Aficio MP c2030
Aficio MP c2030
Security Reference
1 Getting Started
2 Administrators/Authentication and its Application
3 Users/Authentication and its Application
4 Protecting Document Data Information from Leaks
5 Managing Access to the Machine
6 Enhanced Network Security
7 Specifying the Extended Security Functions
8 Troubleshooting
9 Appendix
Read this manual carefully before you use this machine and keep it handy for future reference. For safe and correct use, be sure to read the Safety Information
in "About This Machine" before using the machine.
Manuals for This Machine
Read this manual carefully before you use this machine.
Refer to the manuals that are relevant to what you want to do with the machine.
1
Security Reference
This manual is for administrators of the machine. It explains security functions that you can use to
prevent unauthorized use of the machine, data tampering, or information leakage. Be sure to read
this manual when setting the enhanced security functions, or user and administrator authentication.
Other manuals
• Quick Reference Copy Guide
• Quick Reference Printer and Scanner Guide
• Quick Reference Fax Guide
• Manuals for DeskTopBinder Lite
• DeskTopBinder Lite Setup Guide
• DeskTopBinder Introduction Guide
• Auto Document Link Guide
*1 Optional
2
TABLE OF CONTENTS
Manuals for This Machine.................................................................................................................................1
Notice..................................................................................................................................................................9
Important.........................................................................................................................................................9
How to Read This Manual...............................................................................................................................10
Symbols........................................................................................................................................................10
Display..........................................................................................................................................................10
IP Address.....................................................................................................................................................11
Note..............................................................................................................................................................11
Laws and Regulations......................................................................................................................................12
Legal Prohibition..........................................................................................................................................12
1. Getting Started
Before Using the Security Functions................................................................................................................13
Setting Up the Machine...................................................................................................................................14
Enhanced Security............................................................................................................................................16
Glossary............................................................................................................................................................17
Security Measures Provided by this Machine................................................................................................18
Using Authentication and Managing Users...............................................................................................18
Ensuring Information Security.....................................................................................................................18
Limiting and Controlling Access..................................................................................................................19
Enhanced Network Security.......................................................................................................................20
2. Administrators/Authentication and Its Application
Administrators...................................................................................................................................................21
User Administrator.......................................................................................................................................21
Machine Administrator................................................................................................................................22
Network Administrator................................................................................................................................22
File Administrator.........................................................................................................................................22
Supervisor.....................................................................................................................................................22
About Administrator Authentication................................................................................................................23
Enabling Administrator Authentication...........................................................................................................24
Specifying Administrator Privileges............................................................................................................24
Registering the Administrator......................................................................................................................26
Logging on Using Administrator Authentication........................................................................................30
Logging off Using Administrator Authentication........................................................................................31
3
Changing the Administrator........................................................................................................................32
Using Web Image Monitor.........................................................................................................................34
3. Users/Authentication and Its Application
Users..................................................................................................................................................................35
About User Authentication...............................................................................................................................36
Authentication Setting Procedure....................................................................................................................37
Enabling User Authentication..........................................................................................................................39
User Code Authentication...............................................................................................................................40
Specifying User Code Authentication........................................................................................................40
Basic Authentication.........................................................................................................................................46
Specifying Basic Authentication..................................................................................................................46
Authentication Information Stored in the Address Book...........................................................................51
Specifying Login User Name and Login Password...................................................................................51
Specifying Authentication Information to Log on......................................................................................54
Windows Authentication.................................................................................................................................58
Specifying Windows Authentication..........................................................................................................59
LDAP Authentication.........................................................................................................................................69
Specifying LDAP Authentication.................................................................................................................70
Integration Server Authentication....................................................................................................................78
Specifying Integration Server Authentication............................................................................................78
Printer Job Authentication................................................................................................................................87
If User Authentication is Specified..................................................................................................................89
User Code Authentication (Using the Control Panel)................................................................................89
User Code Authentication (Using a Printer Driver)....................................................................................89
Login (Using the Control Panel)..................................................................................................................90
Log Off (Using the Control Panel)..............................................................................................................90
Login (Using a Printer Driver)......................................................................................................................91
Login (Using Web Image Monitor)............................................................................................................91
Log Off (Using Web Image Monitor).........................................................................................................91
User Lockout Function..................................................................................................................................91
Auto Logout..................................................................................................................................................94
Authentication Using an External Device.......................................................................................................96
4
4. Protecting Document Data Information from Leaks
Preventing Unauthorized Copying.................................................................................................................97
Unauthorized Copy Prevention..................................................................................................................98
Data Security for Copying..........................................................................................................................99
Printing Limitations.....................................................................................................................................100
Notice.........................................................................................................................................................100
Printing with Unauthorized Copy Prevention and Data Security for Copying.....................................101
Preventing Data Leaks Due to Unauthorized Transmission........................................................................103
Restrictions on Destinations.......................................................................................................................103
Protecting the Address Book.........................................................................................................................105
Address Book Access Permission.............................................................................................................105
Encrypting Data in the Address Book......................................................................................................108
5. Managing Access to the Machine
Preventing Modification of Machine Settings..............................................................................................111
Menu Protect..................................................................................................................................................113
Set up Menu Protect..................................................................................................................................113
Limiting Available Functions..........................................................................................................................117
Specifying Which Functions are Available.............................................................................................117
Managing Log Files.......................................................................................................................................120
Using the Control Panel to Specify Log File Settings..............................................................................120
Using Web SmartDeviceMonitor to Manage Log Files.........................................................................123
Using Web Image Monitor to Manage Log Files...................................................................................123
6. Enhanced Network Security
Preventing Unauthorized Access..................................................................................................................127
Access Control...........................................................................................................................................127
Enabling/Disabling Protocols..................................................................................................................128
Specifying Network Security Level..........................................................................................................135
Encrypting Transmitted Passwords...............................................................................................................139
Driver Encryption Key...............................................................................................................................139
IPP Authentication Password.....................................................................................................................141
Protection Using Encryption..........................................................................................................................142
SSL (Secure Sockets Layer) Encryption....................................................................................................142
User Settings for SSL (Secure Sockets Layer)..........................................................................................147
5
Setting the SSL / TLS Encryption Mode...................................................................................................147
SNMPv3 Encryption.................................................................................................................................149
Transmission Using IPsec...............................................................................................................................152
Encryption and Authentication by IPsec..................................................................................................152
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings...................................153
IPsec Settings.............................................................................................................................................154
Encryption Key Auto Exchange Settings Configuration Flow................................................................161
Encryption Key Manual Settings Configuration Flow.............................................................................166
telnet Setting Commands..........................................................................................................................167
Authentication by telnet.................................................................................................................................175
"authfree" Command.................................................................................................................................175
Authentication by IEEE802.1X.....................................................................................................................176
7. Specifying the Extended Security Functions
Specifying the Extended Security Functions................................................................................................177
Changing the Extended Security Functions.............................................................................................177
Procedure for Changing the Extended Security Functions.....................................................................177
Settings.......................................................................................................................................................178
Other Security Functions...............................................................................................................................183
Fax Function...............................................................................................................................................183
Limiting Machine Operation to Customers Only.........................................................................................184
Settings.......................................................................................................................................................184
Specifying Service Mode Lock Preparation............................................................................................184
Canceling Service Mode Lock.................................................................................................................185
8. Troubleshooting
Authentication Does Not Work Properly.....................................................................................................187
A Message Appears.................................................................................................................................187
Machine Cannot Be Operated................................................................................................................189
9. Appendix
Supervisor Operations..................................................................................................................................193
Logging on as the Supervisor...................................................................................................................193
Logging off as the Supervisor...................................................................................................................194
Changing the Supervisor..........................................................................................................................194
Resetting an Administrator's Password....................................................................................................197
6
Machine Administrator Settings....................................................................................................................200
System Settings..........................................................................................................................................200
Copier Features.........................................................................................................................................201
Facsimile Features.....................................................................................................................................202
Printer Features..........................................................................................................................................202
Settings via Web Image Monitor.............................................................................................................203
Settings via SmartDeviceMonitor for Admin...........................................................................................206
Network Administrator Settings....................................................................................................................207
System Settings..........................................................................................................................................207
Settings via Web Image Monitor.............................................................................................................207
Settings via SmartDeviceMonitor for Admin...........................................................................................209
File Administrator Settings.............................................................................................................................210
System Settings..........................................................................................................................................210
Settings via Web Image Monitor.............................................................................................................210
User Administrator Settings...........................................................................................................................211
System Settings..........................................................................................................................................211
Settings via Web Image Monitor.............................................................................................................211
Settings via SmartDeviceMonitor for Admin...........................................................................................212
The Privilege for User Account Settings in the Address Book.....................................................................213
User Settings - Control Panel Settings..........................................................................................................215
Copier Features..............................................................................................................................................216
Printer Features...............................................................................................................................................217
Facsimile Features..........................................................................................................................................220
System Settings...............................................................................................................................................222
User Settings - Web Image Monitor Settings..............................................................................................226
Device Settings...............................................................................................................................................227
Printer..............................................................................................................................................................232
Fax..................................................................................................................................................................234
Interface..........................................................................................................................................................236
Network..........................................................................................................................................................237
Webpage.......................................................................................................................................................241
Functions That Require Options....................................................................................................................242
Trademarks.....................................................................................................................................................243
7
INDEX...........................................................................................................................................................245
8
Notice
Important
In no event will the company be liable for direct, indirect, special, incidental, or consequential damages
as a result of handling or operating the machine.
For good copy quality, the supplier recommends that you use genuine toner from the supplier.
The supplier shall not be responsible for any damage or expense that might result from the use of parts
other than genuine parts from the supplier with your office products.
9
How to Read This Manual
Symbols
Indicates points to pay attention to when using the machine, and explanations of likely causes of paper
misfeeds, damage to originals, or loss of data. Be sure to read these explanations.
Indicates supplementary explanations of the machine's functions, and instructions on resolving user errors.
This symbol is located at the end of sections. It indicates where you can find further relevant information.
[]
Indicates the names of keys that appear on the machine's display panel.
[]
Indicates the names of keys on the machine's control panel.
Display
The display panel shows machine status, error messages, and function menus.
When you select or specify an item on the display panel, it is highlighted like .
The copy display is set as the default screen when the machine is turned on.
10
Reading the Display and Using Keys
1 2
4 BLR001S
1. [Escape] key
Press to cancel an operation or return to the previous display.
2. [OK] key
Press to set a selected item or entered numeric value.
3. Scroll keys
Press to move the cursor to each direction one by one.
When [ ][ ][ ], or [ ] key appears in this manual, press the scroll key of the same direction.
4. Selection keys
Correspond to items at the bottom line on the display.
Example: initial copy display
• When the instruction "press [100%]" appears in this manual, press the left selection key.
• When the instruction "press [R/E]" appears in this manual, press the center selection key.
When the instruction "press [Auto R/E]" appears in this manual, press the right selection key.
IP Address
In this manual, "IP address" covers both IPv4 and IPv6 environments. Read the instructions that are relevant
to the environment you are using.
Note
11
Laws and Regulations
Legal Prohibition
Do not copy or print any item for which reproduction is prohibited by law.
Copying or printing the following items is generally prohibited by local law:
bank notes, revenue stamps, bonds, stock certificates, bank drafts, checks, passports, driver's licenses.
The preceding list is meant as a guide only and is not inclusive. We assume no responsibility for its
completeness or accuracy. If you have any questions concerning the legality of copying or printing certain
items, consult with your legal advisor.
This machine is equipped with a function that prevents making counterfeit bank bills. Due to this function
the original images similar to bank bills may not be copied properly.
12
1. Getting Started
This chapter describes the machine's security features and how to specify initial security settings.
1
Before Using the Security Functions
• If the security settings are not specified, the machine may be damaged by malicious attackers.
1. To prevent this machine being stolen or willfully damaged, etc., install it in a secure location.
2. Purchasers of this machine must make sure that people who use it do so appropriately, in accordance
with operations determined by the machine administrator. If the administrator does not make the
required security settings, there is a risk of security breaches by users.
3. Before setting this machine's security features and to ensure appropriate operation by users,
administrators must read the Security Reference completely and thoroughly, paying particular
attention to the section entitled "Before Using the Security Functions".
4. Administrators must inform users regarding proper usage of the security functions.
5. Administrators should routinely examine the machine's logs to check for irregular and unusual events.
6. If this machine is connected to a network, its environment must be protected by a firewall or similar.
7. For protection of data during the communication stage, apply the machine's communication security
functions and connect it to devices that support security functions such as encrypted communication.
13
1. Getting Started
4. Press [Interface Settings] using [ ] or [ ], and then press the [OK] key.
6. Specify IP Address.
7. Connect the machine to the network.
8. Start Web Image Monitor, and then log on to the machine as the administrator.
9. Install the device certificate.
10. Enable secure sockets layer (SSL).
11. Enter the administrator's user name and password.
The administrator's default account (user name: "admin"; password: blank) is unencrypted between
steps 7 to 10. If acquired during this time, this account information could be used to gain unauthorized
access to the machine over the network.
If you consider this risky, we recommend that you specify a temporary administrator
password between steps 1 and 7.
14
Setting Up the Machine
15
1. Getting Started
Enhanced Security
This machine's security functions can be enhanced by managing the machine and its users using the
1 improved authentication functions.
By specifying access limits for the machine's functions and the documents and data stored in the machine,
information leaks and unauthorized access can be prevented.
Data encryption also prevents unauthorized data access and tampering via the network.
The machine also automatically checks the configuration and supplier of the firmware each time the main
power is switched on and whenever firmware is installed.
Authentication and Access Limits
Using authentication, administrators manage the machine and its users. To enable authentication,
information about both administrators and users must be registered in order to authenticate users via
their login user names and passwords.
Four types of administrators manage specific areas of machine usage, such as settings and user
registration.
Access limits for each user are specified by the administrator responsible for user access to machine
functions and documents and data stored in the machine.
For details about the administrator, see "Administrators".
For details about the user, see "Users".
Encryption Technology
This machine can establish secure communication paths by encrypting transmitted data and
passwords.
• p.21 "Administrators"
• p.35 "Users"
16
Glossary
Glossary
Administrator
There are four types of administrators according to administrative function: machine administrator, 1
network administrator, file administrator, and user administrator. We recommend that only one person
takes each administrator role.
In this way, you can spread the workload and limit unauthorized operation by a single administrator.
