Ricoh Aficio MP161F Operating Instructions Manual

Ricoh Aficio MP161F Operating Instructions Manual

Security reference
Hide thumbs Also See for Aficio MP161F:
Table of Contents

Advertisement

Quick Links

Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the
Safety Information in "About This Machine" before using the machine.
Getting Started
1
Authentication and its Application
2
Ensuring Information Security
3
Managing Access to the Machine
4
Enhanced Network Security
5
Specifying the Extended Security Functions
6
7
Troubleshooting
Appendix
8
Operating Instructions
Security Reference

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh Aficio MP161F

  • Page 1 Operating Instructions Security Reference Getting Started Authentication and its Application Ensuring Information Security Managing Access to the Machine Enhanced Network Security Specifying the Extended Security Functions Troubleshooting Appendix Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information in "About This Machine"...
  • Page 2 Introduction This manual contains detailed instructions and notes on the operation and use of this machine. For your safety and benefit, read this manual carefully before using the machine. Keep this manual in a handy place for quick reference. Important Contents of this manual are subject to change without prior notice.
  • Page 3 Manuals for This Machine Refer to the manuals that are relevant to what you want to do with the machine. Important ❒ Media differ according to manual. ❒ The printed and electronic versions of a manual have the same contents. ❒...
  • Page 4 ❖ Network Guide Explains how to configure and operate the machine in a network environ- ment, and use the software provided. This manual covers all models, and includes descriptions of functions and settings that might not be available on this machine. Images, illustrations, and information about operating systems that are supported might also differ slightly from those of this machine.
  • Page 5: Table Of Contents

    TABLE OF CONTENTS Manuals for This Machine ..................i How to Read This Manual ..................1 Symbols ........................1 Display ........................2 1. Getting Started Enhanced Security....................3 Glossary ........................4 Setting Up the Machine....................5 Using Web Image Monitor..................6 Security Measures Provided by this Machine............. 7 Using Authentication and Managing Users ..............7 Preventing Information Leaks ..................8 Limiting and Controlling Access .................9...
  • Page 6 3. Ensuring Information Security Preventing Unauthorized Copying ..............77 Unauthorized Copy Prevention ................78 Data Security for Copying ..................79 Printing Limitations....................80 Notice ........................81 Printing with Unauthorized Copy Prevention and Data Security for Copying...81 Preventing Data Leaks Due to Unauthorized Transmission......83 Restrictions on Destinations..................83 Protecting the Address Book ................85 Address Book Access Permission ................85...
  • Page 7 7. Troubleshooting Authentication Does Not Work Properly ............133 A Message Appears....................133 Machine Cannot Be Operated................135 8. Appendix Supervisor Operations ..................137 Logging on as the Supervisor ................138 Logging off as the Supervisor ................139 Changing the Supervisor..................139 Resetting an Administrator’s Password ..............141 Machine Administrator Settings...............144 System Settings .....................144 Copier Features .....................147...
  • Page 9: How To Read This Manual

    How to Read This Manual Symbols This manual uses the following symbols: Indicates important safety notes. Ignoring these notes could result in serious injury or death. Be sure to read these notes. They can be found in the "Safety Information" section of About This Ma- chine.
  • Page 10: Display

    Display The display panel shows machine status, error messages, and function menus. When you select or specify an item on the display panel, it is highlighted like Important ❒ A force or impact of more than 30 N (about 3 kgf) will damage the display. The copy display is set as the default screen when the machine is turned on.
  • Page 11: Getting Started

    1. Getting Started Enhanced Security The machine's security functions are reinforced by means of realization of device and user management, through extended authentication functions. By specifying access limits on the machine’s functions and the documents and data stored in the machine, you can prevent information leaks and unauthorized access.
  • Page 12: Glossary

    Getting Started Glossary ❖ Administrator There are four types of administrator: machine administrator, network ad- ministrator, file administrator, and user administrator. We recommend only one person take each administrator role. A single administrator can perform the tasks of multiple administrators. Basically, administrators make machine settings and manage the machine;...
  • Page 13: Setting Up The Machine

    Enhanced Security Setting Up the Machine If you want higher security, make the following setting before using the ma- chine: Turn the machine on. Press the {User Tools/Counter} key. Select [System Settings] using {U} or {T}, and then press the {OK} key. Select [Interface Settings] using {U} or {T}, and then press the {OK} key.
  • Page 14: Using Web Image Monitor

    Getting Started Enter the administrator’s user name and password. The administrator's default account (user name: "admin"; password: blank) is unencrypted between steps . If acquired during this time, this account information could be used to gain unauthorized access to the machine over the network.
  • Page 15: Security Measures Provided By This Machine

    Security Measures Provided by this Machine Security Measures Provided by this Machine Using Authentication and Managing Users ❖ Enabling Authentication To control administrators’ and users’ access to the machine, perform admin- istrator authentication and user authentication using login user names and login passwords.
  • Page 16: Preventing Information Leaks

    Getting Started Preventing Information Leaks ❖ Preventing Unauthorized Copying (Unauthorized Copy Prevention) Using the printer driver, you can embed mask and pattern in the printed doc- ument. Reference For details, see p.77 “Preventing Unauthorized Copying”. ❖ Guarding Against Unauthorized Copying (Data Security for Copying) Using the printer driver to enable data security for the copying function, you can print a document with an embedded pattern of hidden text.
  • Page 17: Limiting And Controlling Access

    Security Measures Provided by this Machine Limiting and Controlling Access ❖ Preventing Modification of Machine Settings The machine settings that can be modified according to the type of adminis- trator account. Register the administrators so that users cannot change the administrator set- tings.
  • Page 18: Enhanced Network Security

    Getting Started Enhanced Network Security ❖ Preventing Unauthorized Access You can limit IP addresses or disable ports to prevent unauthorized access over the network and protect the address book, stored files, and default set- tings. Reference For details, see p.101 “Preventing Unauthorized Access”. ❖...
  • Page 19: Authentication And Its Application

    2. Authentication and its Application Administrators and Users When controlling access using the authentication specified by an administrator, select the machine’s administrator, enable the authentication function, and then use the machine. The administrators manage access to the allocated functions, and users can use only the functions they are permitted to access.
  • Page 20: Administrators

    Authentication and its Application Administrators There are four types of administrator: machine administrator, network adminis- trator, file administrator, and user administrator. The sharing of administrator tasks eases the burden on individual administra- tors while also limiting unauthorized operation by administrators. You can also specify a supervisor who can change each administrator’s password.
  • Page 21: User

    Administrators and Users User Users are managed using the personal information in the machine’s address book. By enabling user authentication, you can allow only people registered in the ad- dress book to use the machine. Users can be managed in the address book by the user administrator.
  • Page 22: The Management Function

    Authentication and its Application The Management Function The machine has an authentication function requiring a login user name and login password. By using the authentication function, you can specify access limits for individual users and groups of users. Using access limits, you can not only limit the machine’s available functions but also protect the machine settings and files and data stored in the machine.
  • Page 23: About Administrator Authentication

