Page > Introduction and Basic Operations > Operating or Configuring the Machine from Computer (Web Image Monitor) > Accessing to Web Image Monitor What You Can Do on the Web Image Mon… Web Image Monitor Screen Accessing to Web Image Monitor 1.
  • Page 81 Page Top What You Can Do on the Web Image Monitor | Web Image Monitor Screen Copyright © 2023...
  • Page 82 Enter the keyword(s) you search Top Page > Introduction and Basic Operations > Operating or Configuring the Machine from Computer (Web Image Monitor) Checking the Machine Status from the Co… What You Can Do on the Web Image Mon… Operating or Configuring the Machine from Computer (Web Image Monitor) Web Image Monitor is a tool that can check the machine status and configure machine settings from your computer.
  • Page 83 Registration of the address book Registering User Information from Web Image Monitor You can add login users or destinations to the address book. You can enter characters by using the keyboard of your computer, which is useful for registering a large amount of information.
  • Page 84 Setting auto email notification Machine Status Notification by E-mail You can configure the machine to send emails to notify you about the machine's status, such as when paper has run out or a paper jam has occurred. This is useful when managing multiple printers. Monitoring, viewing/operating the control panel Monitoring control panel screen screen...
  • Page 85 Registration of the address book Registering User Information from Web Image Monitor You can add login users or destinations to the address book. You can enter characters by using the keyboard of your computer, which is useful when you register a large amount of information.
  • Page 86 Enter the keyword(s) you search Top Page > Troubleshooting > When Messages Appear > When a Message Appears and the Machine Cannot Be Operated When Messages Appear When a Message Appears While Using th… When a Message Appears and the Machine Cannot Be Operated Message Condition...
  • Page 87 "Please wait." The machine is Wait a while and do not turn off the power of the preparing to perform a machine. function or executing the image stabilization process. The ambient temperature Check the room temperature and whether it satisfies is outside the the operational requirements of the machine.
  • Page 88 If the message persists even after you have performed the operations as instructed in the following message, a malfunction may temporarily occur on the machine. Turn off the power of the machine, wait for 10 seconds or more after confirming that the main power indicator is turned off, and then turn on the power.
  • Page 89 Enter the keyword(s) you search Top Page > Security > Preventing Unauthorized Accesses > Access Control Specifying the Policy on Login/Logout Encrypting Network Communication Access Control The administrator can limit devices or protocols that can be connected to the machine to avoid unintended access.
  • Page 90 Limiting Machine Access Limiting the IP addresses from which devices can access the machine Specify the range of the IP address that can access the machine. You can limit access from the following protocols. LPR, RCP/RSH, FTP, Bonjour, SMB, WSD (Device), WSD (Printer), WSD (Scanner)/DSM, IPP, DIPRINT, RHPP, SNMP, telnet, NBT The machine also limits access from Web Image Monitor.
  • Page 91 You can block machine access and then allow access only from/to the IP addresses specified in reception/transmission filters. Specify sets of an IP address, a port number, and a protocol as filters. You can configure up to five filters each for reception and transmission.
  • Page 92 Protocol Setting Method List You can view the protocol setting methods in the following list: 1: Control Panel 2: Web Image Monitor 3: telnet 4: Device Manager NX 5: Remote Communication Gate S Protocol/Port Setting Function that cannot be used when Protocol/Port is disabled method IPv4 1, 2, 3...
  • Page 93 SMB print via TCP/IP UDP:137/UDP:138 NetBIOS designated functions on the WINS server SNMPv1-v2 2, 3, 4, 5 Transmissions that require SNMPv1/v2 UDP:161 (Using the control panel, Web Image Monitor, or telnet, you can specify SNMPv1/v2 to prohibit configuration and make it read-only.) SNMPv3 2, 3, 4, 5...
  • Page 94 @Remote 1, 2, 3 RICOH @Remote TCP:7443 TCP:7444 DIPRINT 2, 3, 4, 5 Transmissions that require DIPRINT TCP:9100 1, 2, 3 Remote updating of firmware TCP:10021 WSD (Device) 1, 2, 3 Transmissions that require WSD (Device) TCP:53000 (variable) WS-Discovery (TCP:3702, UDP:3702) also works.
