e-ManualTopSite mapHelpGlossary

Category Top

Increasing Security

Restricting Access by Authentication

Administrator Settings

Specifying the System Manager Settings

Department ID Management

Specifying Department ID Management

Checking/Printing/Clearing Page Totals

Accepting Jobs with Unknown Department IDs

User Setting Information Management (User Setting Information Management Service)

Logging In to the User Setting Information Management Service Page

Deleting the User Setting Information

User Access Control for Advanced Box

Logging In to the User Management Page

Registering/Editing the User Information of User Access Control for Advanced Box

Editing User Information by General Users

Authentication Log Management for the Advanced Box

Authentication Method Settings for Sending Operations

Specifying Personal Folders

Registering Personal Folders for Each User

Setting Up the Home Folder and Personal Folders

Registering Folders Designated by Login Service as Personal Folders

Specifying Authentication Method for LDAP Server

Specifying Authentication Method for Rights Management Server

Specifying Authentication Method for SMTP Server

Specifying Authentication Method for File Server

Specifying Authentication Method for Advanced Box

Simple Authentication Settings for Secure Print

Setting to Disable Integrated Authentication

Network Security

Key Pair and Server Certificate Settings for Encrypted SSL Communication

Generating a Key Pair and Server Certificate

Registering a Key Pair File and Server Certificate File Installed from a Computer

Editing Key Pairs and Server Certificates

Registering/Editing a CA Certificate File

Verifying Certificate Validity Using Certificate Revocation List

Using an Encryption Method That Complies with FIPS 140-2

Advanced Box Settings

Specifying the Advanced Box Settings

Setting the Network

MEAP Settings

Using the SSL

Printing Installed Application Information

Preventing Information Leakage

Digital Signatures

Setting/Confirming a Key Pair and Device Certificate

Confirming a Key Pair and User Certificate

Checking a Device Signature/User Signature Certificate

Setting a Rights Management Server

Forced Secure Watermark/Document Scan Lock

Secure Watermark

Document Scan Lock

Adjusting the Secure Watermark Contrast

Adjusting Embedded Dots

Specifying the Document Scan Lock Operational Settings

Copy Set Numbering Options

Accepting Only Encrypted Secure Printing

Restricting the Send Function

Setting the Address Book

Mail Box Settings

Specifying Settings for All Mail Boxes

Specifying the Mail Box Security Settings

Setting the Control Panel Display

Specifying Management Settings for the Hard Disk

Completely Erasing Unnecessary Data from the Hard Disk

Initializing All Data/Settings

TPM Settings

Device Management

Using the USB Port

Device Information Settings

Specifying Device Information Delivery Settings

Registering/Deleting/Printing Delivery Destinations

Setting Automatic Delivery

Setting Manual Delivery

Setting the Receiving Machine

Checking/Printing the Communication Log

Setting SSO-H Authentication for Device Information Delivery Settings

Limiting Functions

Remote UI

Clearing the Message Board

Retrieving Audit Logs

Saving a Log of Key Operations

Available Administrator Settings Table (Touch Panel Display)

IEEE 2600 Security Standard

Top » Security » Using an Encryption Method That Complies with FIPS 140-2
Using an Encryption Method That Complies with FIPS 140-2
08KY-217
If you select 'On' for this mode, you can make the encryption method for the following settings comply with the United States government-approved FIPS 140-2:
[IPSec Settings] for [Preferences] (Settings/Registration). (See "IPSec Settings.")
If you set [Format Encryption Method to FIPS 140-2] to 'On', policies using AES-GCM for the authentication/encryption algorithm of IPSec communication are disabled. At the same time, the authentication algorithm for these policies is automatically changed to SHA1 and the encryption algorithm for these policies is automatically changed to 3DES-CBC. Policies with a certificate using the RSA-MD5 or RSA-MD2 signature algorithm are also disabled.
NOTE
For instructions on confirming the signature algorithm for the certificate you are using, see "Editing Key Pairs and Server Certificates."
1.
Press (Settings/Registration).
2.
Press [Management Settings] → [Device Management] → [Format Encryption Method to FIPS 140-2].
3.
Press [On] → [OK].
Select [Off] if you do not want to use an encryption method that complies with FIPS 140-2.