Basically, administrators make machine settings and manage the machine; but they cannot perform
normal operations, such as copying and printing.
User
A user performs normal operations on the machine, such as copying and printing.
Registered User
Users with personal information registered in the Address Book who have a login password and user
name.
Administrator Authentication
Administrators are authenticated by their login user name and login password, supplied by the
administrator, when specifying the machine's settings or accessing the machine over the network.
User Authentication
Users are authenticated by a login user name and login password, supplied by the user, when
specifying the machine's settings or accessing the machine over the network.
The user's login user name and password, as well as such personal information items as facsimile
number, are stored in the machine's Address Book. Personal information can be obtained from the
Windows domain controller (Windows authentication), LDAP Server (LDAP authentication), or
Integration Server (Integration Server authentication) connected to the machine via the network. The
"Integration Server" is the computer on which Authentication Manager is installed.
Login
This action is required for administrator authentication and user authentication. Enter your login user
name and login password on the machine's control panel. A login user name and login password
may also be required when accessing the machine over the network or using such utilities as Web
Image Monitor and SmartDeviceMonitor for Admin.
Logout
This action is required with administrator and user authentication. This action is required when you
have finished using the machine or changing the settings.
17
1. Getting Started
Enabling Authentication
To control administrators' and users' access to the machine, perform administrator authentication and
user authentication using login user names and login passwords. To perform authentication, the
authentication function must be enabled. For details about authentication settings, see "Authentication
Setting Procedure".
Specifying Authentication Information to Log on
Users are managed using the personal information managed in the machine's Address Book.
By enabling user authentication, you can allow only people registered in the Address Book to use the
machine. Users can be managed in the Address Book by the user administrator. For information on
specifying information to log on, see "Basic Authentication".
Specifying Which Functions are Available
This can be specified by the user administrator. Specify the functions available to registered users. By
making this setting, you can limit the functions available to users. For information on how to specify
which functions are available, see "Limiting Available Functions".
18
Security Measures Provided by this Machine
19
1. Getting Started
20
2. Administrators/Authentication and
Its Application
Administrators
Administrators manage user access to the machine and various other important functions and settings.
2
When an administrator controls limited access and settings, first select the machine's administrator, enable
the authentication function, and then use the machine. When the authentication function is enabled, the
login user name and login password are required in order to use the machine. There are four types of
administrators: machine administrator, network administrator, file administrator and user administrator.
Sharing administrator tasks eases the burden on individual administrators while also limiting unauthorized
operation by administrators. One person can act as more than one type of administrator. You can also
specify a supervisor who can change each administrator's password. Administrators cannot use functions
such as copying and printing. To use these functions, the administrator must be authenticated as the user.
For instructions on registering the administrator, see "Registering the Administrator", and for instructions on
changing the administrator's password, see "Supervisor Operations". For details on Users, see "Users".
• If user authentication is not possible because of a problem with the network, you can use the machine
by accessing it using administrator authentication and disabling user authentication. Do this if, for
instance, you need to use the machine urgently.
User Administrator
This is the administrator who manages personal information in the Address Book.
A user administrator can register/delete users in the Address Book or change users' personal information.
Users registered in the Address Book can also change and delete their own information.
If any of the users forget their password, the user administrator can delete it and create a new one, allowing
the user to access the machine again.
21
2. Administrators/Authentication and Its Application
Machine Administrator
This is the administrator who mainly manages the machine's default settings. You can set the machine so
that the default for each function can only be specified by the machine administrator. By making this setting,
you can prevent unauthorized people from changing the settings and allow the machine to be used securely
by its many users.
2
Network Administrator
This is the administrator who manages the network settings. You can set the machine so that network settings
such as the IP address can only be specified by the network administrator.
By making this setting, you can prevent unauthorized users from changing the settings and disabling the
machine, and thus ensure correct network operation.
File Administrator
Supervisor
The supervisor can delete an administrator's password and specify a new one. The supervisor cannot
specify defaults or use normal functions. However, if any of the administrators forget their password and
cannot access the machine, the supervisor can provide support.
22
About Administrator Authentication
BBC005S
1. User Administrator
This administrator manages personal information in the Address Book. You can register/delete users in the
Address Book or change users' personal information.
2. Machine Administrator
This administrator manages the machine's default settings. It is possible to enable only the machine administrator
to set data security for copying, log deletion and other defaults.
3. Network Administrator
This administrator manages the network settings. You can set the machine so that network settings such as the IP
address can be specified by the network administrator only.
4. File Administrator
This administrator can confirm the printer log information.
5. Authentication
Administrators must enter their login user name and password to be authenticated.
6. This machine
7. Administrators manage the machine's settings and access limits.
• p.21 "Administrators"
23
2. Administrators/Authentication and Its Application
• Administrator authentication can also be specified via Web Image Monitor. For details see Web
Image Monitor Help.
• You can specify User Code Authentication without specifying administrator authentication.
24
Enabling Administrator Authentication
• If you have enabled Administrator Authentication Management, make sure not to forget the
administrator login user name and login password. If an administrator login user name or login
password is forgotten, a new password must be specified using the supervisor's authority. For
instructions on registering the supervisor, see "Supervisor Operations".
• Be sure not to forget the supervisor login user name and login password. If you do forget them, a
service representative will have to return the machine to its default state. This will result in all data in 2
the machine being lost and the service call may not be free of charge.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Press [Admin. Auth. Management] using [ ] or [ ], and then press the [OK] key.
25
2. Administrators/Authentication and Its Application
2 [Items] appears.
7. Select the settings to manage from [Items] using [ ], and then press the [OK] key.
If administrator authentication has been specified, we recommend only one person take each administrator
role.
The sharing of administrator tasks eases the burden on individual administrators while also limiting
unauthorized operation by a single administrator. You can register up to four login user names
(Administrators 1-4) to which you can grant administrator privileges.
Administrator authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.
If administrator authentication has already been specified, log on using a registered administrator name
and password.
26
Enabling Administrator Authentication
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
6. Press [ ] or [ ] to scroll to the administrator whose access privileges you want to specify,
and then press the [OK] key.
27
2. Administrators/Authentication and Its Application
2
8. Press [Exit].
9. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
10. Select the setting you want to specify using [ ] or [ ], and then press the [OK] key.
11. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.
12. Enter the login user name, and then press the [OK} key.
28
Enabling Administrator Authentication
13. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
14. Enter the login password, and then press the [OK] key. 2
Follow the password policy to make the login password more secure.
15. If a password reentry screen appears, enter the login password, and then press the [OK]
key.
16. Select [Encryption Password] using [ ] or [ ], and then press the [OK] key.
17. Enter the encryption password, and then press the [OK] key.
29
2. Administrators/Authentication and Its Application
18. If a password reentry screen appears, enter the encryption password, and then press the
[OK] key.
2
19. Press [Exit] three times.
• You can use up to 32 alphanumeric characters and symbols when registering login user names and
login passwords. Keep in mind that passwords are case-sensitive.
• User names cannot contain numbers only, a space, colon (:), or quotation mark ("), nor can they be
left blank.
• Do not use Japanese, Traditional Chinese, Simplified Chinese, or Hangul double-byte characters
when entering the login user name or password. If you use multi-byte characters when entering the
login user name or password, you cannot authenticate using Web Image Monitor.
If administrator authentication has been specified, log on using an administrator's user name and password.
This section describes how to log on.
30
Enabling Administrator Authentication
2. Press [Login].
3. Enter the login user name, and then press the [OK] key. 2
When you log on to the machine for the first time as the administrator, enter
"admin".
4. Enter the login password, and then press the [OK] key.
If assigning the administrator for the first time, press the {OK} key without
entering login password.
To log on as an administrator, enter the administrator's login user name and
login password.
• If you try to log on from an operating screen, "Privileges are required. Administrator-login is limited
to setting changes only." appears. Press the [User Tools/Counter] key to change the default.
If administrator authentication has been specified, be sure to log off after completing settings. This section
explains how to log off after completing settings.
31
2. Administrators/Authentication and Its Application
1. Press [Logout].
2 2. Press [Yes].
Change the administrator's login user name and login password. You can also assign administrator
authority to the login user names [Administrator 1] to [Administrator 4]. To combine the authorities of multiple
administrators, assign multiple administrators to a single administrator.
For example, to assign machine administrator authority and user administrator authority to [Administrator
1], press [Administrator 1] in the lines for the machine administrator and the user administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
32
Enabling Administrator Authentication
4. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
8. Press [Exit].
9. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
33
2. Administrators/Authentication and Its Application
10. Select the administrator you want to change settings using [ ] or [ ], and then press the
[OK] key, and re-enter the setting.
2
11. Press [Exit] three times.
You will be automatically logged off.
12. Press the [User Tools/Counter] key.
Using Web Image Monitor, you can log on to the machine and change the administrator settings. This
section describes how to access Web Image Monitor.
For details about Web Image Monitor, see Web Image Monitor Help.
• When logging on as an administrator use the login name and password of an administrator set in the
machine. The default login name is "admin" and the password is blank.
34
3. Users/Authentication and Its
Application
Users
A user performs normal operations on the machine, such as copying and printing. Users are managed
using the personal information in the machine's Address Book, and can use only the functions they are
permitted to access by administrators. By enabling user authentication, you can allow only people
registered in the Address Book to use the machine. Users can be managed in the Address Book by the user
3
administrator. For details about administrator, see "Administrators". For details about registering users in
the Address Book, see "Administrator Tools", General Settings Guide, SmartDeviceMonitor for Admin
Help, or Web Image Monitor Help.
• If user authentication is not possible because of a problem with the network, you can use the machine
by accessing it using administrator authentication and disabling user authentication. Do this if, for
instance, you need to use the machine urgently.
• p.21 "Administrators"
35
3. Users/Authentication and Its Application
BBC004S
1. User
A user performs normal operations on the machine, such as copying and printing.
2. Group
A group performs normal operations on the machine, such as copying and printing.
3. Unauthorized User
4. Authentication
Using a login user name and password, user authentication is performed.
5. This Machine
6. Access Limit
Using authentication, unauthorized users are prevented from accessing the machine.
7. Authorized users and groups can use only those functions permitted by the administrator.
36
Authentication Setting Procedure
37
3. Users/Authentication and Its Application
38
Enabling User Authentication
3
• User Code authentication is used for authenticating on the basis of a user code, and Basic
authentication, Windows authentication, LDAP authentication, and Integration Server authentication
are used for authenticating individual users.
• You can specify User Code authentication without specifying administrator authentication.
• A user code account, that has no more than eight digits and is used for User Code authentication,
can be carried over and used as a login user name even after the authentication method has switched
from User Code authentication to Basic authentication, Windows authentication, LDAP authentication,
or Integration Server authentication. In this case, since the User Code authentication does not have
a password, the login password is set as blank.
• When authentication switches to an external authentication method (Windows authentication, LDAP
authentication, or Integration Server authentication), authentication will not occur, unless the external
authentication device has the carried over user code account previously registered. However, the
user code account will remain in the Address Book of the machine despite an authentication failure.
From a security perspective, when switching from User Code authentication to another authentication
method, we recommend that you delete accounts you are not going to use, or set up a login password.
For details about deleting accounts, see "Deleting a Registered Name", General Settings Guide. For
details about changing passwords, see "Specifying Login User Name and Login Password".
• You cannot use more than one authentication method at the same time.
• User authentication can also be specified via Web Image Monitor. For details, see Web Image
Monitor Help.
39
3. Users/Authentication and Its Application
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
40
User Code Authentication
5. Select [User Code Auth.] using [ ] or [ ], and then press the [Details] key.
7. Select which of the machine's functions you want to limit using [ ] or [ ], and then press the
[ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
User Code Authentication will be applied to the selected functions.
Unselected functions will not be affected.
8. Press the [OK] key.
9. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
41
3. Users/Authentication and Its Application
1. Select [Entire] or [Simple (All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
42
User Code Authentication
Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface (Sim.)], proceed to step 5.
If you specify [USB (Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
43
3. Users/Authentication and Its Application
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for
Start IPv4 Address.
3 5. Select [Parallel Interface (Sim.)] using [ ] or [ ], and then press the [OK] key.
7. Select [USB (Sim.)] using [ ] or [ ], and then press the [OK] key.
44
User Code Authentication
9. Press [Exit].
45
3. Users/Authentication and Its Application
Basic Authentication
Specify this authentication method when using the machine's Address Book to authenticate each user. Using
Basic authentication, you can not only manage the machine's available functions but also limit access to
the personal data in the Address Book. Under Basic authentication, the administrator must specify the
functions available to each user registered in the Address Book.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
46
Basic Authentication
7. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
Basic Authentication will be applied to the selected functions.
Users can use the selected functions only.
8. Press the [OK] key.
9. Select [Printer Job Authentication] using [ ] or [ ], and then press the [ ] key.
47
3. Users/Authentication and Its Application
3
Selecting Entire or Simple (All)
If you select [Entire], you cannot print using a printer driver or a device that does not support authentication.
To print under an environment that does not support authentication, select [Simple (All)] or [Simple
(Limitation)].
If you select [Simple (All)], you can print even with unauthenticated printer drivers or devices. Specify this
setting if you want to print with a printer driver or device that cannot be identified by the machine or if you
do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
1. Select [Entire] or [Simple (All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
48
Basic Authentication
Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface (Sim.)], proceed to step 5.
If you specify [USB (Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
49
3. Users/Authentication and Its Application
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
Select
3 5. Select [Parallel Interface (Sim.)] using [ ] or [ ], and then press the [OK] key.
7. Select [USB (Sim.)] using [ ] or [ ], and then press the [OK] key.
50
Basic Authentication
9. Press [Exit].
This can be specified by the user administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
If you have specified User Authentication, you can specify access limits for individual users and groups of
users. Specify the setting in the Address Book for each user.
Users must have a registered account in the Address Book in order to use the machine when User
Authentication is specified. For details about user registration, see "Registering Names", General Settings
Guide.
User authentication can also be specified via SmartDeviceMonitor for Admin or Web Image Monitor.
In [Address Book Management], specify the login user name and login password to be used for User
Authentication Management.
51
3. Users/Authentication and Its Application
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
52
Basic Authentication
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [Login Authent.Info] using [ ] or [ ], and then press the [OK] key.
11. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.