  • Page 95 custom-privileges administrator with the Network/Interface privilege as well. Logging in to the Machine as a Custom-Privileges Administrator 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Network/Interface] [Effective Protocol]. 5. From the list next to each unused protocol, select [Inactive]. 6.
  • Page 96 2. Click [Configuration] on the [Device Management] menu. 3. Click [Network Security] in the "Security" category. 4. Specify protocols to disable or port numbers to close. Select the security level from the "Security Level" list. You can change the security level of multiple items at the same time.
  • Page 97 HTTP > Port 80 Open Open Open Open IPP > Port 80 Open Open Open Open IPP > Port 631 Close Close Close Close SSL/TLS > Port 443 Open Open Open Open SSL/TLS > Permit SSL/TLS Ciphertext Ciphertext Ciphertext Ciphertext Communication Priority Priority...
  • Page 98 TELNET Bonjour NetBIOS over TCP/IPv4 WSD (Device) WSD (Printer) WSD (Scanner) WSD (Encrypted Communication of Device) RHPP *1 The same settings are applied to IPv4 and IPv6. *2 TCP/IP setting is not controlled by the security level. Specify manually whether to enable or disable this setting.
  • Page 99 IPsec IEEE 802.1X (Wired) IEEE 802.1X (Wired)>Authentication Method S/MIME > Encryption Algorithm 3DES-168bit 3DES-168bit 3DES-168bit AES-256bit S/MIME > Digest Algorithm SHA1 SHA1 SHA1 SHA-256bit SNMPv3 > Authentication SHA1 SHA1 SHA1 Algorithm SNMPv3 > Encryption AES-128 AES-128 Algorithm Kerberos Authentication > AES256-CTS- AES256-CTS- AES256-CTS-...
  • Page 100 3. Press [System Settings]. 4. Press [Settings for Administrator] [Security] [Network Security Level]. 5. From the list next to Network Security Level, select a security level. Select a security level from among Level 0, Level 1, Level 2, and FIPS 140. For the security levels, see Security Level Setting List.
  • Page 101 3. Click [Network Security] in the "Security" category. 4. Select a security level in "Security Level". 5. Specify the settings as necessary. Specify each item according to the network condition or security policy. When the settings are changed, the security level is changed to [User Settings] automatically.
  • Page 102 Enter the keyword(s) you search Top Page > Security > Preventing Information Leaks > Encrypting Data to Prevent Data Leaks Caused by a Stolen or Disposed Machine Controlling Access to Untrusted Websites … Restricting Operations of the Customer E… Encrypting Data to Prevent Data Leaks Caused by a Stolen or Disposed Machine By encrypting data on the internal storage of the machine, you can prevent possible data leaks when you replace or dispose of the machine, or even if the machine were to be stolen.
  • Page 103 The Enhanced Security SSD Option attached to the machine protects the Solid State Drive (SSD) from tampering. The self-encrypting function equipped with the Enhanced Security SSD Option encrypts all data stored in the machine. Also, the Enhanced Security SSD Option can authenticate the equipment connected to the SSD based on the Authentication Code.
  • Page 104 If you specify both the Erase All Memory function and the encryption function, the Erase All Memory function is performed first. Encryption starts after the Erase All Memory function has been completed and the machine has been rebooted. If you use the Erase All Memory function and the encryption function simultaneously, and select overwrite 3 times for the Random Numbers overwriting method, the process will take up to 3 hours and 15 minutes.
  • Page 105 5. Press [Encrypt]. If the data has been encrypted, you can decrypt the data, update the encryption Key, or back up the data. Update Encryption Key: Encrypts data again and creates a new encryption Key. Cancel Encryption: Cancels encryption. Back Up Encryption Key: Makes a backup of the encryption key. The encryption setting is not changed.
  • Page 106 Print on Paper: Prints the encryption key on a sheet of paper. Press [Print on Paper] [Print]. 8. Press [OK]. 9. When the confirmation dialog is displayed, press [Exit]. 10. Press [Home] ( ), and then log out of the machine. 11.
