EasyManua.ls Logo

Ricoh aficio MP W3601 User Manual

Ricoh aficio MP W3601
332 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #214 background imageLoading...
Page #214 background image
If you are using a certificate as the authentication method in encryption key auto exchange settings
(IKE), install the certificate using Web Image Monitor. A certificate cannot be installed using telnet.
ipsec
To display IPsec related settings information, use the "ipsec" command.
Display current settings
msh> ipsec
Displays the following IPsec settings information:
IPsec shared settings values
Encryption key manual settings, SA setting 1-4 values
Encryption key manual settings, default setting values
Encryption key auto exchange settings, IKE setting 1-4 values
Encryption key auto exchange settings, IKE default setting values
Display current settings portions
msh> ipsec -p
Displays IPsec settings information in portions.
ipsec manual mode
To display or specify encryption key manual settings, use the "ipsec manual_mode" command.
Display current settings
msh> ipsec manual_mode
Displays the current encryption key manual settings.
Specify encryption key manual settings
msh> ipsec manual_mode {on|off}
To enable encryption key manual settings, set to [on]. To disable settings, set to [off].
ipsec exclude
To display or specify protocols excluded by IPsec, use the "ipsec exclude" command.
Display current settings
msh> ipsec exclude
Displays the protocols currently excluded from IPsec transmission.
7. Enhanced Network Security
212
7

Table of Contents

Other manuals for Ricoh aficio MP W3601

Questions and Answers:

Ricoh aficio MP W3601 Specifications

General IconGeneral
BrandRicoh
Modelaficio MP W3601
CategoryAll in One Printer
LanguageEnglish

Summary

Getting Started

Setting up the Machine

Steps to configure the administrator account and enable data encryption for enhanced security.

Security Measures Provided by this Machine

Details on authentication, information security, and network security measures implemented by the machine.

Configuring Administrator Authentication

Configuring User Authentication

Enabling User Authentication

Details on controlling user access via login names and passwords using various authentication methods.

Protecting Data from Information Leaks

Printing a Confidential Document

Utilizes the Locked Print function to store and print confidential documents securely.

Specifying Locked Print File

Configures printer driver settings to specify a Locked Print file for secure document handling.

Configuring Access Permissions for Stored Files

Defines user access levels (Read-only, Edit, Full Control) for files stored in Document Server.

Securing Information Sent over the Network or Stored on Hard Disk

Preventing Information Leakage Due to Unauthorized Transmission

Controls data transmission by restricting destinations and preventing unauthorized sending of files.

Using S/MIME to Protect E-mail Transmission

Secures e-mail by encrypting content and attaching electronic signatures for sender verification.

Encrypting Data on the Hard Disk

Protects data stored on the hard disk by encrypting it to prevent information leakage.

Managing Access to the Machine

Preventing Changes to Machine Settings

Restricts modification of machine settings by specifying administrator roles and user permissions.

Managing Log Files

Tracks machine access, user identities, and function usage; logs can be encrypted for security.

Enhanced Network Security

Specifying the Extended Security Functions

Troubleshooting

Related product manuals