Skip header
 

Specifying the Extended Security Functions

Encrypting transmitted data will enhance security levels.

Press the [Menu] key, and then select the setting items using the [Down arrow key] or [Up arrow key] key.

1Select [Security Options] Press [OK]

2Select [Extended Security] Press [OK]

3Select the setting you want to change Press [OK] twice

Encrypt Address Book

This can be specified by administrator.

You can encrypt the individual settings of the machine's users and the data in the Address Book.

Even if information on an internal part has been leaked, the encryption prevents the Address Book data from being read.

Default: [Off]

Settings by SNMPv1 and v2

This can be specified by administrator.

When accessing the printer using the SNMPv1 or v2 protocol, you cannot perform authentication but can change administrator settings such as the paper setting. If you select [Prohibit], you can view the setting not specified with SNMPv1 or v2.

Default: [Do not Prohibit]

@Remote Service

Communication via HTTPS for @Remote Service is disabled if you select [Prohibit].

When setting it to [Prohibit], consult with your service representative.

Default: [Do not Prohibit]

Update Firmware

This can be specified by administrator.

Specify whether to allow firmware updates on the printer.

If you select [Prohibit], firmware on the printer cannot be updated.

If you select [Do not Prohibit], there are no restrictions on firmware updates.

Default: [Do not Prohibit]

Password Entry Violation

If the number of authentication requests exceeds the setting, the system classifies the access session as a password attack. The access session is recorded in the Access Log.

If the "Max. Allowed No. of Access" is set to [0], password attacks are not detected.

  • Max. Allowed No. of Access

    Specify the maximum number of allowable authentication attempts.

    You can specify a value in the range of 0 to 100.

    Default: [30]

  • Measurement Time

    Specify the interval to count the number of repeated failed authentication attempts. When the measurement time is over, the logged counts of failed authentication attempts are cleared.

    You can specify a value in the range of 1 to 10.

    Default: [5]

Security Setg for Accs Viol

When logging in to the printer via a network application, a user may be locked out erroneously because the number of authentication attempts of the user does not match the number of attempts logged internally.

For example, access may be denied when a print job for multiple sets of pages is sent from an application.

If you select [On] under "Security Setting for Access Violation ", you can prevent such authentication errors.

  • On

    • Accss Violtn Denial Duratn

      Specify the time to limit repeated access by a user.

      You can specify a value in the range of 0 to 60.

      Default: [15]

    • Managed User Host Limit

      Specify the number of user accounts to manage under "Security Setting for Access Violation ".

      You can specify a value in the range of 50 to 200.

      Default: [200]

    • Password Entry Host Limit

      Specify the number of passwords to manage under "Security Setting for Access Violation ".

      You can specify a value in the range of 50 to 200.

      Default: [200]

    • Status Monitor Interval

      Specify the monitoring interval of "Managed User Host Limit" and "Password Entry Host Limit".

      You can specify a value in the range of 1 to 10.

      Default: [3]

  • Off

Default: [Off]

Device Access Violation

If the number of log in requests exceeds the setting, the system classifies the access session as an access violation. The access session is recorded in the Access Log and the log data is sent to the machine administrator by e-mail. Also, a message is displayed on the control panel and on Web Image Monitor.

If the "Max. Allowed No. of Access" is set to [0], over access is not detected.

In "Authentication Delay Time", you can specify response delay time for log-in requests to prevent the system from becoming unavailable when an access violation is detected.

In "Simultns Access Host Limit", you can specify the limit number of hosts accessing the printer at one time. If the number of access exceeds the setting, monitoring becomes unavailable and the detected unavailability is recorded in the Log.

  • Max. Allowed No. of Access

    Specify the maximum number of allowable access attempts.

    You can specify a value in the range of 0 to 500.

    Default: [100]

  • Measurement Time

    Specify the interval to count the number of excessive access. When the measurement time is over, the logged counts of access are cleared.

    You can specify a value in the range of 10 to 30.

    Default: [10]

  • Authentication Delay Time

    Specify the authentication delay time when an access violation is detected.

    You can specify a value in the range of 0 to 9.

    Default: [3]

  • Simultns Access Host Limit

    Specify the number of acceptable authentication attempts when authentications are delayed due to an access violation.

    You can specify a value in the range of 50 to 200.

    Default: [200]