    The Management Function About Administrator Authentication There are four types of administrator according to the administered function: user administrator, machine administrator, network administrator, and file ad- ministrator. AYJ002S User Administrator Authentication This administrator manages personal in- Administrators must enter their login formation in the address book.
  • Page 24: About User Authentication

    Authentication and its Application About User Authentication This machine has an authentication function to prevent unauthorized access. By using login user name and login password, you can specify access limits for individual users and groups of users. AYJ001S User Access Limit A user performs normal operations on Using authentication, unauthorized us- the machine, such as copying and print-...
  • Page 25: Enabling Authentication

    Enabling Authentication Enabling Authentication To control administrators’ and users’ access to the machine, perform administra- tor or user authentication using login user names and passwords. To perform authentication, the authentication function must be enabled. To specify authen- tication, you need to register administrators. Reference For details, see p.21 “Registering the Administrator”.
  • Page 26: Administrator Authentication

    Authentication and its Application Administrator Authentication Administrators are handled differently from the users registered in the address book. When registering an administrator, you cannot use a login user name al- ready registered in the address book. Windows Authentication, LDAP Authen- tication and Integration Server Authentication are not performed for an administrator, so an administrator can log on even if the server is unreachable due to a network problem.
  • Page 27: Specifying Administrator Privileges

    Administrator Authentication Specifying Administrator Privileges To specify administrator authentication, set Administrator Authentication Man- agement to [On]. You can also specify whether or not to manage the items in Sys- tem Settings as an administrator. To log on as an administrator, use the default login user name and login password. The defaults are "admin"...
  • Page 28 Authentication and its Application Select the [User Management], [Machine Management], [Network Management], or [File Management] using {U} or {T}, and then press the {OK} key. Select [On] using {U} or {T}, and then press [Items]. [Items] appears. Select the settings to manage from "Items" using {V} , and then press the {OK} key.
  • Page 29: Registering The Administrator

    Administrator Authentication Registering the Administrator If administrator authentication has been specified, it is recommended to assign each administrator role to a different person. The sharing of administrator tasks eases the burden on individual administra- tors while also limiting unauthorized operation by administrators. Administrator authentication can also be specified via Web Image Monitor.
  • Page 30 Authentication and its Application Select [Program/Change Admin.] using {U} or {T}key, and then press the {OK} key. Select [Permissions] using {U} or {T}, and then press the {OK} key. Press {U} or {T} to scroll to the administrator whose access privileges you want to specify, and then press the {OK} key.
  • Page 31 Administrator Authentication Select the setting you want to specify using {U} or {T}, and then press the {OK} key. Select [Login User Name] using {U} or {T}, and then press the {OK} key. Enter the login user name, and then press the {OK} key. Select [Login Password] using {U} or {T}, and then press the {OK} key.
  • Page 32 Authentication and its Application Select [Encryption Password] using {U} or {T}, and then press the {OK} key. Enter the encryption password, and then press the {OK} key. If a password reentry screen appears, enter the encryption password, and then press the {OK} key. Press [Exit] three times.
  • Page 33: Logging On Using Administrator Authentication

    Administrator Authentication Logging on Using Administrator Authentication If administrator authentication has been specified, log on using an administra- tor’s user name and password. This section describes how to log on. Note ❒ To log on as an administrator, enter the administrator’s login user name and login password.
  • Page 34: Logging Off Using Administrator Authentication

    Authentication and its Application Logging off Using Administrator Authentication If administrator authentication has been specified, be sure to log off after com- pleting settings. This section explains how to log off after completing settings. Press [Logout]. Press [Yes]. Changing the Administrator Change the administrator’s login user name and login password.
  • Page 35 Administrator Authentication Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [Program/Change Admin.] using {U} or {T}, and then press the {OK} key. Select [Permissions] using {U} or {T}, and then press the {OK} key. Select the adminstrator, and then press the {OK} key.
  • Page 36 Authentication and its Application Select [Admin. Detailed Settings] using {U} or {T}, and then press the {OK} key. Select the administrator you want to change settings using {U} or {T}, and then press the {OK} key, and re-enter the setting. Press [Exit] three times.
  • Page 37: User Authentication

    User Authentication User Authentication There are five types of user authentication method: user code authentication, ba- sic authentication, Windows authentication, Integration Server Authentication, and LDAP authentication. To use user authentication, select an authentication method on the control panel, and then make the required settings for the authen- tication.
  • Page 38 Authentication and its Application Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [User Auth. Management] using {U} or {T}, and then press the {OK} key. Select [User Code Auth.] using {U} or {T}, and then press [Details]. Note ❒...
  • Page 39 User Authentication Press the {OK} key. Select [Printer Job Authentication] using {U} or {T}, and then press the {OK} key. Select the "Printer Job Authentication" level. Note ❒ If you select [All], you cannot print using a printer driver or a device that does not support authentication.
  • Page 40 Authentication and its Application Select [Exclusion] using {U} or {T}, and then press [Ex.Range]. Specify the range in which [Exclusion] is applied to Printer Job Authentication. If you specify IPv4 address range, proceed to step If you specify [USB(Sim.)], proceed to step If you specify [Parallel Interface(Sim.)], proceed to step Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4]or [IPv4 Address 5] using {U} or {T}, and then press the {OK} key.
  • Page 41 User Authentication Select [Inclusion] using {U} or {T}, and then press the {OK} key. Select [USB(Sim.)] using {U} or {T}, and then press the {OK} key. Select [Inclusion] using {U} or {T}, and then press the {OK} key. Press [Exit]. Press the {OK} key.
  • Page 42: Basic Authentication

    Authentication and its Application Press [Exit]. Press the {OK} key. Press the {User Tools/Counter} key. Basic Authentication Specify this authentication when using the machine’s address book to authenti- cate for each user. Using basic authentication, you can not only manage the ma- chine’s available functions but also limit access to stored files and to the personal data in the address book.
  • Page 43 User Authentication Select [User Auth. Management] using {U} or {T}, and then press the {OK} key. Select [Basic Auth.] using {U} or {T}, and then press [Details]. Note ❒ If you do not want to use user authentication management, select [Off]. Select [Function permissions] using {U} or {T}, and then press the {OK} key.
  • Page 44 Authentication and its Application Select [Printer Job Authentication] using {U} or {T}, and then press the {OK} key. Select the "Printer Job Authentication" level. Note ❒ If you select [All], you cannot print using a printer driver or a device that does not support authentication.
  • Page 45 User Authentication Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4]or [IPv4 Address 5] using {U} or {T}, and then press the {OK} key. Enter the Start IPv4 Address, and then press the {OK} key. Enter the End IPv4 Address, and then press the {OK} key. Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
  • Page 46 Authentication and its Application Select [Inclusion] using {U} or {T}, and then press the {OK} key. Press [Exit]. Press the {OK} key. Specifying [Exclusion] is now complete. Press the {OK} key. Press the {User Tools/Counter} key. Authentication Information Stored in the Address Book This can be specified by the user administrator.
  • Page 47 User Authentication Specifying Login User Name and Login Password In [User Auth. Management], specify the login user name and password. Press the {User Tools/Counter} key. Select [System Settings] using {U} or {T}, and then press the {OK} key. Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [Address Book Management] using {U} or {T}, and then press the {OK} key.
  • Page 48 Authentication and its Application Press the {OK} key. Press [Details] Select [Auth. Info] using {U} or {T}, and then press the {OK} key. Select [Login Authent.Info ] using {U} or {T}, and then press the {OK} key. Select [Login User Name] using {U} or {T}, and then press the [OK] key. Enter the login name, and then Press the {OK} key.
  • Page 49 User Authentication Select [Login Password] using {U} or {T}, and then press the {OK} key. Enter the login password, and then Press the {OK} key. Re-enter the login password, and then Press the {OK} key. Press the {Escape}key three times. Press [End].
  • Page 50 Authentication and its Application Specifying Authentication Information to Log on The login user name and password specified in [User Auth. Management] can be used as the login information for "SMTP Authentication", "Folder Authentica- tion", and "LDAP Authentication". For details about specifying login user name and login password, see p.39 “Spec- ifying Login User Name and Login Password”.
  • Page 51 User Authentication Enter the registration number you want to program using the number keys or the Quick Dial keys, and then press the {OK} key. By pressing [Search], you can search by Name, Display Destination List, Reg- ist No., User Code, and Fax No.. Press the {OK} key.
  • Page 52 Authentication and its Application Select [Use Auth. Info at Login] using {U} or {T}, and then press the {OK} key. Limitation ❒ When using [Use Auth. Info at Login] for "SMTP Authentication", "Folder Au- thentication", or "LDAP Authentication", a user name other than "other" , "admin"...
  • Page 53: Windows Authentication