  • Page 107 3. Press [System Settings]. 4. Press [Settings for Administrator] [Data Management] [Auto Erase Memory Setting]. 5. From the list next to Auto Erase Memory Setting, select [On], and then select an erase method. The default erase method is [Random Numbers], and the default number of overwrites is [3].
  • Page 108 When the Auto Erase Memory Setting function is enabled, the data overwrite icon is displayed at the bottom right of the control panel screen to indicate the status of data that is not overwritten. The machine will not enter Sleep mode while overwriting is in progress. When overwriting has been completed, the machine enters Sleep mode.
  • Page 109 Section Top Initializing the Machine with the Erase All Memory Function Overwrite and erase all data stored on the internal storage when you relocate or dispose of the machine. The device settings stored on the machine's memory are initialized. For details about using the machine after executing Erase All Memory, contact your service representative.
  • Page 110 3. Press [System Settings]. 4. Press [Settings for Administrator] [Data Management] [Erase All Memory]. 5. From the list next to Erase Method, select an erase method. The default erase method is [Random Numbers], and the default number of overwrites is [3].
  • Page 111 If the main power of the machine is turned off before the Erase All Memory process is completed, overwriting will start over when the main power is turned back on. If an error occurs before overwriting is completed, turn off the main power of the machine.
  • Page 112 4. Press [Settings for Administrator] [Security] [SSD Authentication Code]. 5. Press [Change]. 6. Enter the authentication code, and then press [OK]. 7. Press [OK]. 8. Press [Home] ( ), and then log out of the machine. Section Top Controlling Access to Untrusted Websites from the Control Panel | Restricting Operations of the Customer Engineer without the Supervision of the Machine Administrator Page Top Copyright ©...
  • Page 113 Enter the keyword(s) you search Top Page > Security > Preventing Unauthorized Accesses > Limiting Available Functions Logging in to the Machine Using an IC Ca… Executing a Print Job with Authentication I… Limiting Available Functions To prevent unauthorized operations, you can specify who is allowed to access each of the machine's functions.
  • Page 114 5. Press [Available Functions / Applications] under Restrict Use, and then select available functions. 6. Press [OK] several times until the Address Book screen is displayed. 7. Press [Exit]. 8. When the confirmation dialog box is displayed, press [Close], and then log out of the machine.
  • Page 115 Enter the keyword(s) you search Top Page > Security > Preventing Unauthorized Accesses > Preparing the Server to Use for User Authentication Registering/Changing/Deleting User Codes Logging in to the Machine Using an IC Ca… Preparing the Server to Use for User Authentication When using Windows authentication or LDAP authentication as the user authentication method for the first time, check that your server environment meets the requirements for user authentication,...
  • Page 116 Requirements for Set up a domain controller in the domain you specify. authentication To obtain user information when Active Directory is running, use LDAP. It is recommended that communication be encrypted between the machine and the LDAP server by using SSL/TLS. The server must support the TLS 1.0/1.1/1.2/1.3 or SSL 3.0 encryption method.
  • Page 117 Authentication method Supports the following authentication methods: Kerberos authentication Digest authentication Cleartext authentication When you select Cleartext authentication, LDAP simplified authentication is enabled. Simplified authentication can be performed with a user attribute (such as cn or uid) instead of the DN. Requirements for To use SSL/TLS, the server must support the TLS 1.0/1.1/1.2/1.3 authentication...
  • Page 118 To specify Available Functions for each user, register the user together with Available Functions in the Address Book, or specify Available Functions in the user registered automatically in the address book. Section Top Installing the Web Server (IIS) and the "Active Directory Certificate Service" Install the required service in the Windows server to obtain user information registered in Active Directory automatically.
  • Page 119 18. Select [Root CA], and then click [Next]. 19. Select [Create a new private key], and then click [Next]. 20. Select a cryptographic provider, key length, and hash algorithm to create a new private key, and then click [Next]. 21. In [Common name for this CA:], enter the Certificate Authority name, and then click [Next].
  • Page 120 Copyright © 2023...
