Ricoh Pro C720s Operating Instructions Manual page 7

Hide thumbs Also See for Pro C720s:
Table of Contents

Advertisement

Auto Erase Memory .................................................................................................................................116
Erase All Memory......................................................................................................................................120
Preventing Modification of Machine Settings..............................................................................................125
Menu Protect..................................................................................................................................................127
Menu Protect..............................................................................................................................................127
Limiting Available Functions..........................................................................................................................130
Specifying Which Functions are Available.............................................................................................130
Preventing Unauthorized Access..................................................................................................................133
Access Control...........................................................................................................................................133
Enabling/Disabling Protocols..................................................................................................................134
Specifying Network Security Level..........................................................................................................140
Encrypting Transmitted Passwords...............................................................................................................144
Driver Encryption Key...............................................................................................................................144
Protection Using Encryption..........................................................................................................................147
SSL (Secure Sockets Layer) Encryption....................................................................................................147
User Settings for SSL (Secure Sockets Layer)..........................................................................................152
Setting the SSL / TLS Encryption Mode...................................................................................................152
SNMPv3 Encryption.................................................................................................................................154
Transmission Using IPsec...............................................................................................................................157
Encryption and Authentication by IPsec..................................................................................................157
IPsec Settings.............................................................................................................................................159
Encryption Key Auto Exchange Settings Configuration Flow................................................................167
Encryption Key Manual Settings Configuration Flow.............................................................................172
telnet Setting Commands..........................................................................................................................173
Specifying the Extended Security Functions................................................................................................181
Changing the Extended Security Functions.............................................................................................181
Procedure for Changing the Extended Security Functions.....................................................................181
Settings.......................................................................................................................................................183
Other Security Functions...............................................................................................................................187
5

Advertisement

Table of Contents
loading

Table of Contents