    User Authentication Windows Authentication Specify this authentication when using the Windows domain controller to au- thenticate users who have their accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the directory server. Under Windows authentication, you can specify the access limit for each group regis- tered in the directory server.
  • Page 54 Authentication and its Application ❖ Operational Requirements for Windows Authentication • To specify Windows authentication, the following requirements must be met: • The Printer/Scanner unit must be installed. • A domain controller has been set up in a designated domain. •...
  • Page 55 User Authentication Specifying Windows Authentication This can be specified by the machine administrator. Note ❒ To automatically register user information such as fax numbers and e-mail addresses under Windows authentication, it is recommended that communi- cation between the machine and domain controller be encrypted using SSL. ❒...
  • Page 56 Authentication and its Application Select [Domain Name] using {U} or {T}, and then press the {OK} key. Enter the name of the domain controller to be authenticated, and then press the {OK} key. Select [Printer Job Authentication] using {U} or {T}, and then press the {OK} key.
  • Page 57 User Authentication Select [All] or [Simple] using {U} or {T}, and then press the {OK} key. Select [Prgrm./Change/Delete Group] using {U} or {T}, and then press the {OK} key. Select [Program/Change] using {U} or {T}, and then press the {OK} key. Select [*Not Programmed] using {U} or {T}, and then press the {OK} key.
  • Page 58 Authentication and its Application Press the {OK} key. Press the {Escape} key twice. Select [SSL] using {U} or {T}, and then press the {OK} key. Select [On] using {U} or {T}, and then press the {OK} key. If you do not use secure sockets layer (SSL) for authentication, press [Off]. Press [Exit].
  • Page 59 User Authentication Specifying Exclusion For authentication, you can also set [Simple Encryption] to [Exclusion]. To do this, do the following after the step xx in "Specifying Windows Authentication", fol- low the procedure below. Select [Exclusion] using {U} or {T}, and then press [Ex.Range]. Specify the range in which [Exclusion] is applied to Printer Job Authentication.
  • Page 60 Authentication and its Application Select [Parallel Interface(Sim.)] using {U} or {T}, and then press the {OK} key. Select [Inclusion] using {U} or {T}, and then press the {OK} key. Select [USB(Sim.)] using {U} or {T}, and then press the {OK} key. Select [Inclusion] using {U} or {T}, and then press the {OK} key.
  • Page 61 User Authentication -Installing Internet Information Services (IIS) and Certificate services Specify this setting if you want the machine to automatically obtain e-mail ad- dresses registered in Active Directory. We recommended you install Internet Information Services (IIS) and Certificate services as the Windows components. Install the components, and then create the server certificate.
  • Page 62 Authentication and its Application -If the fax number cannot be obtained If the fax number cannot be obtained during authentication, specify the setting as follows: Start [C:\WINNT\SYSTEM32\adminpak]. Start Setup Wizard. Select [Install all of the Administrator Tools], and then click [Next]. On the [Start] menu, select [Run].
  • Page 63: Ldap Authentication

    User Authentication LDAP Authentication Specify this authentication when using the LDAP server to authenticate users who have their accounts on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server. The address book stored in the LDAP server can be registered to the machine, enabling user authentication without first using the machine to register individual settings in the address book.
  • Page 64 Authentication and its Application Note ❒ Under LDAP Authentication, if “Anonymous Authentication” in the LDAP server’s settings is not set to “Prohibit”, users who do not have an LDAP serv- er account might still be able to gain access. ❒ If the LDAP server is configured using Windows Active Directory, Anony- mous Authentication might be available.
  • Page 65 User Authentication Select [LDAP Auth.] using {U} or {T}, and then press [Details]. Note ❒ If you do not want to use user authentication management, select [Off]. Select [LDAP Server Authent.] using {U} or {T}, and then press the {OK} key. Select the LDAP server to be used for LDAP authentication using {U} or {T}, and then press the {OK} key.
  • Page 66 Authentication and its Application Select the "Printer Job Authentication" level. Note ❒ If you select [All], you cannot print using a printer driver or a device that does not support authentication. To print under an environment that does not support authentication, select [Simple]. ❒...
  • Page 67 User Authentication Enter the login name attribute, and then press the {OK} key. Note ❒ You can use the Login Name Attribute as a search criterion to obtain infor- mation about an authenticated user. You can create a search filter based on the Login Name Attribute, select a user, and then retrieve the user infor- mation from the LDAP server so it is transferred to the machine’s address book.
  • Page 68 Authentication and its Application Select which of the machine’s functions you want to permit using {U} or {T}, and then press the {V} key. The box next to a selected item is checked. To deselect the item, press {W}. The selected settings will be available to users. For details about [Function permissions], see p.96 “Limiting Available Func- tions”.
  • Page 69 User Authentication Specifying Exclusion For authentication, you can also set [Simple Encryption] to [Exclusion]. To do that, do the following after the step xx in "Specifying LDAP Authentication" Select [Exclusion] using {U} or {T}, and then press [Ex.Range]. Specify the range in which [Exclusion] is applied to Printer Job Authentication. If you specify IPv4 address range, proceed to step If you specify [USB(Sim.)], proceed to step If you specify [Parallel Interface(Sim.)], proceed to step...
  • Page 70 Authentication and its Application Select [Parallel Interface(Sim.)] using {U} or {T}, and then press the {OK} key. Select [Inclusion] using {U} or {T}, and then press the {OK} key. Select [USB(Sim.)] using {U} or {T}, and then press the {OK} key. Select [Inclusion] using {U} or {T}, and then press the {OK} key.
  • Page 71: Integration Server Authentication

