Aficio MLP150DN Información técnica

Busca en linea o descarga Información técnica para Impresión y escaneo Aficio MLP150DN. Aficio MLP150DN Technical information Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 72
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
Network Security White Paper ver. G.1.2
Copyright
2011 RICOH Americas Corporation. All rights reserved. Page 1 of 72
Visit our Knowledgebase at:
http://www.ricoh-usa.com/support/knowledgebase.asp
1/24/2011
Technical Information:
Network Security
White Paper
Document Version G.1.2
Product
Code
Ricoh Savin Gestetner Lanier
D017
D018
D019
D020
Aficio MP 2550B
Aficio MP 2550
Aficio MP 3350B
Aficio MP 3350
9025b
9025
9033b
9033
MP 2550B
MP 2550
MP 3350B
MP 3350B
LD425B
LD425B
LD433B
LD433
D084
D085
Aficio MP 2851
Aficio MP 3351
9228
9233
MP 2851
MP 3351
MP 2851/LD528
MP 3351/LD533
D009
D011
D012
D013
Aficio MP 4000B
Aficio MP 4000
Aficio MP 5000B
Aficio MP 5000
9040b
9040
9050b
9050
MP 4000B
MP 4000
MP 5000B
MP 5000
LD040B
LD040
LD050B
LD050
D091
D092
Aficio MP 4001
Aficio MP 5001
9240
9250
MP 4001
MP 5001
MP 4001/LD140
MP 5001/LD150
D014
D015
Aficio MP C6000
Aficio MP C7500
C6055
C7570
MP C6000
MP C7500
LD260c
LD275c
G179 Aficio SP 8200DN MLP150DN
SP 8200DN LP150dn
Vista de pagina 0
1 2 3 4 5 6 ... 71 72

Indice de contenidos

Pagina 1 - White Paper

Network Security White Paper ver. G.1.2 Copyright  2011 RICOH Americas Corporation. All rights reserved. Page 1 of 72 Visit our Knowledgebase

Pagina 2 - Page 2 of 72

Network Security White Paper ver. G.1.2 Page 10 of 72 We also recommend using the Access Control function for added security. Access Control is a li

Pagina 3 - Model Cross Reference:

Network Security White Paper ver. G.1.2 Page 11 of 72 1-2-5 Interception of network packets: When accessing the products using TELNET, the userna

Pagina 4

Network Security White Paper ver. G.1.2 Page 12 of 72 1-3 FTP 1-3-1 Function Overview The FTP (File Transfer Protocol) service is compliant with RF

Pagina 5

Network Security White Paper ver. G.1.2 Page 13 of 72 password that are disclosed only to Service Technicians is required to input firmware to the pr

Pagina 6

Network Security White Paper ver. G.1.2 Page 14 of 72 1-4-2 Destruction, Corruption and Modification of the File System or Kernel Although the SFTP

Pagina 7

Network Security White Paper ver. G.1.2 Page 15 of 72 1-5 HTTP 1-5-1 Function Overview The HTTP (Hypertext Transfer Protocol) service provides web

Pagina 8 - Page 8 of 72

Network Security White Paper ver. G.1.2 Page 16 of 72 1-5-6 Recommended Precautions The following are suggested precautions against threats to HTTP

Pagina 9

Network Security White Paper ver. G.1.2 Page 17 of 72 1-6-3 Theft of Print Data Interception of network packets: Using HTTPS, all data sent over th

Pagina 10 - Page 10 of 72

Network Security White Paper ver. G.1.2 Page 18 of 72 1-7-2 Potential Threats and Recommended Precautions Destruction, Corruption and Modification o

Pagina 11

Network Security White Paper ver. G.1.2 Page 19 of 72 NOTE1: Please refer to the Appendix section entitle “SNMP settings” for details about SNMP set

Pagina 12

Network Security White Paper ver. G.1.2 Page 2 of 72 NOTICE: This document may not be reproduced or distributed in whole or in part, for any purpose