  • Page 121 Enter the keyword(s) you search Top Page > Security > Introduction > Registering Standard-Privileges Administrators Taking Measures to Prevent Security Thre… Registering Custom-Privileges Administra… Registering Standard-Privileges Administrators There are four types of standard administrator privileges in accordance with the functional categories and they are assigned to Administrator 1 through Administrator 4 (built-in administrators).
  • Page 122 1. Activate Administrator Authentication. Activate the Administrator Authentication function of the machine from [Settings]. Activating Administrator Authentication 2. Log in to the machine as an administrator. Enter the login user name and login password of a built-in administrator to log in to the machine.
  • Page 123 1. On the Home screen, press [Settings]. 2. Press [System Settings]. 3. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Administrator Authentication Management]. 4. For each standard administrator privilege to activate Administrator Authentication, select [On] from the list. User Management: To manage the information registered in the Address Book, select [On].
  • Page 124 Press [Not Selected] next to Available Settings, select the items subject to management on the Available Settings screen, and then press [OK]. General Features: Restrict the settings for the control panel and paper output tray. Tray Paper Settings: Restrict the settings for the size and type of the paper set in the paper tray.
  • Page 125 Logging in to the machine using the control panel 1. On the Home screen, press [Login]. 2. Enter the login user name and login password of an administrator, and then press [Login]. When you log in, the user icon is displayed at the upper left on the screen. To register or change a built-in administrator, follow the procedures described in Adding Built-in Administrators or Changing the Privileges.
  • Page 126 1. Launch the Web browser. 2. Enter "http://(IP address of the machine or host name)/" on the address bar of the Web browser, and then press the Enter key. Accessing to Web Image Monitor 3. Click [Login]. 4. Enter the login user name and login password of the administrator, and then click [Login].
  • Page 127 1. Log in to the machine as an administrator with all the standard administrator privileges on the control panel. Logging in to the Machine as an Administrator 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.]...
  • Page 128 Assign the privileges of User Administrator, Machine Administrator, Network Administrator, or File Administrator to [Administrator 1] to [Administrator 4]. By default, all standard administrator privileges are assigned to the logged-in built-in administrator (Administrator 1). 9. Press [OK]. When settings are complete, the machine logs you out automatically. Take note of the login user names and login passwords specified for other administrators and inform them of the specified ones.
  • Page 129 1. Log in to the machine as an administrator with all the standard administrator privileges on the control panel. Logging in to the Machine as an Administrator 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.]...
  • Page 130 10. Select [Standard Privileges] next to Privilege Type, and then select the administrator privileges that you want assign to the external administrator. 11. Press [OK]. 12. Press [Close]. 13. Press [OK]. When settings are complete, the machine logs you out automatically. You can register up to 10 external administrator groups.
  • Page 131 Section Top Taking Measures to Prevent Security Threats | Registering Custom-Privileges Administrators Page Top Copyright © 2023...
  • Page 132 Enter the keyword(s) you search Top Page > Security > Introduction > Using the Supervisor Privilege Registering Custom-Privileges Administra… Usable Characters for User Names and P… Using the Supervisor Privilege The supervisor has the privilege to manage the built-in administrators. When the built-in administrator is changed, the supervisor can reset the login password.
  • Page 133 5. Press [Supervisor]. 6. Enter the login user name for Login User Name. 7. Press [Change] next to Login Password. 8. Enter the login password for New Password. 9. Enter the login password for Confirm New Password again. 10. Press [OK] twice. 11.
  • Page 134 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [Register/Change Administrator] [Set Administrator Login User Name/Login Password]. 5. Press the desired built-in administrator ([Administrator 1] to [Administrator 4]). 6.
  • Page 135 Using Web Image Monitor, you can log in as the supervisor and delete an administrator's password or specify a new one. Section Top Changing the Administrator Login Setting Only the supervisor has the privilege to allow/prohibit login to the machine by the built-in administrators.
  • Page 136 5. Select [Allow] or [Prohibit] from the list next to Administrator Login. 6. Press [OK] twice. When settings are complete, the machine logs you out automatically. Section Top Registering Custom-Privileges Administrators | Usable Characters for User Names and Passwords Page Top Copyright ©...