    User Authentication Integration Server Authentication To use Integration Server Authentication, you need a server on which the Scan- Router delivery software that supports authentication is installed. For external authentication, the Integration Server Authentication collectively authenticates users accessing the server over the network, providing a server-in- dependent centralized user authentication system that is safe and convenient.
  • Page 72 Authentication and its Application Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [User Auth. Management] using {U} or {T}, and then press the {OK} key. Select [Integration Svr. Auth.] using {U} or {T}, and then press [Details]. Note ❒...
  • Page 73 User Authentication Select the authentication system for external authentication using {U} or {T}, and then press the {OK} key. Select an available authentication system. Select [Domain Name] using {U} or {T}, and then press the {OK} key. Enter the domain name, and then press the {OK} key. Note ❒...
  • Page 74 Authentication and its Application Select [Printer Job Authentication] using {U} or {T}, and then press the {OK} key. Select the "Printer Job Authentication" level. Note ❒ If you select [All], you cannot print using a printer driver or a device that does not support authentication.
  • Page 75 User Authentication Select [On] using {U} or {T}, and then press the {OK} key. To not use secure sockets layer (SSL) for authentication, press [Off]. Press [Exit]. Press the {OK} key. Press the {User Tools/Counter} key. Specifying Exclusion For authentication, you can also set [Simple Encryption] to [Exclusion]. To do that, do the following after the step xx in "Specifying Integration Server Authentication"...
  • Page 76 Authentication and its Application Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4]or [IPv4 Address 5] using {U} or {T}, and then press the {OK} key. Enter the Start IPv4 Address, and then press the {OK} key. Enter the End IPv4 Address, and then press the {OK} key.
  • Page 77 User Authentication Select [Inclusion] using {U} or {T}, and then press the {OK} key. Press [Exit]. Press the {OK} key. Specifying [Exclusion] is now complete. Press the {OK} key.
  • Page 78 Authentication and its Application ❖ Printer Job Authentication Levels and Printer Job Types This section explains the relationship between printer job authentication lev- els and printer job types. Depending on the combination of printer job authentication level and printer job type, the machine may not print properly. Set an appropriate combination according to the operating environment.
  • Page 79 User Authentication ❖ Printer Job Types In the RPCS printer driver dialog box, the [Confirm authentication information when printing] and [Encrypt] check boxes are selected. In the PCL printer driver dialog box, the [User Authentication] and [With En- cryption] check boxes are selected. Personal authentication information is added to the printer job.
  • Page 80: If User Authentication Has Been Specified

    Authentication and its Application If User Authentication Has Been Specified When user authentication (User Code Authentication, Basic Authentication, Windows Authentication, LDAP Authentication, or Integration Server Authen- tication) is set, the authentication screen is displayed. Unless a valid user name and password are entered, operations are not possible with the machine. Log on to operate the machine, and log off when you are finished operations.
  • Page 81: User Code Authentication (Using A Printer Driver)

    If User Authentication Has Been Specified User Code Authentication (Using a Printer Driver) When user authentication is set, specify the user code in the printer properties of a printer driver. For details, see the printer driver Help. Login (Using the Control Panel) Follow the procedure below to log on when basic authentication, Windows au- thentication, LDAP Authentication, or Integration Server Authentication is set.
  • Page 82: Login (Using A Printer Driver)

    Authentication and its Application Login (Using a Printer Driver) When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption settings in the printer properties of a printer driver, and then specify a login user name and password. For details, see the printer driver Help.
  • Page 83: Auto Logout

    If User Authentication Has Been Specified Auto Logout This can be specified by the machine administrator. When using user authentication management, the machine automatically logs you off if you do not use the control panel within a given time. This feature is called "Auto Logout".
  • Page 84: Authentication Using An External Device

    Authentication and its Application Enter "60" to "999" (seconds) using the number keys, and then press the {OK} key. Note ❒ If you do not want to specify [Auto Logout Timer], select [Off]. Press the {User Tools/Counter} key. Authentication using an external device If you authenticate using an external device, see the attached manual to the ex- ternal device about operation method of authentication.
  • Page 85: Ensuring Information Security

    3. Ensuring Information Security Preventing Unauthorized Copying Using the printer driver, you can embed a pattern in the printed copy to discour- age or prevent unauthorized copying. If you enable data security for copying on the machine, printed copies of a doc- ument with data security for copying are grayed out to prevent unauthorized copying.
  • Page 86: Unauthorized Copy Prevention

    Ensuring Information Security Unauthorized Copy Prevention Using the printer driver, you can embed mask and pattern (for instance, a warn- ing such as "No Copying") in the printed document. If the document is copied, scanned, or stored by a copier or multi function print- er, the embedded pattern appears clearly on the copy, discouraging unauthor- ized copying.
  • Page 87: Data Security For Copying

    Preventing Unauthorized Copying Data Security for Copying Using the printer driver to enable data security for the copying function, you can print a document with an embedded pattern of hidden text. Such a document is called a data security for copying document. If a data security for copying document is copied or stored using a copier or mul- ti-function printer that has the Copy Data Security Unit, protected pages are grayed out in the copy, preventing confidential information being copied.
  • Page 88: Printing Limitations

    Ensuring Information Security Note ❒ You can also embed pattern in a document protected by data security for cop- ying. However, if such a document is copied or stored using a copier or multi- function printer with the Copy Data Security Unit, the copy is grayed out, so the embedded pattern does not appear on the copy.
  • Page 89: Notice

    Preventing Unauthorized Copying Notice 1.The supplier does not guarantee that unauthorized copy prevention and data security for copying will always work. Depending on the paper, the model of copier or multi-function printer, and the copier or printer settings, unauthorized copy prevention and data security for copying may not work properly. 2.The supplier is not liable for any damage caused by using or not being able to use unauthorized copy prevention and data security for copying.
  • Page 90 Ensuring Information Security Specifying Printer Settings for Data security for copying (Printer Driver Setting) If a document printed using this function is copied or stored in the Document Server by a copier or multi-function printer, the copy is grayed out. Using the printer driver, specify the printer settings for data security for copying.
  • Page 91: Preventing Data Leaks Due To Unauthorized Transmission

    Preventing Data Leaks Due to Unauthorized Transmission Preventing Data Leaks Due to Unauthorized Transmission If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user.
  • Page 92 Ensuring Information Security Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [Extended Security] using {U} or {T}, and then press the {OK} key. Select [Restrict Use of Dest.] using {U} or {T}, and then press the {OK} key. Select [On] using {U} or {T}, and then press the {OK} key.
  • Page 93: Protecting The Address Book

    Protecting the Address Book Protecting the Address Book If user authentication is specified, the user who has logged on will be designated as the sender to prevent data from being sent by an unauthorized person mas- querading as the user. To protect the data from unauthorized reading, you can also encrypt the data in the address book.
  • Page 94 Ensuring Information Security Select [Program/Change] using {U} or {T}, and then press the {OK} key. Enter the registration number you want to program using the number keys or the Quick Dial keys, and then press the {OK} key. By pressing [Search], you can search by Name, Display Destination List, Reg- ist No., User Code, and Fax No..
  • Page 95 Protecting the Address Book Press [Program]. Select the users or groups to register. You can select more than one users. By pressing [All], you can select all the users. Press the {OK} key. Select the permission, and then press the {OK} key. Select the permission, from [Read-only], [Edit], [Edit/Delete], or [Full Control].
  • Page 96: Encrypting The Data In The Address Book

