Canon imagerunner advance C5550i User Manual page 1078

Hide thumbs Also See for imagerunner advance C5550i:
Table of Contents

Advertisement

Public key cryptosystem:
Even when <Prohibit Use of Key/Certificate with Weak Encryption> is set to <On>, the hash algorithm SHA-1,
which is used for signing a root certificate, can be used.
Log Management
The following types of logs can be managed on the machine. Collected logs can be exported in the CSV file format.
Log Type
User Authentication
Log
Job Log
Transmission Log
Advanced Box Save Log
Mail Box Operation Log
Mail Box Authentication Log
Advanced Box Operation Log
Machine Management Log
Network Authentication Log
Appendix
RSA encryption (512 bits/1024 bits), RSA signature (512 bits/1024 bits), DSA (512 bits/1024
bits), DH (512 bits/1024 bits)
Number
Indicated as
"Log Type" in
the CSV File
4098
1001
8193
8196
8197
8199
8201
8198
8200
1066
Description
This log contains information related to the authentication
status of user authentication (login/logout and user
authentication success/failure), the registering/changing/
deleting of user information managed with User Authentication,
and the management (adding/editing/deleting) of roles with the
ACCESS MANAGEMENT SYSTEM.
This log contains information related to the completion of
copy/fax/scan/send/print jobs.
The log contains information related to transmissions.
This log contains information related to the saving of files to the
Advanced Box, Network (Advanced Box of other machines), and
Memory Media.
This log contains information related to the operations
performed on data in the Mail Box, the Memory RX Inbox, and
the Confidential Fax Inbox.
This log contains information related to the authentication
status of the Mail Box, the Memory RX Inbox, and the
Confidential Fax Inbox.
This log contains information related to data operations in the
Advanced Box.
This log contains information related to the starting/shutting
down of the machine, changes made to the settings by using the
(Settings/Registration), changes made to the settings by
using the Device Information Delivery function, and the time
setting. The Machine Management Log also records changes in
user information or security-related settings when the machine
is inspected or repaired by your local authorized Canon dealer.
This log is recorded when IPSec communication fails.

Advertisement

Table of Contents
loading

Table of Contents