  • Page 137 Enter the keyword(s) you search Top Page > Security > Introduction > Usable Characters for User Names and Passwords Using the Supervisor Privilege Preventing Unauthorized Accesses Usable Characters for User Names and Passwords The following characters can be used for login user names and passwords. Names and passwords are case-sensitive.
  • Page 138 Login password The maximum password length for the The maximum password administrators and supervisor is 32 characters. length is 128 characters. The maximum password length for users is 128 characters. For the other conditions, the password policy of There are no restrictions on the types of the external characters that can be used for a password.
  • Page 139 Enter the keyword(s) you search Top Page > Settings > Configuring the Authentication Server > Registering the LDAP Server Configuring the Authentication Server Registering the Realm Registering the LDAP Server You can search user information stored in the LDAP Server. Use it for the following purposes: When you send files by e-mail under the Scanner or Fax function, you can search the Address Book stored in the server and specify the e-mail address.
  • Page 140 6. Enter the information for the LDAP Server. Name: Enter a registration name. The name is to distinguish the server from another LDAP server. Server Name: Enter the host name or IPv4 address of the LDAP server. Search Base: Select a root folder to start a search. E-mail addresses stored in this folder are search targets when files are sent using the Scanner or Fax function.
  • Page 141 8. After checking the connection with the LDAP server, set the search conditions or key display name. Search Conditions: Specify the Name, Email Address, Fax Number, Company Name, Department Name, and Group attributes as keywords for search conditions. Enter the Name, Email Address, Fax Number, Company Name, and Department Name attributes using up to 64 characters;...
  • Page 142 Enter the keyword(s) you search Top Page > Security Introduction and Basic Operations Browser Settings Introduction Copy Document Server Security Printer Scan Maintenance Troubleshooting Settings Security Introduction Taking Measures to Prevent Security Threats Registering Standard-Privileges Administrators Registering Custom-Privileges Administrators Using the Supervisor Privilege Usable Characters for User Names and Passwords Preventing Unauthorized Accesses...
  • Page 143 Enter the keyword(s) you search Top Page > Security Browser Settings Introduction Usable Characters for User Names and Passwords Preventing Unauthorized Accesses Security Taking Measures to Prevent Unauthorized Access Verifying Users to Operate the Machine (User Authentication) Registering/Changing/Deleting User Codes Preparing the Server to Use for User Authentication Logging in to the Machine Using an IC Card...
  • Page 144 Enter the keyword(s) you search Top Page > Security > Preventing Unauthorized Accesses > Specifying the Policy on Login/Logout Executing a Print Job with Authentication I… Access Control Specifying the Policy on Login/Logout To protect the data in the machine, configure the machine so that login and logout are performed properly.
  • Page 145 If an incorrect login password is entered several times, the user lockout function prevents further login attempts under the same login user name (Lockout). The locked-out state can be automatically released in a specified period of time. It can be manually released by the administrator as well.
  • Page 146 After you log in, the machine logs you out automatically if you do not use the control panel within a given time. By default, the machine logs you out automatically if you do not use the control panel for three minutes. Timer When the time period to allow users to log in to and use the machine is specified, the machine logs you out upon completion of the time period even though the auto logout...
  • Page 147 3. Click [User Lockout Policy] in the "Security" category. 4. Specify the number of login password attempts to permit before locking out the user and the period of time until the lockout is automatically released. Lockout (n Time) Select [Active], and then specify "Number of Attempts before Lockout" from 1 to 10. Lockout Release Timer Select [Active] to release the locked-out state after a specified time elapses, and then enter the desired value in "Lock Out User for"...
  • Page 148 For the supervisor and administrators, you can specify whether to activate the lockout release function by restarting the machine as well. Specifying User Lockout Section Top Specifying the Period of Time Until the Machine Logs You Out Automatically 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator When custom-privileges administrators are registered, you can log in to the machine as a custom-privileges administrator with the Date/Time/Timer privilege as well.
  • Page 149 7. Press [Home] ( 8. When the confirmation dialog is displayed, press [OK] to log out of the machine. When the time period to allow users to log in to and use the machine is specified, the machine logs you out upon completion of this time period even though the auto logout timer has not expired.