    Ensuring Information Security Encrypting the Data in the Address Book This can be specified by the user administrator. Encrypt the data in the address book. To encrypt the Data in the Address Book, the Printer/Scanner unit must be in- stalled. Reference See p.123 “Changing the Extended Security Functions”.
  • Page 97 Protecting the Address Book Select [Encrypt Address Book] using {U} or {T}, and then press the {OK} key. Select [On] using {U} or {T}, and then press [Enc.Key]. Enter the encryption key, and then press the {OK} key. Enter the encryption key using up to 32 alphanumeric characters. Re-enter the encryption key, and then press the {OK} key.
  • Page 98 Ensuring Information Security Press [OK]. Do not switch the main power off during encryption, as doing so may corrupt the data. Encrypting the data in the address book may take a long time. The time it takes to encrypt the data in the address book depends on the number of registered users.
  • Page 99: Managing Access To The Machine

    4. Managing Access to the Machine Preventing Modification of Machine Settings Administrator type determines which machine settings can be modified. Users cannot change the administrator settings. In [Admin. Auth. Management], [Items], the administrator can select which settings users cannot specify. Register the administrators before using the machine.
  • Page 100: Menu Protect

    Managing Access to the Machine Menu Protect The administrator can also limit users’ access permission to the machine’s set- tings. The machine’s System Settings menu and the printer’s regular menus can be locked so they cannot be changed. This function is also effective when man- agement is not based on user authentication.
  • Page 101 Menu Protect Select the menu protect level using {U} or {T}, and then press [OK] key. Press the {User Tools/Counter} key. Fax Functions Set [Machine Management] to [On] in [Admin. Auth. Management] in [Administrator Tools] in [System Settings] before specifying [Menu Protect] in [Fax Features]. Press the {User Tools/Counter} key.
  • Page 102 Managing Access to the Machine Printer Functions Set [Machine Management] to [On] in [Admin. Auth. Management] in [Administrator Tools] in [System Settings] before specifying [Menu Protect] in [Printer Features]. Press the {User Tools/Counter} key. Select [Printer Features] using {U} or {T}, and then press the {OK} key. Select [Maintenance] using {U} or {T}, and then press the {OK} key.
  • Page 103 Menu Protect Scanner Functions Set [Machine Management] to [On] in [Admin. Auth. Management] in [Administrator Tools] in [System Settings] before specifying [Menu Protect] in [Scanner Features]. Press the {User Tools/Counter} key. Select [Scanner Features] using {U} or {T}, and then press the {OK} key. Select [Administrator Tools] using {U} or {T}, and then press the {OK} key.
  • Page 104: Limiting Available Functions

    Managing Access to the Machine Limiting Available Functions To prevent unauthorized operation, you can specify who is allowed to access each of the machine’s functions. ❖ Available Functions Specify the available functions from the copier, fax, scanner, and printer func- tions.
  • Page 105 Limiting Available Functions Select [Program/Change] using {U} or {T}, and then press the {OK} key. Enter the registration number you want to program using the number keys or the Quick Dial keys, and then press the {OK} key. By pressing [Search], you can search by Name, Display Destination List, Reg- ist No., Fax Destination, E-mail Address, and Folder Name.
  • Page 106 Managing Access to the Machine Select which of the machine’s functions you want to permit using {U} or {T}, and then press the {V} key. Press the {OK} key. Press the {Escape} key. Press [End]. Press the {OK} key. Press the {User Tools/Counter} key.
  • Page 107: Managing Log Files

    Managing Log Files Managing Log Files Log information To view the log, Web SmartDeviceMonitor Professional IS/Standard is re- quired. The following log information is stored in the machine’s memory: • Job log Stores information about workflow related to user files, such as copying, printing, Fax delivery, and scan file delivery •...
  • Page 108 Managing Access to the Machine Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [Transfer Log Setting] using {U} or {T}, and then press the {OK} key. Select [Off] using {U} or {T}, and then press the {OK} key. Press the {User Tools/Counter}key.
  • Page 109: Enhanced Network Security

    5. Enhanced Network Security Preventing Unauthorized Access You can limit IP addresses, disable ports and protocols, or use Web Image Mon- itor to specify the network security level to prevent unauthorized access over the network and protect the address book, stored files, and default settings. Enabling/Disabling Protocols This can be specified by the network administrator.
  • Page 110 Enhanced Network Security Select [Effective Protocol] using {U} or {T}, and then press the {OK} key. Select the protocol you want to specify, and then press the {OK} key. Select [Inactive] using {U} or {T}, and then press the {OK} key. Press the {User Tools/Counter} key.
  • Page 111: Access Control

    Preventing Unauthorized Access Access Control This can be specified by the network administrator. The machine can control TCP/IP access. Limit the IP addresses from which access is possible by specifying the access control range. For example, if you specify the access control range as [192.168.15.16]- [192.168.15.20], the client PC addresses from which access is possible will be from 192.168.15.16 to 192.168.15.20.
  • Page 112: Specifying Network Security Level

    Enhanced Network Security Specifying Network Security Level This can be specified by the network administrator. This setting lets you change the security level to limit unauthorized access. Set the security level to [Level 0], [Level 1], or [Level 2]. Select [Level 2] for maximum security to protect confidential information. Select [Level 1] for moderate security.
  • Page 113 Preventing Unauthorized Access Select the network security level using {U} or {T}, and then press the {OK} key. Select [Level 0], [Level 1], or [Level 2]. Press the {User Tools/Counter}key. -Status of Functions under each Network Security Level ❍= Available —...
  • Page 114 Enhanced Network Security Function Network Security Level Level 0 Level 1 Level 2 ❍ ❍ Interface Bluetooth — ❍ ❍ ❍ TCP/IP TCP/IP HTTP Port 80 Port 443 Port 631 Port 7443/7444 Port 80 Port 631 Port 443 ❍ ❍ DIPRINT —...
  • Page 115: Encrypting Transmitted Passwords

    Encrypting Transmitted Passwords Encrypting Transmitted Passwords Prevent login passwords, group passwords for PDF files, and IPP authentication passwords being revealed by encrypting them for transmission. Also, encrypt the login password for administrator authentication and user au- thentication. ❖ Driver Encryption Key Encrypt the password transmitted when specifying user authentication.
  • Page 116: Driver Encryption Key

    Enhanced Network Security Driver Encryption Key This can be specified by the network administrator. Specify the driver encryption key on the machine. By making this setting, you can encrypt login passwords for transmission to pre- vent them from being analyzed. Reference See p.123 “Changing the Extended Security Functions”.
  • Page 117: Group Password For Pdf Files

