The administrator password and user password can be
changed.
When you change the password, be sure to remember the new
password.
(It is recommended that you periodically change the administrator
password.)
Use this setting to display the login screen and require
login in order to access the Web server.
Changes the setting of the administrator password.
When setting a password, make sure that it contains at least
one or more numbers, uppercase and lowercase letters of the alphabet,
and symbols.
The characters that can be entered are as follows.
Changes the setting of the user password.
When setting a password, make sure that it contains at least
one or more numbers, uppercase and lowercase letters of the alphabet,
and symbols.
The characters that can be entered are as follows.
The administrator password can be changed.
When you change the password, be sure to remember the new
password.
(It is recommended that you periodically change the administrator
password.)
You can select settings to cancel print jobs that are
not print hold jobs, or force all print jobs to be held.
When [Restrict Print Jobs other than the current Print-Hold Job] is turned ON, the
settings below can be
selected.
Item | Description |
---|---|
Force Retention |
This setting forcibly sets all print jobs as print hold jobs, even jobs for which print hold is not selected. |
Disable Job |
Prohibit all print jobs other than print hold jobs. |
If the print job is interrupted due to a paper jam,
etc., the job is automatically deleted after the time set in "Time
until Suspended Print Jobs are Automatically Deleted" has elapsed.
Set the time after stopping a job to automatically deleting
the job.
Completely deletes the data from the memory of the machine
when the job is completed.
You can reject the request from external sites.
Set whether to perform forced access control. Once set,
access to all files inside the machine will be forcibly controlled.
For the various major ports used in the system, set
the prohibition/permission and port number, and tap the [Store]
key.
The ports that can be set are as follows.
Server Port | Factory default settings | Client Port | Factory default settings | ||
---|---|---|---|---|---|
Port Control | Enable / Disable | Port Control | Enable / Disable | ||
HTTP |
80 |
Enabled |
HTTP |
Enabled |
|
HTTPS |
443 |
Enabled |
HTTPS |
Enabled |
|
FTP Print |
21 |
Enabled |
FTP |
Enabled |
|
Raw Print |
9100 |
Enabled |
FTPS |
Enabled |
|
LPD |
515 |
Enabled |
SMTP |
Enabled |
|
IPP |
631 |
Enabled |
SMTP-SSL/TLS |
Enabled |
|
IPP-SSL/TLS |
443 |
Disabled |
POP3 |
Enabled |
|
PC Scan |
52000 |
Enabled |
SNMP-TRAP |
162 |
Enabled |
Remote Operation Panel |
5900 |
Enabled |
Notify Job End |
Enabled |
|
SNMPD |
161 |
Enabled |
LDAP |
Enabled |
|
WSD |
Enabled |
LDAP-SSL/TLS |
Enabled |
||
SMB |
Enabled |
||||
mDNS |
Enabled |
||||
syslog |
514 |
Enabled |
|||
syslog-SSL/TLS |
6514 |
Enabled |
You can set the filter by an IP or MAC address to prevent
an unauthorised access to the machine via a network.
Set the IP or MAC address filter and tap the [Store]
key.
This option sets an IP address.
You can specify whether to allow or prohibit access to the
machine from the IP address you set.
This option sets a MAC address.
It allows access to the machine from the MAC address you set.
Enable the settings made in [System Settings] → [Security
Settings] → [Filter Setting] on the Web page.
SSL/TLS can be used for data transmission over a network.
SSL/TLS is a protocol that enables the encryption of information
communicated over a network. Encrypting data makes it possible to
transmit and receive sensitive information safely.
Data encryption can be set by the following protocols.
Displays the status of the certificate required for
SSL/TLS communication. Click the [Select] key to install the
certificate.
If the device certificate is installed, click the [Show]
key to display the certificate information.
Click the [Select] key to display the device certificates
that have already been registered. Select from them.
IPsec can be used for data transmission/reception on
a network.
When IPsec is used, data can be sent and received safely without
the need to configure settings for IP packet encryption in a Web
browser or other higher-level application.
When enabling this settings, take the following notes.
Sets whether to use IPsec for transmission.
Enter the Pre-Shared Key to be used for IKEv1.
Set the SA lifetime.
Set the IKE lifetime.
The registered IPsec rules are displayed.
To add a new rule, click the [Add] key.
To delete a rule, select the rule you want to delete and click
the [Delete] key.
Enter a name for the IPsec rule.
Set the priority level.
If there is a previously registered rule that is similar
to the rule you want to create, you can create the new rule based
on the registered rule.
Set the type of IP address to be used on the machine
and the port number (for IPv6, set the port number / prefix length).
Set the destination IP address type and port number
(for IPv6, set the port number / prefix length).
Set the protocol to be used.
Configure settings for the authentication method used
for IPsec.
Configure settings for the authentication method used
for IPsec.
Select to use ESP authentication.
Specify whether or not communication that does not use
ESP is allowed.
Select to use AH authentication.
Specify whether or not communication that does not use
AH is allowed.
Logs are created and saved for various events relating
to security functions and settings.
Audit logs are created and saved in English. However, setting
values such as filenames which are input from external sources are
saved as-is.
