e-ManualTopSite mapHelp

Category Top

Preventing Unauthorized Access

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

Accepting B&W Copy and Print Jobs without Entering a Department ID

Specifying Authentication Method for Rights Management Server

Network Security

IEEE 802.1X Authentication Settings

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Setting the Key Pair Used With SSL Encrypted Communications

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

IPSec Settings

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Checking a Device Signature Certificate

Setting a Rights Management Server

Copy Set Numbering Options

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Limiting Functions

Remote UI

Clearing the Message Board

Retrieving Audit Logs

Saving a Log of Key Operations

Available Administrator Settings Table (Touch Panel Display)

Top » Security » Network Security
Network Security
0S9Y-1H7
You can increase the network security on the machine to avoid output of data and tampering data and increase the security and confidentiality.
The security on the network for this machine is maintained using the following functions.
SSL Encrypted Communication
You can perform safe encrypted communication when the user is accessing the machine via a Web browser by installing a server certificate to the machine. With SSL communication, a common key that can only be used by the user and the machine is generated using the server certificate and public key. Doing so will help prevent data interception and theft. See "Key Pair and Server Certificate Settings for Encrypted SSL Communication" and "Setting the Key Pair Used With SSL Encrypted Communications."
The structure of SSL communication is shown below.
1.
When the user accesses the machine from their computer, the server certificate for SSL and the public key for the server are requested.
2.
The certificate and the public key are sent to the user's computer from the machine.
3.
Using the public key received from the server, encrypt the uniquely generated common key on the computer.
4.
Send the encrypted common key to the machine.
5.
Use the private key on the machine and decode the encrypted common key.
6.
Now, the user's computer and the machine both possess the common key and can send/receive data using the common key.
Firewall
A firewall is a system that prevents access by outside networks, and attacks/intrusions to the network. You can use a firewall on this machine to block access from outside network that appears to be dangerous by restricting communication from specified outside IP addresses. For details, see the manual provided with the imagePRESS Server.
SNMP
SNMP is a protocol that manages the entire network. This machine supports SNMPv1 and SNMPv3. SNMP oversees and controls the communication machine connected to this machine via network. For details, see the manual provided with the imagePRESS Server.
IEEE 802.1X Authentication
Manages all of the authentication information via the authentication server (RADIUS: Remote Authentication Dial In User Service) and authenticates the supplicant. You can prevent unauthorized access because only the supplicant authenticated by the RADIUS server has permission to connect to the network by the authenticator.
The authenticator blocks communication for the supplicant that is not authenticated by the RADIUS server. For details, see the manual provided with the imagePRESS Server. (See "IEEE 802.1X Authentication Settings.")
IPSec Communication and FIPS 140-2
IPSec is a protocol for creating a security policy to protect data received from and sent to the IP network from threats such as interception, alteration, and theft. For details, see the manual provided with the imagePRESS Server.
You can also make the encryption method for IPSec communication comply with the United States government-approved FIPS (Federal Information Processing Standards) 140-2. For details, see the manual provided with the imagePRESS Server.