    Encrypting Transmitted Passwords Enter the driver encryption key, and then press the {OK} key. Enter the driver encryption key using up to 32 alphanumeric characters. Note ❒ The network administrator must give users the driver encryption key specified on the machine so they can register it on their computers. Make sure to enter the same driver encryption key as that specified on the ma- chine.
  • Page 118 Enhanced Network Security Press the {User Tools/Counter} key. Select [Printer Features] using {U} or {T}, and then press the {OK} key. Select [PDF Menu] using {U} or {T}, and then press the {OK} key. Select [PDF Group Password] {U} or {T}, and then press the {OK} key. Enter the current password, and then press the {OK} key.
  • Page 119: Ipp Authentication Password

    Encrypting Transmitted Passwords IPP Authentication Password This can be specified by the network administrator. Specify the IPP authentication passwords for the machine using Web Image Monitor. By making this setting, you can encrypt IPP authentication passwords for trans- mission to prevent them from being analyzed. Note ❒...
  • Page 120: Protection Using Encryption

    Enhanced Network Security Protection Using Encryption When you access the machine using a Web Image Monitor or IPP, you can estab- lish encrypted communication using SSL. When you access the machine using an application such as SmartDeviceMonitor for Admin, you can establish en- crypted communication using SNMPv3 or SSL.
  • Page 121: Ssl (Secure Sockets Layer) Encryption

    Protection Using Encryption SSL (Secure Sockets Layer) Encryption This can be specified by the network administrator. To protect the communication path and establish encrypted communication, create and install the server certificate. There are two ways of installing a server certificate: create and install a self-cer- tificate using the machine, or request a certificate from a certificate authority and install it.
  • Page 122 Enhanced Network Security Creating and Installing the Self-Signed Certificate Create and install the server certificate using Web Image Monitor. This section explains the use of a self-certificate as the server certificate. Open a Web Image Monitor. Enter "http://(machine's-address)/" in the address bar to access the printer. Log onto the machine.
  • Page 123 Protection Using Encryption Creating the Server Certificate (Certificate Issued by a Certificate Authority) Create the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Open a Web Image Monitor. Enter "http://(machine's-address)/"...
  • Page 124 Enhanced Network Security Installing the Server Certificate (Certificate Issued by a Certificate Authority) Install the server certificate using Web Image Monitor. This section explains the use of a certificate issued by a certificate authority as the server certificate. Enter the server certificate contents issued by the certificate authority. Open a Web Image Monitor.
  • Page 125: User Settings For Ssl (Secure Sockets Layer)

    Protection Using Encryption Click [Configuration], and then click [SSL/TLS] under the [Security]. The [SSL/TLS] page appears. Click [Enable] for [SSL/TLS]. Click [Apply]. The SSL setting is enabled. Log off from the machine. Note ❒ If you set [Permit SSL/TLS Communication] to [Ciphertext Only], enter "ht- tps://(machine's address)/"...
  • Page 126: Setting The Ssl / Tls Encryption Mode

    Enhanced Network Security Setting the SSL / TLS Encryption Mode By specifying the SSL/TLS encrypted communication mode, you can change the security level. ❖ Encrypted Communication Mode Using the encrypted communication mode, you can specify encrypted com- munication. Ciphertext Only Allows encrypted communication only.
  • Page 127 Protection Using Encryption Select [Network] using {U} or {T}, and then press the {OK} key. Select [Permit SSL/TLS Comm.] using {U} or {T}, and then press the {OK} key. Select the encrypted communication mode using {U} or {T}, and then press the {OK} key.
  • Page 128: Snmpv3 Encryption

    Enhanced Network Security SNMPv3 Encryption This can be specified by the network administrator. When using SmartDeviceMonitor for Admin or another application to make various settings, you can encrypt the data transmitted. By making this setting, you can protect data from being tampered with. Preparation For details about logging on and logging off with administrator authentica- tion, see p.25 “Logging on Using Administrator Authentication”, p.26 “Log-...
  • Page 129 Protection Using Encryption Select [Encryption Only] using {U} or {T}, and then press the {OK} key. Press the {User Tools/Counter} key. Note ❒ To use SmartDeviceMonitor for Admin for encrypting the data for speci- fying settings, you need to specify the network administrator’s [Encryption Password] setting and [Encryption Key] in [SNMP Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit SNMPv3 Communictn.] on the machine.
  • Page 130 Enhanced Network Security...
  • Page 131: Specifying The Extended Security Functions

    6. Specifying the Extended Security Functions Changing the Extended Security Functions As well as providing basic security through user authentication and the machine access limits specified by the administrators, you can increase security by, for in- stance, encrypting transmitted data and data in the address book. If you need ex- tended security, specify the machine’s extended security functions before using the machine.
  • Page 132: Settings

    Specifying the Extended Security Functions Select [Extended Security] using {U} or {T}, and then press the {OK} key. Select the setting you want to change using {U} or {T}, and then press the {OK} key. Change the setting, and then press the {OK} key. Press the {User Tools/Counter} key.
  • Page 133 Changing the Extended Security Functions ❖ Restrict Use of Dest. This can be specified by the user administrator. The available fax and scanner destinations are limited to the destinations reg- istered in the address book. Reference See p.83 “Restrictions on Destinations”. A user cannot directly enter the destinations for transmission.
  • Page 134 Specifying the Extended Security Functions ❖ Settings by SNMPv1 and v2 This can be specified by the network administrator. When the machine is ac- cessed using the SNMPv1, v2 protocol, authentication cannot be performed, allowing machine administrator settings such as the paper setting to be changed.
  • Page 135 Changing the Extended Security Functions ❖ Authenticate Current Job This can be specified by the machine administrator. This setting lets you specify whether or not authentication is required for op- erations such as canceling jobs under the copier and printer functions. If you select [Login Privilege], authorized users and the machine administrator can operate the machine.
  • Page 136: Other Security Functions

    Specifying the Extended Security Functions Other Security Functions This section explains the settings for preventing information leaks, and func- tions that you can restrict to further increase security. Fax Function ❖ Not Displaying Destinations and Senders in Reports and Lists You can specify whether or not to display destinations and senders by click- ing [Fax Features], [Administrator Tools], [Parameter Setting] and specifying "Bit 4"...
  • Page 137: Limiting Machine Operation To Customers Only

    Limiting Machine Operation to Customers Only Limiting Machine Operation to Customers Only The machine can be set so that operation is impossible without administrator au- thentication. The machine can be set to prohibit operation without administrator authentica- tion and also prohibit remote registration in the address book by a service rep- resentative.
  • Page 138 Specifying the Extended Security Functions Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [Service Mode Lock] using {U} or {T}, and then press the {OK} key. Select [On] using {U} or {T}, and then press the {OK} key. A confirmation message appears.
  • Page 139 Limiting Machine Operation to Customers Only Canceling Service Mode Lock For a customer engineer to carry out inspection or repair in service mode, the machine administrator must log onto the machine and cancel the service mode lock. Preparation For details about logging on and logging off with administrator authentica- tion, see p.25 “Logging on Using Administrator Authentication”, p.26 “Log- ging off Using Administrator Authentication”.
  • Page 140 Specifying the Extended Security Functions...
  • Page 141: Troubleshooting

