OKI MC860 1-Tray Color Multifunction Security Guide
advertisement
Assistant Bot
Need help? Our chatbot has already read the manual and is ready to assist you. Feel free to ask any questions about the device, but providing details will make the conversation more productive.
Security Guide
security
P
REFACE
Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors beyond its control. The manufacturer also cannot guarantee that changes in software and equipment made by other manufacturers and referred to in this guide will not affect the applicability of the information in it. Mention of software products manufactured by other companies does not necessarily constitute endorsement by the manufacturer.
While all reasonable efforts have been made to make this document as accurate and helpful as possible, we make no warranty of any kind, expressed or implied, as to the accuracy or completeness of the information contained herein.
Copyright © 2009 Oki Data Corporation. All rights reserved.
Oki is a registered trademark of Oki Electric Industry Company, Ltd.
Oki Printing Solutions is a trademark of Oki Data Corporation.
Microsoft, MS-DOS and Windows are registered trademarks of Microsoft Corporation.
Apple, Macintosh, Mac and Mac OS are registered trademarks of Apple Inc.
Other product names and brand names are registered trademarks or trademarks of their proprietors.
Preface > 2
C
ONTENTS
Notes, cautions and warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Accessing the web page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Adjusting the security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Protocol on/off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Panel lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
MAC address filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Password configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Using the printer security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Sending the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Printing the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Deleting a secure print document . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Sending the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Printing the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Deleting a stored document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Encrypted secure printing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Sending the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Printing the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Contents > 3
N
OTES
,
CAUTIONS AND WARNINGS
NOTE
A note provides additional information to supplement the main text.
CAUTION!
A caution provides additional information which, if ignored, may result in equipment malfunction or damage.
WARNING!
A warning provides additional information which, if ignored, may result in a risk of personal injury.
Specifications subject to change without notice. All trademarks acknowledged.
Notes, cautions and warnings > 4
D
OCUMENT SECURITY
Document security can be breached in many ways. Some are obvious and can be remedied quite easily;
>
>
Unattended documents left in a printer’s output tray. Even one connected “one-toone” with a computer.
Worse still, unattended documents left in a networked printer’s output tray, for all to see!
> Personnel possessing confidential documents off-site.
Other security risks may not be so obvious.
As printers and multi-function products become more sophisticated so must the security measures to ensure your valuable data is kept secure.
If left unprotected, access to records can be achieved via a networked machine. On-board hard disk drives (HDDs) may contain confidential data such as PIN numbers, personnel names and IP addresses as well as raw text.
Your machine has a number of valuable features which, when enabled, reduce the risk of security breaches.
The following chapters guide you through the initial set up and also explain how you use the secure printing features.
G
LOSSARY
IP Internet Protocol
HDD
MAC Address
PIN
SSL
TLS
Hard Disk Drive
Media Access Control Address
Personal Identification Number
Secure Sockets Layer
Transport Layer Security
Document security > 5
S
ETTING THE SECURITY
Although, in most cases, it is possible to program your machine via the operator panel, the most effective way is via the web page.
NOTE
Example screenshots are used throughout this manual and as such may not represent the screens displayed for your machine. Some of the features shown on the example screenshots may not be available on your machine.
A CCESSING THE WEB PAGE
Type the IP address of the machine in the URL field of your browser and then press Enter.
The machine web page appears. For example: http://10.18.207.15
Setting the security > 6
1.
2.
3.
A
DJUSTING THE SECURITY SETTINGS
You must log on as the administrator to adjust the security settings.
NOTE
The Administrative Settings are blocked by a password. The factory settings are:
Username: admin
Password: last 6 digits of the MAC address
Note: Entries are case sensitive.
It is recommended that the system administrator creates a new password, refer to
“Password configuration” on page 14
.
Click Administrator Login.
Enter the correct user name and password.
Click Login.
The initial administration entry screen is displayed.
Setting the security > 7
4.
Click Skip to navigate to the main menu page.
5.
From the left hand menu select Security.
Refer to the following chapters for instructions on how to set your security preferences.
NOTE
High level instructions are given, for more details refer to the information on screen.
Setting the security > 8
P
ROTOCOL ON
/
OFF
To set up the security protocol:
1.
From the left hand panel select Protocol ON/OFF.
2.
3.
4.
From the drop down menus select ENABLE / DISABLE as appropriate.
Input the port numbers as appropriate.
Click Submit to save the changes or Cancel to exit.
Setting the security > 9
P
ANEL LOCKOUT
To activate the lockout facility on the printer control panel:
1.
From the left hand panel select Panel Lockout.
2.
3.
From the drop down menu select LOCK.
Click Submit to save the changes or Cancel to exit.
Setting the security > 10
IP
FILTERING
To enable IP filtering:
1.
From the left hand panel select IP Filtering.
2.
3.
4.
From the drop down menu select ENABLE.
Input the range of host IP addresses and set permissions in the main table.
Click Submit to save the changes or Cancel to exit.
Setting the security > 11
MAC
ADDRESS FILTERING
To enable MAC address filtering:
1.