12. Enter the login name, and then Press the [OK] key.
53
3. Users/Authentication and Its Application
13. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
14. Enter the login password, and then Press the [OK] key.
15. Re-enter the login password, and then Press the [OK] key.
The login user name and password specified in [Address Book Management] can be used as the login
information for "Folder Authentication" and "LDAP Authentication".
54
Basic Authentication
If you do not want to use the login user name and password specified in [Address Book Management] for
"Folder Authentication", or "LDAP Authentication", see "Address Book" General Settings Guide.
For details about specifying login user name and login password, see "Specifying Login User Name and
Login Password".
• When using [Use Auth. Info at Login] for "Folder Authentication" or "LDAP Authentication", a user
name other than "other", "admin", "supervisor" or "HIDE***" must be specified. The symbol "***"
represents any character.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management] using [ ] or [ ], and then press the [OK] key.
55
3. Users/Authentication and Its Application
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
3 and Fax Destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
10. Select [LDAP Authentication] using [ ] or [ ], and then press the [OK] key.
56
Basic Authentication
11. Select [Use Auth. Info at Login] using [ ] or [ ], and then press the [OK] key.
For folder authentication, select [Use Auth. Info at Login] in "Folder Authentication".
For LDAP authentication, select [Use Auth. Info at Login] in "LDAP Authentication".
12. Press the [Escape] key. 3
• When using [Use Auth. Info at Login] for "Folder Authentication" or "LDAP Authentication", a user
name other than "other" , "admin" , "supervisor" or "HIDE***" must be specified. The symbol "***"
represents any character.
57
3. Users/Authentication and Its Application
Windows Authentication
Specify this authentication when using the Windows domain controller to authenticate users who have their
accounts on the directory server. Users cannot be authenticated if they do not have their accounts in the
directory server. Under Windows authentication, you can specify the access limit for each group registered
in the directory server. The Address Book stored in the directory server can be registered to the machine,
enabling user authentication without first using the machine to register individual settings in the Address
Book.
3 Windows authentication can be performed using one of two authentication methods: NTLM or Kerberos
authentication. The operational requirements for both methods are listed below.
Operational Requirements for NTLM authentication
To specify NTLM authentication, the following requirements must be met:
• This machine only supports NTLMv1 authentication.
• A domain controller has been set up in a designated domain.
• This function is supported by the operating systems listed below. To obtain user information when
running Active Directory, use LDAP. If SSL is being used, a version of Windows that supports TLS
v1, SSL v2, or SSL v3 is required.
• Windows NT 4.0 Server
• Windows 2000 Server
• Windows Server 2003/Windows Server 2003 R2
• Windows Server 2008
Operational Requirements for Kerberos authentication
To specify Kerberos authentication, the following requirements must be met:
• A domain controller must be set up in a designated domain.
• The operating system must be able to support KDC (Key Distribution Center). To obtain user
information when running Active Directory, use LDAP. If SSL is being used, a version of Windows
that supports TLSv1, SSLv2, or SSLv3 is required. Compatible operating systems are listed below.
• Windows 2000 Server
• Windows Server 2003/Windows Server 2003 R2
• Windows Server 2008
• During Windows Authentication, data registered in the directory server is automatically registered in
the machine. If user information on the server is changed, information registered in the machine may
be overwritten when authentication is performed.
• Users managed in other domains are subject to user authentication, but they cannot obtain items.
58
Windows Authentication
• If you have created a new user in the domain controller and selected "User must change password
at next logon", log on to the machine from the computer to change the password before logging on
from the machine's control panel.
• If the authenticating server only supports NTLM when Kerberos authentication is selected on the
machine, the authenticating method will automatically switch to NTLM.
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Administrator Authentication Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
59
3. Users/Authentication and Its Application
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
7. Enter the name of the domain controller to be authenticated, and then press the [OK] key.
60
Windows Authentication
You also need to register in the machine the functions available to the global group members.
Create global groups in the machine by entering the names of the global groups registered in the
Windows Server. (Keep in mind that group names are case sensitive.) Then specify the machine
functions available to each group.
If global groups are not specified, users can use the available functions specified in [*Default Group].
If global groups are specified, users not registered in global groups can use the available functions
specified in [*Default Group]. By default, all functions are available to [*Default Group] members.
Specify the limitation on available functions according to user needs.
8. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
3
10. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.
11. Enter the group name, and then press the [OK] key.
61
3. Users/Authentication and Its Application
12. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
3 Windows Authentication will be applied to the selected functions. Users can use the selected functions
only.
13. Press the [OK] key.
16. Select [On] using [ ] or [ ], and then press the [OK] key.
If you do not use secure sockets layer (SSL) for authentication, press [Off].
17. Press [Exit].
62
Windows Authentication
19. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
63
3. Users/Authentication and Its Application
1. Select [Entire] or [Simple (All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
• Under Windows Authentication, you can select whether or not to use secure sockets layer (SSL)
authentication.
• To automatically register user information such as fax numbers under Windows authentication, it is
recommended that communication between the machine and domain controller be encrypted using
SSL.
• Under Windows Authentication, you do not have to create a server certificate unless you want to
automatically register user information such as fax numbers using SSL.
64
Windows Authentication
If you select [Simple (Limitation)], you can print even with unauthenticated printer drivers or devices. Specify
this setting if you want to print with a printer driver or device that cannot be identified by the machine or if
you do not require authentication for printing. However, note that, because the machine does not require
authentication in this case, it may be used by unauthorized users.
1. Select [Simple (Limitation)] using [ ] or [ ], and then press the [Range] key.
3
Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface (Sim.)], proceed to step 5.
If you specify [USB (Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
65
3. Users/Authentication and Its Application
5. Select [Parallel Interface (Sim.)] using [ ] or [ ], and then press the [OK] key.
7. Select [USB (Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
66
Windows Authentication
• Under Windows Authentication, you can select whether or not to use secure sockets layer (SSL)
authentication.
• To automatically register user information such as fax numbers under Windows authentication, it is
recommended that communication between the machine and domain controller be encrypted using
SSL.
• Under Windows Authentication, you do not have to create a server certificate unless you want to
automatically register user information such as fax numbers using SSL.
3
• p.117 "Limiting Available Functions"
1. Start C:\WINNT\SYSTEM32\adminpak.
Setup Wizard starts.
2. Select [Install all of the Administrator Tools], and then click [Next].
3. On the "Start" menu, select [Run].
4. Enter "mmc", and then click [OK].
5. On the "Console", select [Add/Remove Snap-in].
6. Click [Add].
7. Select [Active Directory Schema], and then click [Add].
8. Select [Facsimile Telephone Number].
9. Right-click, and then click [Properties].
10. Select "Replicate this attribute", and then click [Apply].
67
3. Users/Authentication and Its Application
3 6. Click [Install].
7. Enter the contents of the device certificate.
8. In the "Certificate Request" box, enter the contents of the device certificate received from
the certificate authority.
9. Click [OK].
"Installed" appears under "Certificate Status" to show that a device certificate for the machine has
been installed.
10. Click [Logout].
68
LDAP Authentication
LDAP Authentication
Specify this authentication method when using the LDAP server to authenticate users who have their accounts
on the LDAP server. Users cannot be authenticated if they do not have their accounts on the LDAP server.
The Address Book stored in the LDAP server can be registered to the machine, enabling user authentication
without first using the machine to register individual settings in the Address Book. When using LDAP
authentication, to prevent the password information being sent over the network unencrypted, it is
recommended that communication between the machine and LDAP server be encrypted using SSL. You
can specify on the LDAP server whether or not to enable SSL. To do this, you must create a server certificate
for the LDAP server. 3
Using Web Image Monitor, you can specify whether or not to check the reliability of the connecting SSL
server. For details about specifying LDAP authentication using Web Image Monitor, see Web Image
Monitor Help.
• During LDAP authentication, the data registered in the LDAP server is automatically registered in the
machine. If user information on the server is changed, information registered in the machine may be
overwritten when authentication is performed.
• Under LDAP authentication, you cannot specify access limits for groups registered in the LDAP server.
• Enter the user's login user name using up to 32 characters and login password using up to 128
characters.
• Do not use double-byte Japanese, Traditional Chinese, Simplified Chinese, or Hangul characters
when entering the login user name or password. If you use double-byte characters, you cannot
authenticate using Web Image Monitor.
Operational Requirements for LDAP Authentication
To specify LDAP authentication, the following requirements must be met:
• The network configuration must allow the machine to detect the presence of the LDAP server.
• When SSL is being used, TLSv1, SSLv2, or SSLv3 can function on the LDAP server.
• The LDAP server must be registered in the machine.
• When registering the LDAP server, the following setting must be specified.
• Server Name
• Search Base
• Port Number
• SSL Communication
• Authentication
Select either Kerberos, DIGEST, or Cleartext authentication.
• User Name
69
3. Users/Authentication and Its Application
You do not have to enter the user name if the LDAP server supports "Anonymous
Authentication".
• Password
You do not have to enter the password if the LDAP server supports "Anonymous
Authentication".
• When you select Cleartext authentication, LDAP Simplified authentication is enabled. Simplified
authentication can be performed with a user attribute (such as cn, or uid), instead of the DN.
3 • You can also prohibit blank passwords at login for simplified authentication. For details about LDAP
Simplified authentication, contact your sales representative.
• Under LDAP Authentication, if "Anonymous Authentication" in the LDAP server's settings is not set to
Prohibit, users who do not have an LDAP server account might still be able to gain access.
• If the LDAP server is configured using Windows Active Directory, "Anonymous Authentication" might
be available. If Windows authentication is available, we recommend you use it.
• The first time an unregistered user accesses the machine after LDAP authentication has been specified,
the user is registered in the machine and can use the functions available under "Available Functions"
during LDAP Authentication. To limit the available functions for each user, register each user and
corresponding "Available Functions" setting in the Address Book, or specify "Available Functions" for
each registered user. The "Available Functions" setting becomes effective when the user accesses the
machine subsequently.
• To enable Kerberos for LDAP authentication, a realm must be registered beforehand. The realm must
be programmed in capital letters. For details about registering a realm, see the "Programming the
LDAP Server", or "Programming the Realm", General Settings Guide.
• The reference function is not available for SSL servers when a search for LDAP is in progress.
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Administrator Authentication Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
70
LDAP Authentication
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
71
3. Users/Authentication and Its Application
7. Select the LDAP server to be used for LDAP authentication using [ ] or [ ], and then press
the [OK] key.
8. Select [Login Name Attribute] using [ ] or [ ], and then press the [OK] key.
9. Enter the login name attribute, and then press the [OK] key.
You can use the Login Name Attribute as a search criterion to obtain information about an
authenticated user. You can create a search filter based on the Login Name Attribute, select a user,
and then retrieve the user information from the LDAP server so it is transferred to the machine's address
book. The method for selecting the user name depends on the server environment. Check the server
environment and enter the user name accordingly.
10. Select [Unique Attribute] using [ ] or [ ], and then press the [OK] key.
11. Enter the unique attribute, and then press the [OK] key.
Specify Unique Attribute on the machine to match the user information in the LDAP server with that in
the machine. By doing this, if the Unique Attribute of a user registered in the LDAP server matches that
72
LDAP Authentication
of a user registered in the machine, the two instances are treated as referring to the same user. You
can enter an attribute such as "serialNumber" or "uid". Additionally, you can enter "cn" or
"employeeNumber", provided it is unique. If you do not specify the Unique Attribute, an account with
the same user information but with a different login user name will be created in the machine.
12. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.
3
13. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
LDAP Authentication will be applied to the selected functions. Users can use the selected functions
only.
14. Press the [OK] key.
15. Select [Printer Job Authentication] using [ ] or [ ], and then press the [ ] key.
73
3. Users/Authentication and Its Application
1. Select [Entire] or [Simple (All)] using [ ] or [ ], and then press the [OK] key.
2. Press [Exit].
74
LDAP Authentication
1. Select [Simple (Limitation)] using [ ] or [ ], and then press the [Range] key.
Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface (Sim.)], proceed to step 5.
If you specify [USB (Sim.)], proceed to step 7.
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
75
3. Users/Authentication and Its Application
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for Start IPv4 Address.
5. Select [Parallel Interface (Sim.)] using [ ] or [ ], and then press the [OK] key.
3
7. Select [USB (Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
76
LDAP Authentication
77
3. Users/Authentication and Its Application
• During Integration Server Authentication, the data registered in the server is automatically registered
in the machine.
• If user information on the server is changed, information registered in the machine may be overwritten
when authentication is performed.
• The default administrator name for ScanRouter System or Web SmartDeviceMonitor, "Admin," differs
from the server, "admin".
Before beginning to configure the machine, make sure that administrator authentication is properly
configured under "Administrator Authentication Management".
This can be specified by the machine administrator.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
78
Integration Server Authentication
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [User Auth. Management] using [ ] or [ ], and then press the [OK] key.
79
3. Users/Authentication and Its Application
7. Enter the server name, and then press the [OK] key.
9. Select the authentication system for external authentication using [ ] or [ ], and then press
the [OK] key.
11. Enter the domain name, and then press the [OK] key.
You cannot specify a domain name under an authentication system that does not support domain
login.
80
Integration Server Authentication
12. Select [Obtain URL] using [ ] or [ ], and then press the [OK] key.
The machine obtains the URL of the server specified in "Server Name".
If "Server Name" or the setting for enabling SSL is changed after obtaining the URL, the "URL" will be
not obtained. 3
If you set "Authentication Type" to "Windows", you can use the global group.
If you set "Authentication Type" to "Notes", you can use the Notes group.
If you set "Authentication Type" to "Basic (Integration Server)", you can use the groups created using
the Authentication Manager.
13. Select [Prgrm./Change/Delete Group] using [ ] or [ ], and then press the [OK] key.
14. Select [Program/Change] using [ ] or [ ], and then press the [OK] key.
15. Select [*Not Programmed] using [ ] or [ ], and then press the [OK] key.
16. Enter the group name, and then press the [OK] key.
81
3. Users/Authentication and Its Application
17. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
The box next to a selected item is checked. To deselect the item, press [ ].
3 Integration Server Authentication will be applied to the selected functions.
Users can use the selected functions only.
18. Press the [OK] key, and then press the [Escape] key twice.
19. Select [SSL] using [ ] or [ ], and then press the [OK] key.
20. Select [On] using [ ] or [ ], and then press the [OK] key.
To not use secure sockets layer (SSL) for authentication, press [Off].