    7. Troubleshooting Authentication Does Not Work Properly This section explains what to do if a user cannot operate the machine because of a problem related to user authentication. Refer to this section if a user comes to you with such a problem. A Message Appears This section explains how to deal with problems if a message appears on the screen during user authentication.
  • Page 142 Troubleshooting Messages Causes Solutions The machine cannot connect Make sure the server's set- Failed to obtain to the server or cannot estab- tings, such as the IP Address URL. lish communication. and host name, are specified correctly on the machine. Make sure the host name of the UA Server is specified cor- rectly.
  • Page 143: Machine Cannot Be Operated

    Authentication Does Not Work Properly Machine Cannot Be Operated If the following conditions arise while users are operating the machine, provide instructions on how to deal with them. Condition Cause Solution Cannot print using the printer User authentication has been Enter the login user name and driver or connect using the rejected.
  • Page 144 Troubleshooting Condition Cause Solution Cannot access the machine us- ScanRouter EX Professional V2 does not support user authen- ing ScanRouter EX Profes- tication. sional V2. Cannot log off when using the The original has not been When the original has been copying or scanner functions.
  • Page 145: Appendix

    8. Appendix Supervisor Operations The supervisor can delete an administrator’s password and specify a new one. If any of the administrators forget their passwords or if any of the administrators change, the supervisor can assign a new password. If logged on using the super- visor’s user name and password, you cannot use normal functions or specify de- faults.
  • Page 146: Logging On As The Supervisor

    Appendix Logging on as the Supervisor If administrator authentication has been specified, log on using the supervisor login user name and login password. This section describes how to log on. Press the {User Tools/Counter} key. Press [Login]. Enter a login user name, and then press the {OK} key. Note ❒...
  • Page 147: Logging Off As The Supervisor

    Supervisor Operations Logging off as the Supervisor If administrator authentication has been specified, be sure to log off after com- pleting settings. This section explains how to log off after completing settings. Press [Logout]. Press [Yes]. Changing the Supervisor Press the {User Tools/Counter} key. Select [System Settings] using {U} or {T}, and then press the {OK} key.
  • Page 148 Appendix Select [Admin. Detailed Settings] using {U} or {T}, and then press the {OK} key. Select [Supervisor] using {U} or {T}, and then press the {OK} key. Select [Login User Name] using {U} or {T}, and then press the {OK} key. Enter the login user name, and then press the {OK} key.
  • Page 149: Resetting An Administrator's Password

    Supervisor Operations If a password reentry screen appears, enter the login password, and then press the {OK} key. Press [Exit] three times. Press [Exit]. You will be automatically logged off. Press the {User Tools/Counter} key. Resetting an Administrator’s Password Press the {User Tools/Counter} key. Press [Login].
  • Page 150 Appendix Select [Administrator Tools] using {U} or {T}, and then press the {OK} key. Select [Program/Change Admin.] using {U} or {T}, and then press the {OK} key. Select [Admin. Detailed Settings] using {U} or {T}, and then press the {OK} key.
  • Page 151 Supervisor Operations If a password re-entry screen appears, enter the login password, and then press the {OK} key. Press [Exit] three times. Press [Exit]. You will be automatically logged off. Press the {User Tools/Counter} key.
  • Page 152: Machine Administrator Settings

    Appendix Machine Administrator Settings The machine administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ General Features All the settings can be specified. ❖ Tray Paper Settings All the settings can be specified. ❖...
  • Page 153 Machine Administrator Settings ❖ File Transfer The following settings can be specified. • Delivery Option • SMTP Authentication User Name E-mail Address Password Encrypt • POP before SMTP Wait Time after Auth. User Name E-mail Address Password • Reception Protocol •...
  • Page 154 Appendix ❖ Administrator Tools • Display / Print Counter Print • Disp. / Print User Counter All the settings can be specified. • User Auth. Management You can specify which authentication to use. You can also edit the settings for each function. •...
  • Page 155: Copier Features

    Machine Administrator Settings Copier Features All the settings can be specified. Fax Features The following settings can be specified. ❖ General Settings/Adjust All the settings can be specified ❖ Reception Settings All the settings can be specified ❖ E-mail Settings The following settings can be specified •...
  • Page 156: Printer Features

    Appendix Printer Features The following settings can be specified. ❖ List/Test Print All the settings can be specified. ❖ Maintenance • List / Test Print Lock • Menu Protect ❖ System • Print Error Report • Auto Continue • Memory Overflow •...
  • Page 157: Scanner Features

    Machine Administrator Settings Scanner Features The following settings can be specified. ❖ Scan Settings All the settings can be specified. ❖ Destination List Settings All the settings can be specified. ❖ Send Settings The following settings can be specified. • TWAIN Standby Time •...
  • Page 158 Appendix • Logs Collect Job Logs Collect Access Logs • E-mail All the settings can be specified. • Auto E-mail Notification All the settings can be specified. • On-demand E-mail Notification All the settings can be specified. • File Transfer All the settings can be specified.
  • Page 159: Settings Via Smartdevicemonitor For Admin

    Machine Administrator Settings ❖ Fax • General Settings All the settings can be specified. • Administrator Tools All the settings can be specified. • FAX E-mail Settings The following settings can be specified. Internet Fax Settings SMTP RX File Delivery Settings Authorized E-mail Address •...
  • Page 160: Network Administrator Settings

    Appendix Network Administrator Settings The network administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Interface Settings • Network Machine IPv4 Address IPv4 Gateway Address Machine IPv6 Address IPv6 Gateway Address IPv6 Stateless Setting DNS Configuration DDNS Configuration...
  • Page 161: Fax Features

    Network Administrator Settings ❖ File Transfer • SMTP Server Server Name Port No. • E-mail Communication Port • E-mail Recept. Interval • Max. Recept. E-mail size • E-mail Storage in Server • FAX E-mail Account ❖ Administrator Tools • Admin. Auth. Management Network Management •...
  • Page 162: Settings Via Web Image Monitor

    Appendix Settings via Web Image Monitor The following settings can be specified. ❖ Device Settings • System Device Name Comment Location • E-mail Reception SMTP E-mail Communication Port • Auto E-mail Notification Groups to Notify • Administrator Authentication Management Network Administrator Authentication Available Settings for Network Administrator •...
  • Page 163 Network Administrator Settings ❖ Interface • Change Interface • IEEE 802.11b Settings Communication Mode SSID Channel Security Type • WEP Setting WEP Authentication WEP Key Number WEP Key • WPA Settings User Name Domain Name Server ID • Bluetooth Operation Mode The IEEE802.11b interface unit option must be installed.
  • Page 164: Settings Via Smartdevicemonitor For Admin

    Appendix ❖ Security • Network Security All the settings can be specified. • Access Control All the settings can be specified. • IPP Authentication All the settings can be specified. • SSL/TLS All the settings can be specified. • Site Certificates All the settings can be specified.
  • Page 165: File Administrator Settings

    File Administrator Settings File Administrator Settings The file administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Admin. Auth. Management File Management • Program/Change Admin. File Administrator • Extended Security Enhance File Protection Settings via Web Image Monitor The following settings can be specified.
  • Page 166: User Administrator Settings

    Appendix User Administrator Settings The user administrator settings that can be specified are as follows: System Settings The following settings can be specified. ❖ Administrator Tools • Address Book Management • Prgrm./Change/Delete Group • Address Book: Print List Destination List Group Destination List Quick Dial List •...
  • Page 167: Settings Via Web Image Monitor