Pagina 13 - Page 13 of 72

Network Security White Paper ver. G.1.2 Page 20 of 72 1-8-3 Recommended precaution Scenario 1: Basic security settings - Change the usernames and

Pagina 14

Network Security White Paper ver. G.1.2 Page 21 of 72 Theft of Print Data Using RSH/RCP, print/scan data is sent as clear text. If intercepted by a

Pagina 15 - Page 15 of 72

Network Security White Paper ver. G.1.2 Page 22 of 72 1-10-3 Recommended Precaution As stated above, there are not many threats that apply to the LPD

Pagina 16

Network Security White Paper ver. G.1.2 Page 23 of 72 1-11-3 Recommended Precaution In order to maintain a strict security policy, we recommend the

Pagina 17 - 1-7-1 Function Overview

Network Security White Paper ver. G.1.2 Page 24 of 72 1-12-3 Recommended Precautions If a strict security policy is needed, the DIPRINT port can be

Pagina 18 - Page 18 of 72

Network Security White Paper ver. G.1.2 Page 25 of 72 1-13-3 Visibility on the Network To protect the products from being browsed by unauthorized pa

Pagina 19

Network Security White Paper ver. G.1.2 Page 26 of 72 1-15-2 Potential Threats and Recommended Precautions Theft of Username and Password The SIP pro

Pagina 20

Network Security White Paper ver. G.1.2 Page 27 of 72 1-17 WS-Device 1-17-1 Function Overview WS-Device (‘Web Service’ Device) is a Windows Vista

Pagina 21 - Page 21 of 72

Network Security White Paper ver. G.1.2 Page 28 of 72 1-18 IPDS 1-18-1 Function Overview Intelligent Printer Data Stream (IPDS) is a structured f

Pagina 22

Network Security White Paper ver. G.1.2 Page 29 of 72 1-19 RHPP 1-19-1 Function Overview Though MFPs of all regions support RHPP, Ricoh has not r

Pagina 23 - 1-12-1 Function Overview

Network Security White Paper ver. G.1.2 Page 3 of 72 Terms: The following terms are used in this document. Please familiarize yourself with them. Th

Pagina 24 - Page 24 of 72

Network Security White Paper ver. G.1.2 Page 30 of 72 2. Other Network Services The previous section dealt mainly with physical port based network s

Pagina 25

Network Security White Paper ver. G.1.2 Page 31 of 72 WPA employs four authentication modes: ‘WPA-PSK’, ‘WPA2-PSK’, ‘WPA (802.1X)’ and ‘WPA2 (802.1X

Pagina 26 - Page 26 of 72

Network Security White Paper ver. G.1.2 Page 32 of 72 Scenario 2: Standard security settings: WEP We recommend making regular changes to the PSK.

Pagina 27

Network Security White Paper ver. G.1.2 Page 33 of 72 Encryption: Clear Text (No encryption) DES 3DES AES-128 AES-192 AES-256 Authentication: HMAC-

Pagina 28 - Page 28 of 72

Network Security White Paper ver. G.1.2 Page 34 of 72 Scenario 3 High: ESP+AH Very secure. Encryption of the payload and headers Data integrity Au

Pagina 29

Network Security White Paper ver. G.1.2 Page 35 of 72 3. Appendix 3-1 Services Requiring Open TCP/UDP Ports Protocol Port Num. Login Username Ch

Pagina 30 - 2. Other Network Services

Network Security White Paper ver. G.1.2 Page 36 of 72 Protocol Port Num. Login Username Changeable Password Password Changeable Note H323gatestat

Pagina 31 - Page 31 of 72

Network Security White Paper ver. G.1.2 Page 37 of 72 3-2 Related Protocols Protocol Protocol Suite Commonly Used Port Num. Description of the proto

Pagina 32

Network Security White Paper ver. G.1.2 Page 38 of 72 Protocol Protocol Suite Commonly Used Port Num. Description of the protocol’s function in the P

Pagina 33 - Page 33 of 72

Network Security White Paper ver. G.1.2 Page 39 of 72 3-2-2 Access Control – Web Image Monitor Web Image Monitor can be used for accessing the produ

Pagina 34

Network Security White Paper ver. G.1.2 Page 4 of 72 Table of Contents: 1. Introduction ...