21. Press [Exit].
82
Integration Server Authentication
22. Select [Integration Svr. Auth.] using [ ] or [ ], and then press [Details].
23. Select [Printer Job Authentication] using [ ] or [ ], and then press the [OK] key.
1. Select [Entire] or [Simple (All)] using [ ] or [ ], and then press the [OK] key.
83
3. Users/Authentication and Its Application
2. Press [Exit].
1. Select [Simple (Limitation)] using [ ] or [ ], and then press the [Range] key.
Specify the range in which [Simple (Limitation)] is applied to Printer Job Authentication.
If you specify IPv4 address range, proceed to step 2.
If you specify [Parallel Interface (Sim.)], proceed to step 5.
If you specify [USB (Sim.)], proceed to step 7.
84
Integration Server Authentication
2. Select [IPv4 Address 1], [IPv4 Address 2], [IPv4 Address 3], [IPv4 Address 4] or [IPv4
Address 5] using [ ] or [ ], and then press the [OK] key.
3. Enter the Start IPv4 Address, and then press the [OK] key.
You can specify the IPv4 address range to which this setting is applied.
4. Enter the End IPv4 Address, and then press the [OK] key.
Be sure the number you enter for End IPv4 Address is larger than that for
Start IPv4 Address.
5. Select [Parallel Interface (Sim.)] using [ ] or [ ], and then press the [OK] key.
85
3. Users/Authentication and Its Application
7. Select [USB (Sim.)] using [ ] or [ ], and then press the [OK] key.
9. Press [Exit].
86
Printer Job Authentication
[Simple [Simple
[Printer Job Authentication] [Entire] [Entire]
(All)] (All)]
87
3. Users/Authentication and Its Application
• [Simple (All)]
The machine authenticates printer jobs and remote settings that have authentication information,
and cancels the jobs and settings that fail authentication.
Printer jobs and settings without authentication information are performed without being
authenticated.
• [Simple (Limitation)]
You can specify the range to apply [Simple (Limitation)] to by specifying [Parallel Interface
(Sim.)], [USB (Sim.)], and the client's IPv4 address.
3 Printer Job Types
1. In the RPCS printer driver dialog box, the "Confirm authentication information when printing"
and "Encrypt" check boxes are selected. In the PCL printer driver dialog box, the "User
Authentication" and "Encrypt" check boxes are selected. Personal authentication information is
added to the printer job. The printer driver applies advanced encryption to the login passwords.
The printer driver encryption key enables driver encryption and prevents the login password
from being stolen.
For details about prohibiting the use of simple encryption using "Restrict Use of Simple
Encryption", see "Specifying the Extended Security Functions".
2. In the RPCS printer driver dialog box, the "Confirm authentication information when printing"
check box is selected. In the PCL printer driver dialog box, the "User Authentication" and "Encrypt"
check boxes are selected. Personal authentication information is added to the printer job. The
printer driver applies simple encryption to login passwords.
For details about turning off "Restrict Use of Simple Encryption" and allowing the use of simple
encryption, see "Specifying the Extended Security Functions".
3. In the RPCS printer driver dialog box, the "Confirm authentication information when printing"
check box is not selected. In the PCL printer driver dialog box, the "User Authentication" check
box is not selected. Personal authentication information is added to the printer job and is disabled.
4. A printer job is sent from a host computer without a printer driver and is printed via LPR. Personal
authentication information is not added to the printer job. The above is also true for Mail to Print.
For details about Mail to Print, see " Reception", Facsimile Reference.
5. A PDF file is printed via ftp. Personal authentication is performed using the user ID and password
used for logging on via ftp. However, the user ID and password are not encrypted.
88
If User Authentication is Specified
Enter a user code (up to 8 digits), and then press the [OK] key.
When User Code Authentication is set, specify a user code in printer properties on the printer driver. For
details, see the printer driver Help.
89
3. Users/Authentication and Its Application
Use the following procedure to log in when Basic Authentication, Windows Authentication, LDAP
Authentication, or Integration Server Authentication is enabled.
1. Enter a login user name, and then press the [OK] key.
3
2. Enter a login password, and then press the [OK] key.
When the user is authenticated, the screen for the function you are using appears.
Follow the procedure below to log off when Basic Authentication, Windows Authentication, or LDAP
Authentication is set.
3. Press [Yes].
90
If User Authentication is Specified
When Basic Authentication, Windows Authentication, or LDAP Authentication is set, make encryption
settings in printer properties on the printer driver, and then specify a login user name and password. For
details, see the printer driver Help.
• For user code authentication, enter a user code in "User Name", and then click [Login].
• Delete the cache memory in the Web Image Monitor after logging off.
If an incorrect password is entered several times, the User Lockout function prevents further login attempts
under the same user name. Even if the locked out user enters the correct password later, authentication will
fail and the machine cannot be used until the lockout period elapses or an administrator or supervisor
disables the lockout.
To use the lockout function for user authentication, the authentication method must be set to Basic
authentication. Under other authentication methods, the lockout function protects supervisor and
administrator accounts only, not general user accounts.
Lockout setting items
The lockout function settings can be made using Web Image Monitor.
91
3. Users/Authentication and Its Application
92
If User Authentication is Specified
3. Click [Login].
The machine administrator can log on.
Enter the login user name and login password.
4. Click [Configuration], and then click [User Lockout Policy] under "Security".
The User Lockout Policy page appears.
5. Set "Lockout" to [Active].
6. In the drop down menu, select the number of login attempts to permit before applying
lockout.
7. Set the "Lockout Release Timer" to [Active].
3
8. In the "Lock Out User for" field, enter the number of minutes until lockout is disabled.
9. Click [OK].
User Lockout Policy is set.
10. Click [OK].
11. Click [Logout].
93
3. Users/Authentication and Its Application
Auto Logout
3. Select [Timer Settings] using [ ] or [ ], and then press the [OK] key.
4. Select [Auto Logout Timer] using [ ] or [ ], and then press the [OK] key.
94
If User Authentication is Specified
6. Enter "60" to "999" (seconds) using the number keys, and then press the [OK] key.
95
3. Users/Authentication and Its Application
96
4. Protecting Document Data
Information from Leaks
This chapter describes how to protect document data and information transmitted through the network from
unauthorized viewing and modification.
• p.101 "Specifying Printer Settings for Unauthorized Copy Prevention (Printer Driver Setting)"
• p.101 "Specifying Printer Settings for Data Security for Copying (Printer Driver Setting)"
• p.102 "Specifying Data Security for Copying (Machine Setting)"
97
4. Protecting Document Data Information from Leaks
Using the printer driver, you can embed mask and pattern (for instance, a warning such as "No Copying")
in the printed document.
If the document is copied, faxed or scanned by a copier or multifunction printer, the embedded pattern
appears clearly on the copy, discouraging unauthorized copying.
To use the printer function when User Authentication is enabled, you must enter the login user name and
password for the printer driver. For details, see the printer driver Help.
• Unauthorized copy prevention discourages unauthorized copying, but will not necessarily stop
4 information leaks.
• The embedded pattern cannot be guaranteed to be copied, faxed or scanned properly.
• Depending on the machine and scanner settings, the embedded pattern may not be copied, scanned
or faxed.
BBK004S
1. Printed Documents
Using the printer driver, you can embed background images and pattern in a printed document for Unauthorized
Copy Prevention.
2. The document is copied, faxed or scanned.
3. Printed Copies
The embedded pattern (for instance, a warning such as "No Copying") in a printed document appears clearly
in printed copies.
• To make the embedded pattern clear, set the character size to at least 50 pt (preferably 70 to 80 pt)
and character angle to between 30 and 40 degrees.
98
Preventing Unauthorized Copying
Using the printer driver to enable the data security for copying function, you can print a document with an
embedded pattern of hidden text. Such a document is called a data security for copying document.
If a data security for copying document is copied using a copier or multi-function printer with the Copy
Data Security Unit, protected pages are grayed out in the copy, preventing confidential information from
being copied. Also if a document with embedded pattern is detected, the machine beeps. An unauthorized
copy log is also stored. To gray out copies of data security for copying documents when they are copied,
faxed or scanned, the optional Copy Data Security Unit must be installed in the machine.
• If a document with embedded pattern for data security for copying is copied, faxed or scanned by
a copier or multi-function printer without the Copy Data Security Unit, the embedded pattern appears 4
conspicuously in the copy. However, character relief may differ depending on the copier or
multifunction printer model in use or document scan setting.
• The machine does not beep with a data security for copying document is detected while using the
network TWAIN scanner.
BBK005S
99
4. Protecting Document Data Information from Leaks
• You can also embed pattern in a document protected by data security for copying. However, if such
a document is copied using a copier or multi-function printer with the Copy Data Security Unit, the
copy is grayed out, so the embedded pattern does not appear on the copy.
• If misdetection occurs, contact your service representative.
• If a document with embedded pattern for data security for copying is copied, faxed or scanned using
a copier or multi-function printer without the Copy Data Security Unit, the embedded pattern appears
clearly on the copy.
• If a data security for copying document is detected, the machine beeps.
• If the scanned data security for copying document is registered as a user stamp, the machine does
not beep. The file registered as a user stamp is grayed out, and no entry is added to the unauthorized
4 copying log.
Printing Limitations
The following is a list of limitations on printing with unauthorized copy prevention and data security for
copying.
Unauthorized copy prevention / Data security for copying
You can print using only the RPCS printer driver.
You cannot print at 200 dpi resolution.
You cannot partially embed pattern in the printed document.
You can only embed pattern that is entered in the text box of the printer driver.
Printing with embedding takes longer than normal printing.
Data security for copying Only
Select 182 257 mm / 7.2 10.1 inches or larger as the paper size.
Select a paper type of Plain or Recycled with a brightness of 70% or more.
If you select Duplex, the data security for copying function may not work properly due to printing on
the back of sheets.
Notice
1. The supplier does not guarantee that unauthorized copy prevention and data security for copying
will always work. Depending on the paper, the model of the copier or multi-function printer, and the
copier or printer settings, unauthorized copy prevention and data security for copying may not work
properly.
100
Preventing Unauthorized Copying
2. The supplier is not liable for any damage caused by using or not being able to use unauthorized copy
prevention and data security for copying.
Printing with Unauthorized Copy Prevention and Data Security for Copying
This section describes Printing with Unauthorized Copy Prevention and Data Security for Copying.
Specifying Printer Settings for Unauthorized Copy Prevention (Printer Driver Setting)
Using the printer driver, specify the printer settings for unauthorized copy prevention.
To use the printer function when User Authentication is enabled, you must enter the login user name and
password for the printer driver. For details about logging in, see the printer driver Help. 4
For details about specifying data security for copying using the printer driver, see the printer driver Help.
Specifying Printer Settings for Data Security for Copying (Printer Driver Setting)
If a printed document using this function is copied by a copier or multi-function printer, the copy is grayed
out.
Using the printer driver, specify the printer settings for data security for copying.
To use the printer function when User Authentication is enabled, you must enter the login user name and
password for the printer driver. For details about logging in, see the printer driver Help.
For details about specifying data security for copying using the printer driver, see the printer driver Help.
101
4. Protecting Document Data Information from Leaks
• If a document that is not copy-guarded is copied, faxed or scanned, the copy or stored file is not
grayed out.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Data Security for Copying] using [ ] or [ ], and then press the [OK] key.
5. Select the setting you want to change using [ ] or [ ], and then press the [OK] key.
If you do not want to specify [Data Security for Copying], select [Off].
6. Press the [User Tools/Counter] key.
102
Preventing Data Leaks Due to Unauthorized Transmission
Restrictions on Destinations
4
This can be specified by the user administrator.
Make the setting to disable the direct entry of phone numbers under the fax functions.
By making this setting, the destinations are restricted to addresses registered in the Address Book.
If you set "Restrict Use of Destinations" to [On], you can prohibit users from directly entering telephone
numbers in order to send files. If you set "Restrict Use of Destinations" to [Off], "Restrict Adding of User
Destinations" appears. In "Restrict Adding of User Destinations", you can restrict users from registering data
in the Address Book.
If you set "Restrict Adding of User Destinations" to [Off], users can directly enter destination telephone
numbers in "Program Dest." on the fax screens. If you set "Restrict Adding of User Destinations" to [On],
users can specify destinations directly, but cannot use "Program Dest." to register data in the Address Book.
When this setting is made, only the user administrator can change the Address Book. "Restrict Use of
Destinations" and "Restrict Adding of User Destinations" are extended security functions. For more
information about these and the extended security functions, see "Specifying the Extended Security
Functions".
"Restrictions on Destinations" can also be specified using Web Image Monitor or SmartDeviceMonitor for
Admin. For details, see the Help for these applications.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
103
4. Protecting Document Data Information from Leaks
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
4
5. Select [Restrict Use of Dest.] using [ ] or [ ], and then press the [OK] key.
104
Protecting the Address Book
This can be specified by the registered user. Access permission can also be specified by a user granted
full control or the user administrator.
You can specify who is allowed to access the data in the Address Book. 4
By making this setting, you can prevent the data in the Address Book being used by unregistered users.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Press [Address Book Management] using [ ] or [ ], and then press the [OK] key.
105
4. Protecting Document Data Information from Leaks
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
4
By pressing [Search], you can search by Name, Display Destination List, Registration No., User Code
and Fax Destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Protect] using [ ] or [ ], and then press the [OK] key.
106
Protecting the Address Book
10. Select [Dest.Protect: Permissions] using [ ] or [ ], and then press the [OK] key.
4
12. Select the users or groups to register.
14. Select the permission, and then press the [OK] key.
Select the permission, from [Read-only], [Edit], [Edit/Delete], or [Full Control].
To register multiple users, repeat steps 12 to 14.
107
4. Protecting Document Data Information from Leaks
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
108
Protecting the Address Book
5. Select [Encrypt Address Book] using [ ] or [ ], and then press the [OK] key.
6. Select the setting you want to change using [ ] or [ ], and then press [Enc.Key].
4
7. Enter the encryption key, and then press the [OK] key.
109
4. Protecting Document Data Information from Leaks
Do not switch the main power off during encryption, as doing so may corrupt the data.
Encrypting the data in the Address Book may take a long time.
The time it takes to encrypt the data in the Address Book depends on the number of registered users.
The machine cannot be used during encryption.
Normally, once encryption is complete, [Exit] appears.