Audit logs which have been saved in the internal memory can
be exported by an administrator to a PC as TSV files.
You can select either the internal memory or an external server
as the destination for saving audit logs.
"Audit Log" can be carried out as follows.
In the Web page, select [System Settings] → [Security Settings] → [Audit Log]
Select "Security Control", "Storage/Send Settings" or "Save/Delete Audit Log".
"Storage/Send Settings" can be carried as follows.
In the Web page, select [System Settings] → [Security Settings] → [Audit Log]→
[Storage/Send Settings]
Then make the storage and transmission settings.
"Save/Delete Audit Log" can be carried out as follows.
In the Web page, select [System Settings] → [Security Settings] → [Audit Log]→
[Save/Delete Audit Log]
Select "Save Audit Log" or "Delete Audit Log".
If the audit log is saved to an external server, the
audit log is temporarily saved in the buffer area reserved in the
internal memory until the transmission to the external server is
successful.
Event name | Date & Time *1 |
Operation I/F *2 |
Login Name | Result *3 |
Additional Information |
---|---|---|---|---|---|
Audit Start |
Yes |
N/A |
N/A |
Yes |
Reasons for starting Other: security erase |
Audit End |
Yes |
N/A |
N/A |
Yes |
N/A |
Job Completion |
Yes |
Yes |
Job owner (SYSTEM) |
Yes |
Finished job name |
I&A Success |
Yes |
Yes |
The string entered as your login name |
N/A |
IP address of the login source 127.0.0.1 for the operation panel |
I&A Failure |
Yes |
Yes |
The string entered as the login name |
N/A |
IP address of the login source 127.0.0.1 for the operation panel |
Add User |
Yes |
Yes |
User who added |
Yes |
Added login name |
Login Terminated |
Yes |
Yes |
The string entered as your login name |
N/A |
Active termination/ Timeout |
Change Password |
Yes |
Yes |
The user who made the change |
Yes |
Login name of the user whose password has been changed |
Change Login Name |
Yes |
Yes |
The user who made the change |
Yes |
Login name after change |
Delete user |
Yes |
Yes |
User who deleted |
Yes |
Deleted login name (ALL if all users are deleted) |
Add Auth Group |
Yes |
Yes |
User who added |
Yes |
Added authority group name |
Change Role |
Yes |
Yes |
The user who made the change |
Yes |
|
Change Auth Group Setting |
Yes |
Yes |
The user who made the change |
Yes |
Privilege changed settings Group Name |
Add Page Limit Group |
Yes |
Yes |
Users with additional functions |
Yes |
Name of the additional page limit group |
Delete Page Limit Group |
Yes |
Yes |
Users whose functions are deleted |
Yes |
Name of the deleted page limit group |
Change Page Limit Group Setting |
Yes |
Yes |
Users who have changed the settings |
Yes |
Name of the changed page limit group |
Change Time Setting |
Yes |
Yes |
The user who made the change |
Yes |
N/A |
Change Setting |
Yes |
Yes |
User who made the change (“ByPolicy” when applying AD policy) |
Yes |
|
Firm Recovery |
Yes |
N/A |
N/A |
Yes |
|
Exec Rejection |
Yes |
N/A |
N/A |
Yes |
Distinguished name of firmware or embedded OSA app |
TLS, IPsec communication failure (Comm Failure) * Communication partner is other than the audit server |
Yes |
N/A |
Users who are communicating |
N/A |
|
Modify AddrBook |
Yes |
Yes |
User who updated |
Yes |
|
Firm Update |
Yes |
Yes |
User who updated |
Yes |
|
Release Denied Addr |
Yes |
Yes |
Users who have been released |
Yes |
Released IP address |
Send External Dest |
Yes |
Yes |
Users who sent |
Yes |
Destination e-mail address/IP address/SMB folder path |
Web Push Print |
Yes |
Yes |
Users of the function |
Yes |
IP address from which the file was downloaded |
Change Service Setting |
Yes |
Yes |
Users who have changed the settings |
Yes |
Changed settings and their values |
Switch to service mode |
Yes |
Yes |
Service |
Yes |
N/A |
Running in service mode |
Yes |
Yes |
Service |
Yes |
Changed setting values |
*1 The date and time when the event occurred is displayed in the extended format of ISO 8601.
*2 Either Ope/Web/sNet is displayed as the operation interface. However, if it is "N / A" in the table, it will be written as "N / A".
*3 Either Success / Failure will be displayed as the result of the event.
Import the certificate/private key.
Export the certificate/private key.
Shows the status of the certificate.
Enter the name to be used.
Enter the name of the organization.
Enter the name of the unit within the organization.
Enter the city or locality.
Enter the state or province.
Enter the country code.
Enter the start date and time for the certificate.
Enter the expiration date of the certificate.
Enter the Certificate Information.
Install the certificate.
Shows the status of the certificate.
Enter the name to be used.
Enter the name of the organization.
Enter the name of the unit within the organization.
Enter the city or locality.
Enter the state or province.
Enter the country code.
Specify the key length of the certificate.
Import the certificate.
Shows the status of the certificate.
Press the [OK] key to initialise the following personal
information and data in the machine.
Version 01a / bp22c25_usr_01a_en