Pagina 35 - 3. Appendix

Network Security White Paper ver. G.1.2 Page 40 of 72 3-2-3 Login as Administrator

Pagina 36 - Page 36 of 72

Network Security White Paper ver. G.1.2 Page 41 of 72 The four administrator types are identified as follows: : Machine Administrator : Network Admi

Pagina 37

Network Security White Paper ver. G.1.2 Page 42 of 72 Input the range of IP addresses that you wish to permit communication. Click the ‘OK’ button to

Pagina 38 - 3-2-1 Access Control

Network Security White Paper ver. G.1.2 Page 43 of 72 3-2-4 Access Control – mshell The following example is shown using the Windows XP telnet clien

Pagina 39 - Page 39 of 72

Network Security White Paper ver. G.1.2 Page 44 of 72 If changes have been made, the following question will appear when the user tries to logout. ‘D

Pagina 40 - Page 40 of 72

Network Security White Paper ver. G.1.2 Page 45 of 72 FTP 21 Y Y Y Y Setting FTP to down closes FTP port (21/tcp). The FTP server service will

Pagina 41

Network Security White Paper ver. G.1.2 Page 46 of 72 SNMP 161 Y Y Y Y Use Web Image Monitor’ to close this port. Setting SNMP to down closes

Pagina 42 - Page 42 of 72

Network Security White Paper ver. G.1.2 Page 47 of 72 RFU 10021 - - Y Y If this port is closed, remote firmware update will still be availabl

Pagina 43

Network Security White Paper ver. G.1.2 Page 48 of 72 3-3 Disabling Services – Web Image Monitor

Pagina 44 - 3-2-5 Disabling Services

Network Security White Paper ver. G.1.2 Page 49 of 72 3-3-1 Disabling Services – mshell Set <service> up/down After saving, the user will be

Pagina 45 - Page 45 of 72

Network Security White Paper ver. G.1.2 Page 5 of 72 1-5-6 Recommended Precautions ...

Pagina 46

Network Security White Paper ver. G.1.2 Page 50 of 72 3-3-2 HTTP/HTTPS settings Security > SSL/TLS 3-3-3 Permit SSL/TLS Communication • Ciph

Pagina 47 - Page 47 of 72

Network Security White Paper ver. G.1.2 Page 51 of 72 HTTP/HTTPS settings Security > SSL/TLS In addition to the features described on the previou

Pagina 48

Network Security White Paper ver. G.1.2 Page 52 of 72 • The ability to enable/disable specific versions of SSL/TLS: • Support for certificate signi

Pagina 49 - Page 49 of 72

Network Security White Paper ver. G.1.2 Page 53 of 72 3-4 SNMP settings: 3-4-1 Web Image Monitor To access the SNMP (v1/v2) settings, click Network

Pagina 50 - 3-3-2 HTTP/HTTPS settings

Network Security White Paper ver. G.1.2 Page 54 of 72 3-5 Network > SNMP v3 • SNMP (This setting can be configured either from here or from th

Pagina 51 - HTTP/HTTPS settings

Network Security White Paper ver. G.1.2 Page 55 of 72 There are 3 different types of accounts that can be used for SNMPv3 connections. Only the Us

Pagina 52 - • 2048 bits (sha1WithRSA)

Network Security White Paper ver. G.1.2 Page 56 of 72 3-6 Mshell You can configure SNMP settings using snmp commands from mshell. These commands can