If you press [Stop] during encryption, the data is not encrypted.
If you press [Stop] during decryption, the data stays encrypted.
11. Press [Exit].
• If you register additional users after encrypting the data in the Address Book, those users are also
encrypted.
110
5. Managing Access to the Machine
This chapter describes how to prevent unauthorized access to and modification of the machine's settings.
111
5. Managing Access to the Machine
• p.21 "Administrators"
• p.26 "Registering the Administrator"
• p.211 "User Administrator Settings"
• p.200 "Machine Administrator Settings"
• p.207 "Network Administrator Settings"
• p.210 "File Administrator Settings"
• p.215 "User Settings - Control Panel Settings"
• p.226 "User Settings - Web Image Monitor Settings"
112
Menu Protect
Menu Protect
The administrator can also limit users' access permission to the machine's settings. The machine's [System
Settings] menu and the printer's regular menus can be locked so they cannot be changed. This function is
also effective when management is not based on user authentication. For a list of settings that users can
specify according to the Menu Protect level, see "User Settings - Control Panel Settings", or "User Settings
- Web Image Monitor Settings".
Copying Functions
To specify [Menu Protect] in [Copier Features], set [Machine Management] to [On] in [Admin. Auth.
Management] in [Administrator Tools] in [System Settings].
113
5. Managing Access to the Machine
3. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.
4. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.
114
Menu Protect
5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
Printer Functions
To specify [Menu Protect] in [Printer Features], set [Machine Management] to [On] in [Admin. Auth.
Management] in [Administrator Tools] in [System Settings].
4. Select [Menu Protect] using [ ] or [ ], and then press the [OK] key.
5. Select the menu protect level using [ ] or [ ], and then press the [OK] key.
115
5. Managing Access to the Machine
116
Limiting Available Functions
This can be specified by the user administrator. Specify the functions available to registered users. By making
this setting, you can limit the functions available to users.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Address Book Management], using [ ] or [ ], and then press the [OK] key.
117
5. Managing Access to the Machine
6. Enter the registration number you want to program using the number keys or the Quick Dial
keys, and then press the [OK] key.
5 By pressing [Search], you can search by Name, Display Destination List, Registration No. and Fax
Destination.
7. Press the [OK] key.
8. Press [Details].
9. Select [Auth. Info] using [ ] or [ ], and then press the [OK] key.
118
Limiting Available Functions
10. Select [Function Permissions] using [ ] or [ ], and then press the [OK] key.
11. Select which of the machine's functions you want to permit using [ ] or [ ], and then press
the [ ] key.
119
5. Managing Access to the Machine
5 Administrator procedures include changing the Date/Time settings, changing the Job Log
function settings, changing the Access Log function settings, deleting all log information, and
changing the Log Encryption settings.
Service representative procedures include specifying whether or not to store job logs and access
logs, and restoring encryption key.
2. Deleting log information
By deleting the log stored in the machine, you can free up space on the hard disk.
3. Transferring log information
You can transfer the log information, which indicates who tried to gain access and at what time.
By transferring the log files, you can check the history data and identify unauthorized access.
120
Managing Log Files
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Transfer Log Setting] using [ ] or [ ], and then press the [OK] key. 5
121
5. Managing Access to the Machine
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
5 4. Select [Delete All Logs] using [ ] or [ ], and then press the [OK] key.
6. Press [Exit].
122
Managing Log Files
For details about using Web SmartDeviceMonitor to manage Log Files, see the manual supplied with the
Using Web SmartDeviceMonitor.
This can be specified by the machine administrator. For details about logging on and logging off with
administrator authentication, see "Logging on Using Administrator Authentication", "Logging off Using
Administrator Authentication".
You can specify the type of log recording and collection level on the control panel, perform log encryption
and also delete all logs.
123
5. Managing Access to the Machine
5. Select [Collect Job Logs] to specify Job Log settings, or select [Collect Access Logs] to specify
Access Log settings, and then select [Active].
6. Specify the recording levels for either [Job Log Collect Level] or [Access Log Collect Level].
The settings shown for "Job Log Collect Settings Listed by Function Type" or "Access Log Collect Settings
Listed by Function Type" vary depending on the collection level selected.
If you change the setting in the list, the setting for [Job Log Collect Level] or [Access Log Collect Level]
automatically changes to [User Settings].
7. Click [OK].
Changes are also reflected in related log settings.
8. Click [Logout].
• The greater the Access Log Collect setting value, the more logs are collected.
5
Transfer Logs
Select to disable log transfer.
When log transfer is inactive, [Inactive] is displayed and this setting cannot be changed. When log transfer
is active, log records can be transferred to the log collection system.
Encrypt Logs
• In order to enable encryption, either [Collect Job Logs] or [Collect Access Logs], or both must be set
to [Active].
124
Managing Log Files
• On this page, "Delete All Logs" does not appear if either [Collect Job Logs] or [Collect Access Logs]
are not set to [Active].
125
5. Managing Access to the Machine
126
6. Enhanced Network Security
This chapter describes how to increase security over the network using the machine's functions.
Access Control
This can be specified by the network administrator using Web Image Monitor. For details, see Web Image
Monitor Help.
The machine can control TCP/IP access.
Limit the IP addresses from which access is possible by specifying the access control range.
For example, if you specify the access control range as [192.168.15.16]-[192.168.15.20], the client PC 6
addresses from which access is possible will be from [192.168.15.16] to [192.168.15.20].
• Using access control, you can limit access involving LPR, RCP/RSH, FTP, SSH/SFTP, Bonjour, SMB,
WSD (Device), WSD (Printer), IPP, DIPRINT, RHPP, Web Image Monitor, SmartDeviceMonitor for
Client or DeskTopBinder. You cannot limit the monitoring of SmartDeviceMonitor for Client. You
cannot limit access involving telnet, or SmartDeviceMonitor for Admin, when using the SNMPv1
monitoring.
127
6. Enhanced Network Security
6. Click [OK].
Access control is set.
7. Click [Logout].
Enabling/Disabling Protocols
• Control Panel
All applications that
• Web Image Monitor operate over IPv4
• telnet cannot be used.
IPv4 - • SmartDeviceMonitor IPv4 cannot be disabled
for Admin from Web Image
Monitor when using
• Web
IPv4 transmission.
SmartDeviceMonitor
• Control Panel
• Web Image Monitor
All applications that
IPv6 - • SmartDeviceMonitor operate over IPv6
for Admin cannot be used.
• Web
SmartDeviceMonitor
• Control Panel
Encrypted transmission
IPsec - • Web Image Monitor
using IPsec is disabled.
• telnet
128
Preventing Unauthorized Access
• Control Panel
• Web Image Monitor
SMB printing functions
SMB TCP:139 • telnet cannot be used.
• SmartDeviceMonitor
for Admin
129
6. Enhanced Network Security
130
Preventing Unauthorized Access
131
6. Enhanced Network Security
• Control Panel
• Web Image Monitor
Cannot print with
• telnet NetWare.
NetWare (IPX/SPX) • SmartDeviceMonitor SNMP over IPX cannot
for Admin be used.
• Web
SmartDeviceMonitor
*1 "Restrict Display of User Information" is one of the Extended Security features. For details about making this
setting, see "Specifying the Extended Security Functions".
132
Preventing Unauthorized Access
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
6
5. Select [Effective Protocol] using [ ] or [ ], and then press the [OK] key.
133
6. Enhanced Network Security
6. Select the protocol you want to specify, and then press the [OK] key.
• For details about how to configure telnet, see "Using telnet", Network and System Guide. For details
about how to configure SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin help.
For details about how to configure Web SmartDeviceMonitor, see the Web SmartDeviceMonitor user
manual.
134
Preventing Unauthorized Access
This can be specified by the network administrator. This setting lets you change the security level to limit
unauthorized access. You can make network security level settings on the control panel, as well as Web
Image Monitor. However, the protocols that can be specified differ.
Set the security level to [Level 0], [Level 1], or [Level 2].
Select [Level 2] for maximum security to protect confidential information. Make this setting when it is
necessary to protect confidential information from outside threats.
Select [Level 1] for moderate security to protect important information. Use this setting if the machine is
connected to the office local area network (LAN).
Select [Level 0] for easy use of all the features. Use this setting when you have no information that needs
to be protected from outside threats.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
135
6. Enhanced Network Security
4. Select [Network Security Level] using [ ] or [ ], and then press the [OK] key.
5. Select the network security level using [ ] or [ ], and then press the [OK] key.
136
Preventing Unauthorized Access
137
6. Enhanced Network Security
Tab Name:NetWare
Tab Name:SNMP
138
Encrypting Transmitted Passwords
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
139
6. Enhanced Network Security
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
5. Select [Driver Encryption Key] using [ ] or [ ], and then press the [OK] key.
"Driver Encryption Key" is one of the extended security functions. For details about this and other
security functions, see "Specifying the Extended Security Functions".
6. Enter the driver encryption key, and then press the [OK] key.
140
Encrypting Transmitted Passwords
• When using the IPP port under Windows XP or Windows Server 2003/Windows Server 2003 R2,
you can use the operating system's standard IPP port.
141
6. Enhanced Network Security
BBC003S
1. To access the machine from a user's computer, request the SSL device certificate and public key.
142
Protection Using Encryption
2. The device certificate and public key are sent from the machine to the user's computer.
3. Create a shared key from the user's computer, and then encrypt it using the public key.
4. The encrypted shared key is sent to the machine.
5. The encrypted shared key is decrypted in the machine using the private key.
6. Transmit the encrypted data using the shared key, and the data is then decrypted at the machine to
attain secure transmission.
Configuration flow (self-signed certificate)
1. Creating and installing the device certificate
Install the device certificate using Web Image Monitor.
2. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
Configuration flow (certificate issued by a certificate authority)
1. Creating the device certificate
Create the device certificate using Web Image Monitor.
The application procedure after creating the certificate depends on the certificate authority. 6
Follow the procedure specified by the certificate authority.
2. Installing the device certificate
Install the device certificate using Web Image Monitor.
3. Enabling SSL
Enable the "SSL/TLS" setting using Web Image Monitor.
• To confirm whether SSL configuration is enabled, enter "https://(the machine's IP address or host
name)/" in your Web browser's address bar to access this machine. If the "The page cannot be
displayed" message appears, check the configuration because the current SSL configuration is invalid.
• If you enable SSL for IPP (printer functions), sent data is encrypted, preventing it from being intercepted,
analyzed, or tampered with.
143
6. Enhanced Network Security
144
Protection Using Encryption
• The issuing location may not be displayed if you request two certificates at the same time. When you
install a certificate, be sure to check the certificate destination and installation procedure.
6
• Using Web Image Monitor, you can create the contents of the device certificate but you cannot send
the certificate application.
• Click [Cancel Request] to cancel the request for the device certificate.
145
6. Enhanced Network Security
Enabling SSL
After installing the device certificate in the machine, enable the SSL setting.
6 This procedure is used for a self-signed certificate or a certificate issued by a certificate authority.
• If you set "Permit SSL/TLS Communication" to [Ciphertext Only], enter "http://(the machine's IP
address or host name)/" to access the machine.
146
Protection Using Encryption
If you have installed a device certificate and enabled SSL (Secure Sockets Layer), you need to install the
certificate on the user's computer.
The network administrator must explain the procedure for installing the certificate to users.
If a warning dialog box appears while accessing the machine using Web Image Monitor or IPP, start the
Certificate Import Wizard and install a certificate.
1. When the Security Alert dialog box appears, click [View Certificate].
The Certificate dialog box appears.
To be able to respond to inquiries from users about such problems as expiry of the certificate, check
the contents of the certificate.
2. Click [Install Certificate...] on the "General" tab.
Certificate Import Wizard starts.
3. Install the certificate by following the Certificate Import Wizard instructions.
6
• For details about how to install the certificate and about where to store the certificate when accessing
the machine using IPP, see Web Image Monitor Help.
• If a certificate issued by a certificate authority is installed in the machine, confirm the certificate store
location with the certificate authority.
By specifying the SSL/TLS encrypted communication mode, you can change the security level.
Encrypted Communication Mode
Using the encrypted communication mode, you can specify encrypted communication.
147
6. Enhanced Network Security
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
5. Select [Permit SSL/TLS Comm.] using [ ] or [ ], and then press the [OK] key.
148
Protection Using Encryption
6. Select the encrypted communication mode using [ ] or [ ], and then press the [OK] key.
Select [Ciphertext Only], [Ciphertext Priority], or [Ciphertext / Clear Text] as the encrypted
communication mode.
7. Press the [User Tools/Counter] key.
• The SSL/TLS encrypted communication mode can also be specified using Web Image Monitor. For
details, see Web Image Monitor Help.
149
6. Enhanced Network Security
3. Select [Interface Settings] using [ ] or [ ], and then press the [OK] key.
5. Select [Permit SNMPv3 Communictn.] using [ ] or [ ], and then press the [OK] key.
6
6. Select [Encryption Only] using [ ] or [ ], and then press the [OK] key.
• To use SmartDeviceMonitor for Admin for encrypting the data for specifying settings, you need to
specify the network administrator's [Encryption Password] setting and [Encryption Key] in [SNMP
Authentication Information] in SmartDeviceMonitor for Admin, in addition to specifying [Permit
SNMPv3 Communication] on the machine. For details about specifying [Encryption Key] in
SmartDeviceMonitor for Admin, see SmartDeviceMonitor for Admin Help.
• If network administrator's [Encryption Password] setting is not specified, the data for transmission may
not be encrypted or sent. For details about specifying the network administrator's [Encryption
Password] setting, see "Registering the Administrator".
150
Protection Using Encryption
151
6. Enhanced Network Security
• When "Inactive" is specified for "Exclude HTTPS Transmission", access to Web Image Monitor can
be lost if the key settings are improperly configured. In order to prevent this, you can specify IPsec to
exclude HTTPS transmission by selecting "Active". When you want to include HTTPS transmission, we
recommend that you select "Inactive" for "Exclude HTTPS Transmission" after confirming that IPsec is
properly configured. When "Active" is selected for "Exclude HTTPS Transmission", even though HTTPS
transmission is not targeted by IPsec, Web Image Monitor might become unusable when TCP is
6 targeted by IPsec from the computer side. If you cannot access Web Image Monitor due to IPsec
configuration problems, disable IPsec in System Settings on the control panel, and then access Web
Image Monitor. For details about enabling and disabling IPsec using the control panel, see "System
Settings", General Settings Guide.