  • Page 150 5. Select [Active] from the list next to Time Settings Allowing Operating Machine by Logging in, enter the time for Start Time and End Time. 6. Press [OK]. 7. When the confirmation dialog is displayed, press [OK]. 8. Press [Home] ( ), and then log out of the machine.
  • Page 151 Enter the keyword(s) you search Top Page > Security > Introduction > Taking Measures to Prevent Security Threats Introduction Registering Standard-Privileges Administr… Taking Measures to Prevent Security Threats Appropriate security measures are required to reduce the risk of information leaks and use by unauthorized persons.
  • Page 152 Select an administrator who performs the maintenance and management of the machine. The administrator performs the important security settings. Registering Standard-Privileges Administrators Registering Custom-Privileges Administrators Preventing unauthorized access by managing the users who can use the machine or the connected network The administrator restricts the users who can use the machine to prevent the unauthorized access by unauthorized persons.
  • Page 153 Restrict browsing of files stored in the machine or the Address Book to protect the leak of information by unauthorized persons. Specifying Access Privileges for Documents Saved in Document Server Specifying Access Privileges on Documents Stored in the Machine Using the Protection Function to Prevent the Misuse of Addresses Restrict the manual input of the destination to avoid wrong transmission by careless mistake.
  • Page 154 If this machine is connected to a network, its environment must be protected by a firewall or similar security measure. For protection of data during communication, apply the machine's communication security functions and connect it to devices that support security functions such as encrypted communication.
  • Page 155 Enter the keyword(s) you search Top Page > Security > Preventing Unauthorized Accesses > Verifying Users to Operate the Machine (User Authentication) Taking Measures to Prevent Unauthorized… Registering/Changing/Deleting User Codes Verifying Users to Operate the Machine (User Authentication) "User authentication" is a system to authenticate users and grant them privileges to use the machine.
  • Page 156 User Code authentication Authentication is performed using an up to eight-digit user code registered in the Address Book of the machine. When specifying User Code authentication, the machine prompts you to enter the user code to use the machine. Multiple users can use the same user code. You can activate User Code authentication without activating Administrator Authentication.
  • Page 157 Specifying User Code Authentication Specify the functions to restrict with User Code authentication. 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator 2. On the Home screen, press [Settings]. 3.
  • Page 158 When [PC Control] is selected, the user code specified in the printer driver is registered in the Address Book automatically and is excluded from the print volume use limitation. To limit the print volume use, select other than [PC Control] for Printer Function.
  • Page 159 5. Select [Basic Authentication] from the list next to User Authentication Management. 6. From Available Functions, select the functions available to the user. Specify the functions available to the user for each function. For Copier Function and Printer Function, you can specify that the user can use all Copier or Printer functions, or the black-and-white print mode only.
  • Page 160 To use Kerberos authentication in the server, register the realm in advance to determine the network area. Registering the Realm 1. Log in to the machine as the machine administrator on the control panel. Logging in to the Machine as an Administrator 2.
  • Page 161 Printer Job Authentication: Specify the security level for print jobs using the printer driver. Executing a Print Job with Authentication Information Only Group: If global groups have been registered, you can specify usable functions for each global group. Press [* Not Registered], and then [Register/Change]. Enter the same name of the group as the one registered in the server to specify the available functions.
  • Page 162 2. On the Home screen, press [Settings]. 3. Press [System Settings]. 4. Press [Settings for Administrator] [Authentication/Charge] [Administrator Authentication/User Authentication/App Auth.] [User Authentication Management]. 5. Select [LDAP Authentication] from the list next to User Authentication Management. 6. Select the server for authentication and specify the available functions. LDAP Servers: Select the LDAP server to authenticate.
  • Page 163 machine. Specify the attribute that is used for unique information in the server as the Unique Attribute. You can enter "cn" or "employeeNumber" to use as "serialNumber" or "uid" as long as it is unique. Available Functions: Specify the functions available to the user for each function. For Copier Function and Printer Function, you can specify whether the user can use all Copier or Printer functions, or the black-and-white print mode only.