Pagina 53 - 3-4-1 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 57 of 72 3-7 Administrator Account Settings 3-7-1 Web Image Monitor Device Settings > Program/Chang

Pagina 54 - 3-5 Network > SNMP v3

Network Security White Paper ver. G.1.2 Page 58 of 72 3-8 Network Security Level Settings 3-8-1 Configuration Network Security Levels are settings

Pagina 55 - Page 55 of 72

Network Security White Paper ver. G.1.2 Page 59 of 72 3-8-2 Description of the Levels: Network Security Level Setting Level 0 Level 1 Level 2 IE

Pagina 56

Network Security White Paper ver. G.1.2 Page 6 of 72 1-13-1 Function Overview ...

Pagina 57 - 3-7-1 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 60 of 72 3-9 Wireless LAN settings WEP, WPA-PSK/WPA2-PSK, and WPA (802.1X)/WPA2 (802.1X) can be configu

Pagina 58 - 3-8-1 Configuration

Network Security White Paper ver. G.1.2 Page 61 of 72 3-9-2 [IEEE802.11b Settings] • Network Enable: IEEE802.11b is enabled Disable: IEEE802.11b

Pagina 59 - Page 59 of 72

Network Security White Paper ver. G.1.2 Page 62 of 72 3-9-3 WEP WEP settings can only be configured if ‘WEP’ is selected in ‘IEEE802.11b Settings

Pagina 60 - 3-9-1 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 63 of 72 3-9-4 WPA WPA settings can only be configured if ‘WPA’ is selected in ‘IEEE802.11b Settings’ -

Pagina 61 - Page 61 of 72

Network Security White Paper ver. G.1.2 Page 64 of 72 WPA/WPA2 • User Name: This is the username used for EAP authentication on the Radius server.

Pagina 62

Network Security White Paper ver. G.1.2 Page 65 of 72 3-9-5 mshell Configure Wireless LAN settings using ‘wiconfig’ commands from mshell. For a list

Pagina 63 - 3-9-4 WPA

Network Security White Paper ver. G.1.2 Page 66 of 72 3-9-6 IPsec Settings IPsec settings can be configured via telnet, or Web Image Monitor. In ord

Pagina 64 - Page 64 of 72

Network Security White Paper ver. G.1.2 Page 67 of 72 IPsec: • IPsec Active: Activate IPsec Inactive: Deactivate IPsec • Exclude HTTPS Communicati

Pagina 65

Network Security White Paper ver. G.1.2 Page 68 of 72 Encryption Key Manual Settings: • Address Type Inactive: Do not use IPsec IPv4: Apply IPsec

Pagina 66 - 3-9-7 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 69 of 72 • Security Protocol ESP: Uses ESP AH: Uses AH AH+ESP: Uses dual mode (AH + ESP) • Authenti

Pagina 67 - Page 67 of 72

Network Security White Paper ver. G.1.2 Page 7 of 72 2-1-3 WEP...

Pagina 68

Network Security White Paper ver. G.1.2 Page 70 of 72 Encryption Key Auto Exchange Settings: • Address Type Inactive: Do not use IPsec IPv4: Apply I

Pagina 69 - Page 69 of 72

Network Security White Paper ver. G.1.2 Page 71 of 72 Phase 2: • Security Protocol ESP: Uses ESP AH: Uses AH AH+ESP: Uses dual mode (AH + ESP) •

Pagina 70 - Page 70 of 72

Network Security White Paper ver. G.1.2 Page 72 of 72 4. Reference List • RFC: HTTP://www.faqs.org/rfcs/ • CVE: HTTP://cve.mitre.org/ • CERT: H

Pagina 71

Network Security White Paper ver. G.1.2 Page 8 of 72 3-9-1 Web Image Monitor......

Pagina 72 - 4. Reference List

Network Security White Paper ver. G.1.2 Page 9 of 72 1. Introduction This document describes potential network threats and recommended precautions f

Comentarios a estos manuales

Sin comentarios