• IPsec is not applied to data obtained through DHCP, DNS, or WINS.
• IPsec compatible operating systems are Windows XP SP2, Windows Vista, Mac OSX 10.4 and later,
RedHat Linux Enterprise WS 4.0, and Solaris 10. However, some setting items are not supported
depending on the operating system. Make sure the IPsec settings you specify are consistent with the
operating system's IPsec settings.
IPsec consists of two main functions: the encryption function, which ensures the confidentiality of data, and
the authentication function, which verifies the sender of the data and the data's integrity. This machine's
IPsec function supports two security protocols: the ESP protocol, which enables both of the IPsec functions
at the same time, and the AH protocol, which enables only the authentication function.
ESP Protocol
The ESP protocol provides secure transmission through both encryption and authentication. This
protocol does not provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
152
Transmission Using IPsec
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol
The AH protocol provides secure transmission through authentication of packets only, including
headers.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the
authentication algorithm and authentication key are specified automatically.
AH Protocol + ESP Protocol
When combined, the ESP and AH protocols provide secure transmission through both encryption and
authentication. These protocols provide header authentication.
• For successful encryption, both the sender and receiver must specify the same encryption
algorithm and encryption key. If you use the encryption key auto exchange method, the
encryption algorithm and encryption key are specified automatically.
• For successful authentication, the sender and receiver must specify the same authentication
algorithm and authentication key. If you use the encryption key auto exchange method, the 6
authentication algorithm and authentication key are specified automatically.
Encryption Key Auto Exchange Settings and Encryption Key Manual Settings
This machine provides two key setting methods: manual and auto exchange. Using either of these methods,
agreements such as the IPsec algorithm and key must be specified for both sender and receiver. Such
agreements form what is known as an SA (Security Association). IPsec communication is possible only if
the receiver's and sender's SA settings are identical.
If you use the auto exchange method to specify the encryption key, the SA settings are auto configured on
both parties' machines. However, before setting the IPsec SA, the ISAKMP SA (Phase 1) settings are auto
configured. After this, the IPsec SA (Phase 2) settings, which allow actual IPsec transmission, are auto
configured.
Also, for further security, the SA can be periodically auto updated by applying a validity period (time limit)
for its settings. This machine only supports IKEv1 for encryption key auto exchange.
If you specify the encryption key manually, the SA settings must be shared and specified identically by both
parties. To preserve the security of your SA settings, we recommend that they are not exchanged over a
network.
Note that for both the manual and auto method of encryption key specification, multiple settings can be
configured in the SA.
153
6. Enhanced Network Security
IPsec Settings
IPsec settings for this machine can be made on Web Image Monitor. The following table explains individual
setting items.
Encryption Key Auto Exchange / Manual Settings - Shared Settings
• Active
• Inactive
Specify whether to enable
Exclude HTTPS Transmission Specify "Active" if you do not
IPsec for HTTPS transmission.
want to use IPsec for HTTPS
transmission.
• Active
Specify whether to enable
• Inactive
Encryption Key Manual Encryption Key Manual
Settings Settings, or use Encryption Key Specify "Active" if you want to
Auto Exchange Settings only. use "Encryption Key Manual
Exchange Settings".
154
Transmission Using IPsec
Select this level if you want to encrypt the data packets as well as
authenticate the transmission partner and prevent unauthorized
Authentication and Low Level
packet tampering. Packet encryption helps prevent
Encryption
eavesdropping attacks. This level provides less security than
"Authentication and High Level Encryption".
Select this level if you want to encrypt the data packets as well as
authenticate the transmission partner and prevent unauthorized
Authentication and High Level
packet tampering. Packet encryption helps prevent
Encryption
eavesdropping attacks. This level provides higher security than
"Authentication and Low Level Encryption".
The following table lists the settings that are automatically configured according to the security level.
6
Authentication and Low Authentication and High
Setting Authentication Only
Level Encryption Level Encryption
Encapsulation
Transport Transport Transport
Mode
IPsec Requirement
Use When Possible Use When Possible Always Require
Level
Authentication
PSK PSK PSK
Method
Phase 1 Hash
MD5 SHA1 SHA1
Algorithm
Phase 1 Encryption
DES 3DES 3DES
Algorithm
Phase 1 Diffie-
2 2 2
Hellman Group
Phase 2 Security
AH ESP ESP
Protocol
155
6. Enhanced Network Security
Phase 2
HMAC-MD5-96/ HMAC-MD5-96/
Authentication HMAC-SHA1-96
HMAC-SHA1-96 HMAC-SHA1-96
Algorithm
DES/3DES/
Phase 2 Encryption Cleartext (NULL 3DES/AES-128/
AES-128/AES-192/
Algorithm encryption) AES-192/AES-256
AES-256
• Inactive
Specify the address type for • IPv4
Address Type which IPsec transmission is • IPv6
used.
• IPv4/IPv6 (Default
Settings only)
156
Transmission Using IPsec
• apply
Security Policy Specify how IPsec is handled. • bypass
• discarded
• Transport
• Tunnel
(Tunnel beginning address -
Tunnel ending address)
Specify the encapsulation
If you specify "Tunnel", you
Encapsulation Mode mode.
must then specify the "Tunnel
(auto setting) End Points", which are the
beginning and ending IP
addresses. Set the same
address for the beginning point
as you set in "Local Address".
6
Specify whether to only
transmit using IPsec, or to allow
• Use When Possible
IPsec Requirement Level cleartext transmission when
IPsec cannot be established. • Always Require
(auto setting)
• PSK
• Certificate
157
6. Enhanced Network Security
• Cleartext (NULL
encryption)
Phase 2 Specify the encryption • DES
algorithm to be used in phase
Encryption Algorithm • 3DES
2.
Permissions • AES-128
(auto setting)
• AES-192
• AES-256
158
Transmission Using IPsec
Phase 2 Specify the time period for Specify a period (in seconds)
which the SA settings in phase from 300 (5min.) to 172800
Validity Period 2 are valid. (48 hrs.).
• Inactive
Specify the address type for • IPv4
Address Type which IPsec transmission is • IPv6
used.
• IPv4/IPv6 (Default
Settings only)
• Transport
• Tunnel
(Tunnel beginning address -
Tunnel ending address)
Encapsulation Mode Select the encapsulation mode.
If you select "Tunnel", set the
"Tunnel End Point", the
beginning and ending IP
addresses. In "Tunnel End
Point", set the same address for
159
6. Enhanced Network Security
6 Authentication Algorithm
Specify the authentication • HMAC-MD5-96
algorithm. • HMAC-SHA1-96
• Cleartext (NULL
Specify the encryption encryption)
Encryption Algorithm
algorithm. • DES
• 3DES
160
Transmission Using IPsec
This section explains the procedure for specifying Encryption Key Auto Exchange Settings. This can be
specified by the network administrator.
161
6. Enhanced Network Security
BBD004S
6
• To use a certificate to authenticate the transmission partner in encryption key auto exchange settings,
a device certificate must be installed.
• After configuring IPsec, you can use "Ping" command to check if the connection is established correctly.
However, you cannot use "Ping" command when ICMP is excluded from IPsec transmission on the
computer side. Also, because the response is slow during initial key exchange, it may take some time
to confirm that transmission has been established.
162
Transmission Using IPsec
• To change the transmission partner authentication method for encryption key auto exchange settings
to "Certificate", you must first install and assign a certificate. For details about creating and installing
a device certificate, see "Creating and Installing the Self-Signed Certificate".
163
6. Enhanced Network Security
1. On the [Start] menu, click [Control Panel], click [Performance and Maintenance], and then
click [Administrative Tools].
2. Click [Local Security Policy].
3. Click [IP Security Policies on Local Computer].
4. In the "Action" menu, click [Create IP Security Policy].
The IP Security Policy Wizard appears.
5. Click [Next].
6. Enter a security policy name in "Name", and then click [Next].
7. Clear the "Activate the default response rule" check box, and then click [Next].
164
Transmission Using IPsec
• To disable the computer's IPsec settings, select the security policy, right click, and then click [Un-
assign].
• If you specify the "Authentication and High Level Encryption" security level in encryption key auto
exchange settings, also select the "Master key perfect forward secrecy (PFS)" check box in the Security
Filter Properties screen (which appears in step 29). If using PFS in Windows XP, the PFS group number
used in phase 2 is automatically negotiated in phase 1 from the Diffie-Hellman group number (set in
step 11). Consequently, if you change the security level specified automatic settings on the machine
165
6. Enhanced Network Security
and "User Setting" appears, you must set the same the group number for "Phase 1 Diffie-Hellman
Group" and "Phase 2 PFS" on the machine to establish IPsec transmission.
This section explains the procedure for specifying encryption key manual settings. This can be specified by
the network administrator.
BBD003S
• Before transmission, SA information is shared and specified by the sender and receiver. To prevent
SA information leakage, we recommend that this exchange is not performed over the network.
• After configuring IPsec, you can use "Ping" command to check if the connection is established correctly.
However, you cannot use "Ping" command when ICMP is excluded from IPsec transmission. Also,
because the response is slow during initial key exchange, it may take some time to confirm that
transmission has been established.
166
Transmission Using IPsec
You can use telnet to confirm IPsec settings and make setting changes. This section explains telnet commands
for IPsec. To log in as an administrator using telnet, the default login user name is "admin", and the password
is blank. For details about logging in to telnet and telnet operations, see "Using telnet", Network Guide.
• If you are using a certificate as the authentication method in encryption key auto exchange settings
(IKE), install the certificate using Web Image Monitor. A certificate cannot be installed using telnet.
ipsec
To display IPsec related settings information, use the "ipsec" command.
Display current settings
msh> ipsec
Displays the following IPsec settings information:
• IPsec shared settings values
• Encryption key manual settings, SA setting 1-4 values
• Encryption key manual settings, default setting values
167
6. Enhanced Network Security
ipsec manual
To display or specify the encryption key manual settings, use the "ipsec manual" command.
Display current settings
msh> ipsec manual {1|2|3|4|default}
• To display the settings 1-4, specify the number [1-4].
• To display the default setting, specify [default].
• Not specifying any value displays all of the settings.
168
Transmission Using IPsec
Disable settings
msh> ipsec manual {1|2|3|4|default} disable
• To disable the settings 1-4, specify the setting number [1-4].
• To disable the default settings, specify [default].
Specify the local/remote address for settings 1-4
msh> ipsec manual {1|2|3|4} {ipv4|ipv6} local address remote address
• Enter the separate setting number [1-4] or [default] and specify the local address and remote
address.
• To specify the local or remote address value, specify masklen by entering [/] and an integer
0-32 if you are specifying an IPv4 address. If you are specifying an IPv6 address, specify masklen
by entering [/] and an integer 0-128.
• Not specifying an address value displays the current setting.
Specify the address type in default setting
msh> ipsec manual default {ipv4|ipv6|any}
• Specify the address type for the default setting.
• To specify both IPv4 and IPv6, enter [any].
6
Security protocol setting
msh> ipsec manual {1|2|3|4|default} proto {ah|esp|dual}
• Enter the separate setting number [1-4] or [default] and specify the security protocol.
• To specify AH, enter [ah]. To specify ESP, enter [esp]. To specify AH and ESP, enter [dual].
• Not specifying a protocol displays the current setting.
SPI value setting
msh> ipsec manual {1|2|3|4|default} spi SPI input value SPI output value
• Enter the separate setting number [1-4] or [default] and specify the SPI input and output values.
• Specify a decimal number between 256-4095, for both the SPI input and output values.
Encapsulation mode setting
msh> ipsec manual {1|2|3|4|default} mode {transport|tunnel}
• Enter the separate setting number [1-4] or [default] and specify the encapsulation mode.
• To specify transport mode, enter [transport]. To specify tunnel mode, enter [tunnel].
• If you have set the address type in the default setting to [any], you cannot use [tunnel] in
encapsulation mode.
• Not specifying an encapsulation mode displays the current setting.
169
6. Enhanced Network Security
ipsec ike
To display or specify the encryption key auto exchange settings, use the "ipsec ike" command.
Display current settings
msh> ipsec ike {1|2|3|4|default}
• To display the settings 1-4, specify the number [1-4].
170
Transmission Using IPsec
171
6. Enhanced Network Security
• If you specify [require], data will not be transmitted when IPsec cannot be used. If you specify
[use], data will be sent normally when IPsec cannot be used. When IPsec can be used, IPsec
transmission is performed.
• Not specifying a requirement level displays the current setting.
Encapsulation mode setting
msh> ipsec ike {1|2|3|4|default} mode {transport|tunnel}
• Enter the separate setting number [1-4] or [default] and specify the encapsulation mode.
• To specify transport mode, enter [transport]. To specify tunnel mode, enter [tunnel].
• If you have set the address type in the default setting to [any], you cannot use [tunnel] in
encapsulation mode.
• Not specifying an encapsulation mode displays the current setting.
Tunnel end point setting
msh> ipsec ike {1|2|3|4|default} tunneladdar beginning IP address ending IP
address
• Enter the separate setting number [1-4] or [default] and specify the tunnel end point beginning
6 and ending IP address.
• Not specifying either the beginning or ending address displays the current setting.
IKE partner authentication method setting
msh> ipsec ike {1|2|3|4|default} auth {psk|rsasig}
• Enter the separate setting number [1-4] or [default] and specify the authentication method.
• Specify [psk] to use a shared key as the authentication method. Specify [rsasig] to use a certificate
at the authentication method.
• You must also specify the PSK character string when you select [psk].
• Note that if you select "Certificate", the certificate for IPsec must be installed and specified before
it can be used. To install and specify the certificate use Web Image Monitor.
PSK character string setting
msh> ipsec ike {1|2|3|4|default} psk PSK character string
• If you select PSK as the authentication method, enter the separate setting number [1-4] or [default]
and specify the PSK character string.
• Specify the character string in ASCII characters. There can be no abbreviations.
ISAKMP SA (phase 1) hash algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 hash {md5|sha1}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1) hash
algorithm.
• To use MD5, enter [md5]. To use SHA1, enter [sha1].
172
Transmission Using IPsec
173
6. Enhanced Network Security
6 • Enter the separate setting number [1-4] or [default] and reset the specified setting. Specifying
[all] resets all of the settings, including default.