    User Administrator Settings Settings via Web Image Monitor The following settings can be specified. ❖ Address Book All the settings can be specified. ❖ Device Settings • Auto E-mail Notification All the settings can be specified. • Administrator Authentication Management User Administrator Authentication Available Settings for User Administrator •...
  • Page 168: The Privilege For User Account Settings In The Address Book

    Appendix The Privilege for User Account Settings in the Address Book The authorities for using the address book are as follows: The authority designations in the list indicate users with the following authori- ties. • Read-only This is a user assigned "Read-only" authority. •...
  • Page 169 The Privilege for User Account Settings in the Address Book Settings User User Regis- Full Adminis- tered Control Read-only Edit Edit / trator User Delete Auth. User ❍ Info Code Login User ❍ ❍ Name Login ❍ ❍ Password SMTP ❍...
  • Page 170 Appendix Settings User User Regis- Full Adminis- tered Control Read-only Edit Edit / trator User Delete Folder SMB/ ❍ ❍ ❍ ❍ ❍ Destina- FTP/NCP tion SMB: ❍ ❍ ❍ ❍ ❍ Path FTP: ❍ ❍ ❍ ❍ ❍ Port No. FTP: ❍...
  • Page 171: User Settings

    User Settings User Settings If you have specified administrator authentication, the available functions and settings depend on the menu protect setting. The following settings can be specified by someone who is not an administrator. ❍ =You can view and change the setting. U =You can view the setting.
  • Page 172: Printer Functions

    Appendix Printer Functions The default for [Menu Protect] is [Level 2]. ❖ Printer Features Tab Names Settings Menu Protect Level 1 Level 2 ❍ System Print Error Report ❍ Auto Continue ❍ Memory Overflow ❍ Memory Usage ❍ Duplex ❍ Copies ❍...
  • Page 173 User Settings Tab Names Settings Menu Protect Level 1 Level 2 ❍ PCL Menu Orientation ❍ Form Lines ❍ Font Source ❍ Font Number ❍ Point Size ❍ Font Pitch ❍ Symbol Set ❍ Courier Font ❍ Extend A4 Width ❍...
  • Page 174: Scanner Features

    Appendix Scanner Features The default for [Menu Protect] is [Level 2]. Tab Names Settings Menu Protect Level 1 Level 2 ❍ Scan Settings Default Scan Setting ❍ Mixed Orig. Size Priority ❍ Orig. Orientation Priority ❍ ❍ Original Type Setting ❍...
  • Page 175: Fax Features

    User Settings Fax Features The default for [Menu Protect] is [Off]. Names Settings Menu Protect Level 1 Level 2 ❍ ❍ General Adjust Sound Volume Settings /Adjust ❍ Program Fax Information ❍ ❍ On Hook Release Time ❍ ❍ Set User Function Key ❍...
  • Page 176: System Settings

    Appendix System Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Tab Names Settings Admin-...
  • Page 177 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ Timer Settings Auto Off Timer ❍...
  • Page 178 Appendix Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ Inter- Net- Machine IPv4 Address face work ❍...
  • Page 179 User Settings Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ Inter- IEEE Communication Mode face 802.11b ❍...
  • Page 180 Appendix Tab Names Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. Administrator Address Book Management Tools Prgrm/Change/Delete Group ❍...
  • Page 181: Web Image Monitor Setting

    User Settings Web Image Monitor Setting ❖ Device Settings The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Settings Admin-...
  • Page 182 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ Timer Auto Off Timer ❍ ❍...
  • Page 183 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ E-mail Administrator E-mail Address ❍...
  • Page 184 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ Auto E-mail Call Service Notification ❍...
  • Page 185 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ User User Authentication Management Authentication ❍...
  • Page 186 Appendix ❖ Printer The default for [Menu Protect] is [Level 2]. Category Settings Menu Protect Level 1 Level 2 ❍ System Print Error Report ❍ Auto Continue ❍ Memory Overflow ❍ ❍ Auto Delete Temporary Print Jobs ❍ ❍ Auto Delete Stored Print Jobs ❍...
  • Page 187 User Settings Category Settings Menu Protect Level 1 Level 2 ❍ Duplex PDF Settings ❍ Blank Page Print ❍ Resolution ❍ Edge to Edge Print Tray Parameters Tray Parameters ❍ (PCL) Tray Parameters Tray Parameters ❍ (PS) PDF Temporary PDF Temporary Password ❍...
  • Page 188 Appendix Names Settings Menu Protect Level 1 Level 2 ❍ IP-Fax Settings Enable H.323 ❍ Enable IP-Fax Gatekeeper ❍ Gatekeeper Address(Main) ❍ Gatekeeper Address(Sub) ❍ Own Fax No. ❍ Enable SIP ❍ Enable SIP Server ❍ SIP Server IP Address ❍...
  • Page 189 User Settings ❖ Interface The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Settings Admin-...
  • Page 190 Appendix ❖ Network The settings available to the user depend on whether or not administrator au- thentication has been specified. If administrator authentication has been specified, the settings available to the user depend on whether or not "Available Settings" has been specified. Category Settings Admin-...
  • Page 191 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ IPv4 Host Name ❍ ❍...
  • Page 192 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ IPv6 Host Name ❍ ❍ Domain Name ❍...
  • Page 193 User Settings Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ ❍ ❍ Workgroup Name ❍...
  • Page 194 Appendix Category Settings Admin- Administrator au- istrator thentication has authen- been specified. tication "Availa- "Availa- has not ble Set- ble Set- been tings" has tings" has speci- been not been fied. specified. specified. ❍ ❍ Bonjour Bonjour ❍ ❍ Computer Name ❍...
  • Page 195: Functions That Require Options

    Functions That Require Options Functions That Require Options The following functions require certain options and additional functions. • PDF Direct Print function PostScript 3 Unit...
  • Page 196: Index

    INDEX Access Control , 103 Host Interface , 148 Address Book , 159 Address Management Tool , 159 Administrator , 4 Interface , 181 Administrator Authentication , 4 Interface Settings , 144 , 151 , 152 , 155 Administrator Tools , 146 , 147 , 149 , 151 , IP-Fax Settings , 153 153 , 157 , 158 IPv4 , 155...
  • Page 197 RC Gate , 151 User , 4 Read-only , 160 User Administrator , 12 , 91 , 160 Reception Settings , 147 User Authentication , 4 Registered User , 4 , 160 User Management Tool , 151 @Remote Service , 127 Reset Device , 149 Reset Printer Job , 149 Webpage , 151 , 156 , 157 , 159...
  • Page 198 MEMO B284-7609...
  • Page 199 Adobe Systems, Incorporated. NetWare is a registered trademarks of Novell, Inc. Bluetooth is a Trademark of the Bluetooth SIG, Inc. (Special Interest Group) and licensed to Ricoh Company Limited. Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
  • Page 200 Type for MP 161F/Aficio MP 161F/IS 2416F Type for MP 161SPF/Aficio MP 161SPF/IS 2416FPS Printed in China &"%$' B284-7609...

Table of Contents