174
Authentication by telnet
Authentication by telnet
This section explains Authentication by telnet. When using telnet, the default login name for administrator
login is "admin" and the password is blank. For details on how to login to telnet, see "Using telnet", Network
Guide.
"authfree" Command
Use the "authfree" command to display and configure authentication exclusion control settings. If you use
the "authfree" command in telnet, you can exclude printer job authentication and specify an IP address
range. The authentication exclusion control display and setting methods are explained below.
View Settings
msh> authfree
If print job authentication exclusion is not specified, authentication exclusion control is not displayed.
IPv4 address settings
msh> authfree "ID" range_addr1 range_addr2 6
IPv6 address settings
msh> authfree "ID" range6_addr1 range6_addr2
IPv6 address mask settings
msh> authfree "ID" mask6_addr1 masklen
USB setting
msh> authfree [usb] [on|off]
• To enable authfree, specify "on". To disable authfree, specify "off".
• Always specify the interface.
Authentication exclusion control initialization
msh> authfree flush
• In both IPv4 and IPv6 environments, up to five access ranges can be registered and selected.
175
6. Enhanced Network Security
Authentication by IEEE802.1X
IEEE802.1X enables authentication in an Ethernet environment. For details, see "Using telnet", Network
and System Settings Guide.
176
7. Specifying the Extended Security
Functions
This chapter describes the machine's extended security features and how to specify them.
To change the extended security functions, display the extended security screen as follows.
Administrators can change the extended security functions according to their role.
For details about logging on and logging off with administrator authentication, see "Logging on Using
7
Administrator Authentication", "Logging off Using Administrator Authentication".
177
7. Specifying the Extended Security Functions
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Extended Security] using [ ] or [ ], and then press the [OK] key.
5. Press the setting you want to change using [ ] or [ ], and then press the [OK] key.
Settings
178
Specifying the Extended Security Functions
The available fax destinations are limited to the destinations registered in the Address Book.
A user cannot directly enter the destinations for transmission.
The destinations searched by "Search LDAP" can be used.
For details about preventing unauthorized transmission, see "Preventing Data Leaks Due to
Unauthorized Transmission".
• On
• Off
Restrict Adding of User Destinations
This can be specified by the user administrator.
When "Restrict Use of Destinations" is set to [Off], after entering a fax destination directly, you can
register it in the Address Book by pressing [Add Dest]. If [On] is selected for this setting, [Add Dest]
does not appear. If you set "Restrict Adding of User Destinations" to [On], users can specify destinations
directly, but cannot use [Add Dest] to register data in the Address Book. When this setting is made,
only the user administrator can change the Address Book.
• On
• Off
Restrict Display of User Information
This can be specified if user authentication is specified. When the job history is checked using a network
connection for which authentication is not available, all personal information can be displayed as
7
"********". For example, when someone not authenticated as an administrator checks the job
history using SNMP in SmartDeviceMonitor for Admin, personal information can be displayed as
"********" so that users cannot be identified. Because information identifying registered users
cannot be viewed, unauthorized users are prevented from obtaining information about the registered
files.
• On
• Off
Enhance File Protection
This can be specified by the file administrator. By specifying a password, you can limit operations
such as printing, deleting, and sending files, and can prevent unauthorized people from accessing
the files. However, it is still possible for the password to be cracked.
By specifying "Enhance File Protection", files are locked and so become inaccessible if an invalid
password is entered ten times. This can protect the files from unauthorized access attempts in which
a password is repeatedly guessed.
The locked files can only be unlocked by the file administrator. When "Enhance File Protection" is
specified, ( ) appears in the lower right corner of the screen.
When files are locked, you cannot select them even if the correct password is entered.
• On
179
7. Specifying the Extended Security Functions
• Off
Settings by SNMP v1 and v2
This can be specified by the network administrator. When the machine is accessed using the SNMPv1,
v2 protocol, authentication cannot be performed, allowing machine administrator settings such as
the paper setting to be changed. If you select [Prohibit], the setting can be viewed but not specified
with SNMPv1, v2.
• Prohibit
• Do not Prohibit
Restrict Use of Simple Encryption
This can be specified by the network administrator. When a sophisticated encryption method cannot
be enabled, simple encryption will be applied. For example, when using User Management Tool and
Address Management in Smart Device Monitor for Admin to edit the Address Book, or
DeskTopBinder and ScanRouter delivery software and SSL/TLS cannot be enabled, make this setting
[Off] to enable simple encryption. When SSL/TLS can be enabled, make this setting [On].
For details about specifying SSL/TLS, see "Setting the SSL / TSL Encryption Mode".
If you select [On], specify the encryption setting using the printer driver.
• On
• Off
7 Transfer to Fax Receiver
This can be specified by the machine administrator.
If you use [Forwarding] under the fax function, files stored in the machine can be transferred or
delivered.
To prevent stored files being transferred by mistake, select [Prohibit] for this setting.
• Prohibit
• Do not Prohibit
If you select [Prohibit] for this setting, the following functions are disabled:
• Forwarding
• Delivery from Personal Box
• Information Box
• Routing Received Documents
Authenticate Current Job
This can be specified by the machine administrator. This setting lets you specify whether or not
authentication is required for operations such as canceling jobs under the copier and printer functions.
If you select [Login Privilege], authorized users and the machine administrator can operate the
machine. When this is selected, authentication is not required for users who logged on to the machine
before [Login Privilege] was selected.
180
Specifying the Extended Security Functions
If you select [Access Privilege], users who canceled a copy or print job in progress and the machine
administrator can operate the machine.
Even if you select [Login Privilege] and log on to the machine, you cannot cancel a copy or print job
in progress if you are not authorized to use the copy and printer functions.
You can specify [Authenticate Current Job] only if [User Auth. Management] was specified.
• Login Privilege
• Access Privilege
• Off
Password Policy
This can be specified by the user administrator.
The password policy setting is effective only if [Basic Auth.] is specified.
This setting lets you specify [Complexity Setting] and [Minimum Character No.] for the password. By
making this setting, you can limit the available passwords to only those that meet the conditions
specified in [Complexity Setting] and [Minimum Character No.].
If you select [Level 1], specify the password using a combination of two types of characters selected
from upper-case letters, lower-case letters, decimal numbers, and symbols such as #.
If you select [Level 2], specify the password using a combination of three types of characters selected
from upper-case letters, lower-case letters, decimal numbers, and symbols such as #.
• Level 2
7
• Level 1
• Off
• Minimum Character No. (0)
@Remote Service
Communication via HTTPS for @Remote Service is disabled if you select [Prohibit].
• Prohibit
• Do not Prohibit
Update Firmware
This can be specified by the machine administrator.
Specify whether to allow firmware updates on the machine. Firmware update means having the service
representative update the firmware or updating the firmware via the network.
If you select [Prohibit], firmware on the machine cannot be updated.
If you select [Do not Prohibit], there are no restrictions on firmware updates.
• Prohibit
• Do not Prohibit
181
7. Specifying the Extended Security Functions
182
Other Security Functions
Fax Function
183
7. Specifying the Extended Security Functions
Settings
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
184
Limiting Machine Operation to Customers Only
4. Select [Service Mode Lock] using [ ] or [ ], and then press the [OK] key.
7
7. Press the [User Tools/Counter] key.
For a service representative to carry out inspection or repair in service mode, the machine administrator
must log on to the machine and cancel the service mode lock.
For details about logging on and logging off with administrator authentication, see "Logging on Using
Administrator Authentication", "Logging off Using Administrator Authentication".
185
7. Specifying the Extended Security Functions
2. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
3. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
4. Select [Service Mode Lock] using [ ] or [ ], and then press the [OK] key.
186
8. Troubleshooting
This chapter describes what to do if the machine does not function properly.
A Message Appears
This section explains how to deal with problems if a message appears on the screen during user
authentication.
The most common messages are explained. If some other message appears, deal with the problem
according to the information contained in the message.
"You do not have the privileges The authority to use the function • If this appears when trying
to use this function." is not specified. to use a function: The
function is not specified in
the Address Book
management setting as
being available. The user
8
administrator must decide
whether to authorize use of
the function and then assign
the authority.
• If this appears when trying
to specify a default setting:
The administrator differs
depending on the default
settings you wish to specify.
Using the list of settings, the
administrator responsible
must decide whether to
authorize use of the
function.
187
8. Troubleshooting
"Failed to obtain URL." The machine cannot connect to Make sure the server's settings,
the server or cannot establish such as the IP address and host
communication. name, are specified correctly on
the machine. Make sure the host
name of the UA Server is
specified correctly.
"Failed to obtain URL." The machine is connected to the Make sure the UA service is
server, but the UA service is not specified correctly.
responding properly.
"Failed to obtain URL." SSL is not specified correctly on Specify SSL using Authentication
the server. Manager.
"Failed to obtain URL." Server authentication failed. Make sure server authentication
is specified correctly on the
machine.
"Authentication failed." The entered login user name or Ask the user administrator for the
login password is incorrect. correct login user name and login
password.
"Authentication failed." Cannot access the authentication A network or server error may
server when using Windows have occurred. Confirm the
Authentication, LDAP network in use with the LAN
Authentication, or Integration administrator.
Server Authentication.
"Set User Management in Admin. Admin. Authentication is not To specify Basic Authentication,
Auth. to On to use this setting." configured under "Administrator Windows Authentication, LDAP
Authentication Management". Authentication, or Integration
Server. Authentication, you must
first specify administrator
authentication.
For details about authentication
settings, see "Authentication
Setting Procedure".
188
Authentication Does Not Work Properly
If the following conditions arise while users are operating the machine, provide the instructions on how to
deal with them.
Cannot perform the following: User authentication has been Confirm the user name and login
• Print with the printer driver rejected. name with the administrator of
the network in use if using
• Connect with the TWAIN
Windows Authentication, LDAP
driver
Authentication, or Integration
Send with the LAN-Fax driver Server Authentication.
Confirm with the user
administrator if using basic
authentication.
Cannot perform the following: The encryption key specified in Specify the driver encryption key
• Print with the printer driver the driver does not match the registered in the machine.
machine's driver encryption key. See "Driver Encryption Key".
• Connect with the TWAIN 8
driver
Send with the LAN-Fax driver
Cannot perform the following: The SNMPv3 account, Specify the account, password
• Print with the printer driver password, and encryption and the encryption algorithm of
algorithm do not match settings SNMPv3 registered in the
• Connect with the TWAIN
specified on this machine. machine using network
driver
connection tools.
Send with the LAN-Fax driver
Cannot authenticate using the Another user is logging on to the Wait for the user to log off.
TWAIN driver. machine.
Cannot authenticate using the Authentication is taking time Make sure the LDAP server
TWAIN driver. because of operating conditions. setting is correct.
Make sure the network settings
are correct.
189
8. Troubleshooting
Cannot authenticate using the Authentication is not possible Wait until editing of the Address
TWAIN driver. while the machine is editing the Book data is complete.
Address Book data.
After starting "User Management "Restrict Use of Simple Set "Restrict Use of Simple
Tool" or "Address Management Encryption" is not set correctly. Encryption" to [On].
Tool" in SmartDeviceMonitor for Alternatively, "SSL/TLS" has Alternatively, enable "SSL/TLS",
Admin and entering the correct been enabled although the install the server certificate in the
login user name and password, required certificate is not installed machine, and then install the
a message that an incorrect in the computer. certificate in the computer.
password has been entered See "Setting the SSL / TLS
appears. Encryption Mode".
Cannot access the machine using "Restrict Use of Simple Set "Restrict Use of Simple
ScanRouter EX Professional V3 / Encryption" is not set correctly. Encryption" to [On].
ScanRouter EX Enterprise V2. Alternatively, "SSL/TLS" has Alternatively, enable "SSL/TLS",
been enabled although the install the server certificate in the
required certificate is not installed machine, and then install the
in the computer. certificate in the computer.
See "Setting the SSL / TLS
Encryption Mode".
Cannot log off when using the The original has not been When the original has been
copying functions. scanned completely. scanned completely, press [ ],
remove the original, and then log
off.
"Program Dest." does not appear "Restrict Adding of User Registration must be done by the
on the fax screen for specifying Destinations" is set to [Off] in user administrator.
destinations. "Restrict Use of Destinations" in
"Extended Security", so only the
user administrator can register
destinations in the Address Book.
User authentication is enabled, User authentication may have Re-enable user authentication,
yet stored files do not appear. been disabled while [All Users] is and then enable [All Users] for
not specified. the files that did not appear.
190
Authentication Does Not Work Properly
User authentication is enabled, User authentication may have Re-enable user authentication,
yet destinations specified using been disabled while [All Users] is and then enable [All Users] for
the machine do not appear. not specified. the destinations that did not
appear.
For details about enabling [All
Users], see "Protecting the
Address Book".
Cannot print when user User authentication may not be Specify user authentication in the
authentication has been specified in the printer driver. printer driver.
specified. For details, see the printer driver
Help.
If you try to interrupt a job while With this machine, you can log Only the user who executed a
copying or scanning, an off while copying or scanning. If copying or scanning job can
authentication screen appears. you try to interrupt copying or interrupt it. Wait until the job has
scanning after logging off, an completed or consult an
authentication screen appears. administrator or the user who
executed the job.
8
After you execute "Encrypt The file may be corrupt. Contact your service
Address Book", the "Exit" representative.
message does not appear.
191
8. Troubleshooting
192
9. Appendix
Supervisor Operations
The supervisor can delete an administrator's password and specify a new one.
If any of the administrators forgets their password or if any of the administrators changes, the supervisor
can assign a new password. If logged on using the supervisor's user name and password, you cannot use
normal functions or specify defaults.
Log on as the supervisor only to change an administrator's password.
• The default login user name is "supervisor" and the login password is blank. We recommend changing
the login user name and login password.
• When registering login user names and login passwords, you can specify up to 32 alphanumeric
characters and symbols. Keep in mind that user names and passwords are case-sensitive.
• Be sure not to forget the supervisor login user name and login password. If you do forget them, a
service representative will to have to return the machine to its default state. This will result in all data
in the machine being lost and the service call may not be free of charge.
• You cannot specify the same login user name for the supervisor and the administrators.
• Using Web Image Monitor, you can log on as the supervisor and delete an administrator's password
or specify a new one.
193
9. Appendix
3. Enter a login user name, and then press the [OK] key.
When you assign the administrator for the first time, enter "supervisor".
4. Enter a login password, and then press the [OK] key.
When you assign the administrator for the first time, press the [OK] key without entering login
password.
If administrator authentication has been specified, be sure to log off after completing settings. This section
describes how to log off after completing settings.
1. Press [Logout].
2. Press [Yes].
This section describes how to change the supervisor's login name and password.
194
Supervisor Operations
To do this, you must enable the user administrator's privileges through the settings under [Admin. Auth.
management]. For details, see "Specifying Administrator Privileges".
5. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
9
6. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
7. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
195
9. Appendix
9. Select [Login User Name] using [ ] or [ ], and then press the [OK] key.
10. Enter the login user name, and then press the [OK] key.
11. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
9
12. Enter the login password, and then press the [OK] key.
13. If a password re-entry screen appears, enter the login password, and then press the [OK]
key.
196
Supervisor Operations
9
3. Log on as the supervisor.
You can log on in the same way as an administrator.
4. Select [System Settings] using [ ] or [ ], and then press the [OK] key.
197
9. Appendix
5. Select [Administrator Tools] using [ ] or [ ], and then press the [OK] key.
6. Select [Program/Change Admin.] using [ ] or [ ], and then press the [OK] key.
7. Select [Admin. Detailed Settings] using [ ] or [ ], and then press the [OK] key.
8. Select the administrator you wish to reset using [ ] or [ ], and then press the [OK] key.
9
9. Select [Login Password] using [ ] or [ ], and then press the [OK] key.
10. Enter the login password, and then press the [OK] key.
198
Supervisor Operations
11. If a password reentry screen appears, enter the login password, and then press the [OK]
key.
199
9. Appendix
System Settings
200
Machine Administrator Settings
Copier Features
201
9. Appendix
Stamp
All the settings can be specified.
Input / Output
All the settings can be specified.
Adjust Colour Image
All the settings can be specified.
Administrator Tools
All the settings can be specified.
Facsimile Features
Printer Features
202
Machine Administrator Settings
• Menu Protect
• List / Test Print Lock
• 4 Colour Graphic Mode
System
The following settings can be specified.
• Print Error Report
• Auto Continue
• Memory Overflow
• Rotate by 180 Degrees
• Duplex
• Copies
• Blank Page Print
• Sub Paper Size
• Page Size
• Letterhead Setting
• Bypass Tray Setting Priority
• Edge To Edge Print
• Tray Switching
• Extended Auto Tray Switching
Host Interface
All the settings can be specified.
PCL Menu
9
All the settings can be specified.
203
9. Appendix
Location
Protect Printer Display Panel
Permit Firmware Update
Permit Firmware Structure Change
Display IP Address on Device Display Panel
Output Tray
Paper Tray Priority
• Paper
All the settings can be specified.
• Date/Time
All the settings can be specified.
• Timer
All the settings can be specified.
• Logs
All the settings can be specified.
• User Authentication Management
All the settings can be specified.
• Administrator Authentication Management
Machine Administrator Authentication
Available Settings for Machine Administrator
9 • Program/Change Administrator
You can specify the following administrator settings for the machine administrator.
Login User Name
Login Password
Encryption Password
• LDAP Server
All the settings can be specified.
• Firmware Update
All the settings can be specified.
• Program/Change Realm
All the settings can be specified.
Printer
• System
204
Machine Administrator Settings
Network
Pict Bridge
9
• SNMPv3
Security
• User Lockout Policy
All the settings can be specified.
RC Gate
• Set up RC Gate
Request No.
• Update RC Gate Firmware
• RC Gate Proxy Server
Webpage
• Download Help File
205
9. Appendix
206
Network Administrator Settings
System Settings
207
9. Appendix
• Program/Change Administrator
You can specify the following administrator settings for the network administrator.
Login User Name
Login Password
Encryption Password
Interface Settings
• Ethernet Security
Network
• IPv4
All the settings can be specified.
• IPv6
All the settings can be specified.
• NetWare
All the settings can be specified.
• SMB
All the settings can be specified.
• SNMP
All the settings can be specified.
• SNMPv3
All the settings can be specified.
9 • SSDP
All the settings can be specified.
• Bonjour
All the settings can be specified.
Security
• Network Security
All the settings can be specified.
• Access Control
All the settings can be specified.
• IPP Authentication
All the settings can be specified.
• SSL/TLS
All the settings can be specified.
208
Network Administrator Settings
• Site Certificate
All the settings can be specified.
• Device Certificate
All the settings can be specified.
• IPsec
All the settings can be specified.
• IEEE 802.1X (WPA/WPA2)
All the settings can be specified.
Webpage
All the settings can be specified.
209
9. Appendix
System Settings
210
User Administrator Settings
System Settings
211
9. Appendix
Webpage
• Download Help File
212
The Privilege for User Account Settings in the Address Book
Read- Edit /
Edit Full Registere User
Settings only Delete
(User) Control d User Admin.
(User) (User)
Regist. No. B A A A A A 9
Name B A A A A A
Auth. Info
Read- Edit /
Edit Full Registere User
Settings only Delete
(User) Control d User Admin.
(User) (User)
Function Permissions C C C C B A
213
9. Appendix
Read- Edit /
Edit Full Registere User
Settings only Delete
(User) Control d User Admin.
(User) (User)
Register as B A A A A A
Dest. Protect:
C C C A A A
Permission
Fax Settings
Read- Edit /
Edit Full Register
Settings only Delete User Admin.
(User) Control ed User
(User) (User)
Fax Dest. B A A A A A
214
User Settings - Control Panel Settings
215
9. Appendix
Copier Features
When administrator authentication is specified, the administrator's configuration of Menu Protect
determines which functions and settings are available to users. If user authentication is specified, functions
and settings are available to authorized users only, who must log in to access them.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.
The default for [Menu Protect] is [Level 2].
General Features
216
Printer Features
Printer Features
When administrator authentication is specified, the administrator's configuration of Menu Protect
determines which functions and settings are available to users. If user authentication is specified, functions
and settings are available to authorized users only, who must log in to access them.
The following settings can be specified by someone who is not an administrator.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.
The default for [Menu Protect] is [Level 2].
List / Test Print
Maintenance
System
217
9. Appendix
Duplex R/W R R
Copies R/W R R
Host Interface
PCL Menu
Orientation R/W R R
218
Printer Features
Append CR to LF R/W R R
Resolution R/W R R
219
9. Appendix
Facsimile Features
When administrator authentication is specified, the administrator's configuration of Menu Protect
determines which functions and settings are available to users. If user authentication is specified, functions
and settings are available to authorized users only, who must log in to access them.
The following settings can be specified by someone who is not an administrator.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
• Settings that are not in the list can only be viewed, regardless of the menu protect level setting.
The default for [Menu Protect] is [Off].
General Settings / Adjust
9 Reception Settings
220
Facsimile Features
Administrator Tools
Forwarding R/W R R
221
9. Appendix
System Settings
When administrator authentication is specified, the administrator's configuration of Available Settings
determines which system settings are available to users. If user authentication is specified, system settings
are available to authorized users only, who must log in to access them.
• Abbreviations in the table heads
A = Authorized user when Available Settings have not been specified.
B = Authorized user when Available Settings have been specified.
C = Unauthorized user.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
General Features
Settings A B C
222
System Settings
Settings A B C
Timer Settings
Settings A B C
Interface Settings
Settings A B C
Network
223
9. Appendix
Settings A B C
*1 If you select [Auto-Obtain (DHCP)], you can only read the setting.
224
System Settings
Administrator Tools
Settings A B C
225
9. Appendix
226
Device Settings
Device Settings
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to the user depend on whether or
not "Available Settings" has been specified.
• Abbreviations in the table heads
A = Authorized user when Available functions have not been specified.
B = Authorized user when Available functions have been specified.
C = Unauthorized user.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
System
Settings A B C
Paper
Settings A B C
227
9. Appendix
Settings A B C
Date/Time
Settings A B C
228
Device Settings
Settings A B C
Timer
Settings A B C
Logs
Settings A B C
229
9. Appendix
Settings A B C
230
Device Settings
Settings A B C
LDAP Server
Settings A B C
231
9. Appendix
Printer
If you have specified administrator authentication, the available functions and settings depend on the menu
protect setting.
The following settings can be specified by someone who is not an administrator.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
The default for [Menu Protect] is [Level 2].
Printer Basic Settings
System
Host Interface
PCL Menu
232
Printer
Orientation R/W R R
Append CR to LF R/W R R
Resolution R/W R R
233
9. Appendix
Fax
If you have specified administrator authentication, the available functions and settings depend on the menu
protect setting.
The following settings can be specified by someone who is not an administrator.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
The default for [Menu Protect] is [Off].
Administrator Tools
General Settings
234
Fax
Parameter Settings
235
9. Appendix
Interface
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to the user depend on whether or
not "Available Settings" has been specified.
• Abbreviations in the table heads
A = Authorized user when Available functions have not been specified.
B = Authorized user when Available functions have been specified.
C = Unauthorized user.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
Interface Settings
Settings A B C
236
Network
Network
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to the user depend on whether or
not "Available Settings" has been specified.
• Abbreviations in the table heads
A = Authorized user when Available functions have not been specified.
B = Authorized user when Available functions have been specified.
C = Unauthorized user.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
IPv4
Settings A B C
237
9. Appendix
Settings A B C
IPv6
Settings A B C
238
Network
Settings A B C
NetWare
Settings A B C
SMB
Settings A B C
239
9. Appendix
Settings A B C
Bonjour
Settings A B C
240
Webpage
Webpage
The settings available to the user depend on whether or not administrator authentication has been specified.
If administrator authentication has been specified, the settings available to the user depend on whether or
not "Available Settings" has been specified.
• Abbreviations in the table heads
A = Authorized user when Available functions have not been specified.
B = Authorized user when Available functions have been specified.
C = Unauthorized user.
• Abbreviations in the table columns
R/W (Read and Write) = Both reading and modifying the setting are available.
R (Read) = Reading only.
N/A (Not Applicable) = Neither reading nor modifying the setting is available.
Webpage
Settings A B C
241
9. Appendix
242
Trademarks
Trademarks
Microsoft®, Windows®, Windows NT®, Windows Server®, and Windows Vista® are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Adobe, Acrobat and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States and/or other countries.
NetWare is a registered trademark of Novell, Inc.
UPnPTM is a trademark of the UPnPTM Implementers Corporation.
PCL® is a registered trademark of Hewlett-Packard Company.
Apple, Bonjour, Macintosh, and Mac OS are trademarks of Apple Inc., registered in the U.S. and other
countries.
Monotype is a registered trademark of Monotype Imaging, Inc.
Solaris is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other
countries.
LINUX® is the registered trademark of Linus Torvalds in the U.S. and other countries.
RED HAT is a registered trademark of Red Hat, Inc.
PowerPC® is a trademark of International Business Machines Corporation in the United States, other
countries, or both.
Other product names used herein are for identification purposes only and might be trademarks of their
respective companies. We disclaim any and all rights to those marks.
The proper names of the Windows operating systems are as follows:
* The product names of Windows 2000 are as follows:
Microsoft® Windows® 2000 Professional
9
Microsoft® Windows® 2000 Server
Microsoft® Windows® 2000 Advanced Server
* The product names of Windows XP are as follows:
Microsoft® Windows® XP Professional
Microsoft® Windows® XP Home Edition
Microsoft® Windows® XP Media Center Edition
Microsoft® Windows® XP Tablet PC Edition
* The product names of Windows Vista are as follows:
Microsoft® Windows Vista® Ultimate
Microsoft® Windows Vista® Enterprise
Microsoft® Windows Vista® Business
243
9. Appendix
244
INDEX
A Encryption Key Manual Settings Configuration
Flow......................................................................166
Access Control.....................................................127 Encryption Key Manual Settings Items..............159
Address Book Access Permission.......................105 Encryption Technology.........................................16
Address Book Privileges.....................................213 Enhance File Protection....................................... 179
Administrator..........................................................17 Error Message.....................................................187
Administrator Authentication...................17, 23, 24 ESP Protocol.........................................................152
Administrator Privileges......................................... 24 Extended Security Functions...............................177
AH Protocol.........................................................153 Extended Security Supplement..........................244
AH Protocol + ESP Protocol................................153
F
Authenticate Current Job....................................180
Authentication and Access Limits..........................16 Facsimile Features...............................................220
Authentication Information....................................54 Fax........................................................................234
authfree................................................................175 File Administrator...................................................22
Auto Logout............................................................94 File Administrator Settings..................................210
Available Functions.............................................117 Full Control..........................................................213
B G
245
Menu Protect...............................................111, 113 Transmitted Passwords........................................139
N Type of Administrator..........................................111
U
Network Administrator..........................................22
Network Administrator Settings.........................207 Unauthorized Copy Prevention............................98
Network Security Level.......................................135 Update Firmware................................................181
O User..................................................................17, 35
User Administrator...............................................213
Operational Issues..............................................189 User Administrator Settings................................211
P User Authentication............................17, 36, 39, 89
User Code Authentication.....................................40
Password Policy...................................................181
User Lockout Function...........................................91
Printer...................................................................232
User Settings - Control Panel Settings................215
Printer Job Authentication.....................................87
User Settings - Web Image Monitor Settings..........
Printer Job Authentication Levels..........................87 ..............................................................................226
Printer Job Types....................................................88
W
R
Windows Authentication.......................................58
Read-only............................................................213 Windows Authentication - Operational
Registered User.............................................17, 213 Requirements for Kerberos Authentication..........58
Registering the Administrator................................26 Windows Authentication - Operational
Remote Service....................................................181 Requirements for NTLM Authentication...............58
Restrict Adding of User Destinations..................179
Restrict Display of User Information...................179
Restrict Use of Destinations.................................178
Restrict Use of Simple Encryption.......................180
Restrictions on Destinations................................103
S
Security Functions................................................183
Self-Signed Certificate........................................143
Service Mode Lock.............................................184
Settings by SNMP v1 and v2.............................180
SNMPv3..............................................................149
SSL........................................................................146
SSL (Secure Sockets Layer)................................142
SSL / TLS Encryption...........................................147
Supervisor......................................................22, 193
Symbols..................................................................10
System Settings....................................................222
T
telnet.....................................................................175
Transfer Log Setting............................................. 120
Transfer to Fax Receiver.....................................180
246
MEMO
247
MEMO
AE AE D040-7762