From the left hand panel select MAC Address Filtering.
2.
3.
4.
5.
From the drop down menu select ENABLE.
From the second drop down menu select ACCEPT.
Input the MAC addresses in the main table.
Click Submit to save the changes or Cancel to exit.
Setting the security > 12
SSL/TLS
To enable SSL/TLS encryption:
1.
From the left hand panel select SSL/TLS.
2.
3.
4.
5.
6.
7.
8.
9.
From the drop down menu select ENABLE.
NOTE
Click icon for an explanation of the options available.
Click the Cipher Level Setting link.
Select the level setting from the drop down menu options:
> Strong
> Standard
> Weak
Click OK to confirm.
Select the required option from Step 2: Create a Certificate.
NOTE
Click icon for an explanation of the options available.
Input the required information into the main table.
If required, update the following information:
> Key Exchange Method
> Key Size
Click OK to save the changes or Cancel to exit.
Setting the security > 13
P
ASSWORD CONFIGURATION
To change the administrator password:
1.
From the left hand panel select Password Configuration.
2.
3.
4.
Enter your new password.
Enter your new password again to confirm.
NOTE
Maximum 15 characters.
Click Submit to save the changes or Cancel to exit.
Setting the security > 14
U
SING THE PRINTER SECURITY FEATURES
NOTE
Example screenshots are used throughout this manual and as such may not represent the screens displayed for your machine. Some of the features shown on the example screenshots may not be available on your machine.
S ECURE PRINTING
Secure printing allows you to print confidential documents on machines that are shared with other users in a network environment.
The document does not print until a PIN (Personal Identification Number) is entered through the control panel. You must go to the machine and enter the PIN.
This feature requires the hard disk drive option to be fitted to your machine and enabled in the printer driver.
If there is not enough hard disk space for the spooled data, a “Disk Full” message displays, and only one copy prints.
NOTE
1. The secure printing feature may not be available from within some PC applications.
2. The secure printing feature is not supported in the Mac environment.
>
>
If your application software has a collate print option, turn it off otherwise secure printing will not work.
There are three parts in secure printing:
>
“Sending the document” on page 16
“Printing the document” on page 17
“Deleting a secure print document” on page 18
NOTE
The menu buttons on your machine’s control panel vary depending on the model.
For illustration purposes we will demonstrate the Printing and Deleting procedures using the +/- and Enter buttons; your machine may have Up/
Down and Return arrow buttons instead however the procedure is identical.
If your machine has a touch screen and numerical keypad buttons, the principle is basically the same; press the Print button to access the print menu options. There are on-screen instructions to guide you through the process.
Using the printer security features > 15
S
ENDING THE DOCUMENT
1.
2.
If using the PCL driver, in the Setup tab choose any saved driver settings you wish to use.
In the driver’s Job Options tab, click Secure Print.
The Job PIN (Personal Identification Number) window opens.
Printing Preferences
5.
6.
3.
4.
7.
8.
9.
If the PIN window does not open, click the PIN button.
In the Job PIN window, enter a name for this print job.
The name may be up to 16 alpha-numeric characters. If you have more than one print job stored on the machine when you come to print, you will need a distinctive name to distinguish each of your print jobs.
If you would like a prompt at the machine for the job name, click the Request… check box below the name entry.
Enter a number from 0000 to 9999 in the PIN box.
Your PIN must be unique on this machine. Each user should be allocated a PIN by the system administrator.
Click OK to accept your changes.
Click OK to close the Printer Properties window.
Print your document.
The print job will be sent to the machine, but will not print at this time.
Using the printer security features > 16
P
RINTING THE DOCUMENT
NOTE
The menu buttons on your machine’s control panel will vary depending on the model.
For illustration purposes we will demonstrate the following procedure using the +/- and Enter buttons; your machine may have Up/Down and Return arrow buttons instead however the procedure is identical.
If your machine has a touch screen and numerical keypad buttons, the principle is basically the same; press the Print button to access the print menu options. There are on-screen instructions to guide you through the process.
5.
6.
7.
8.
Your secure print job is printed using the control panel on the front of the machine.
1.
When the machine is idle, use the +/- buttons to select the PRINT JOB menu, then press ENTER.
2.
3.
Select ENCRYPTED/STORED JOB.
Use the +/- buttons to enter your PIN. Press ENTER after each digit.
4.
If you have more than one stored document, a list appears in the display.
Use the +/- buttons to select the name of the print job you wish to print, and press
ENTER to select it.
If necessary, use the +/- buttons to highlight the PRINT option.
Press ENTER to confirm you wish to print the document.
Use the +/- buttons to select the number of collated copies you require.
Press ENTER to print your document.
When all required copies have been printed your document is automatically deleted from the machines hard disk.
NOTE
It is also possible to print and delete secure documents remotely from your PC using the Storage Device Manager utility.
Using the printer security features > 17
D
ELETING A SECURE PRINT DOCUMENT
NOTE
The menu buttons on your machine’s control panel will vary depending on the model.
For illustration purposes we will demonstrate the following procedure using the +/- and Enter buttons; your machine may have Up/Down and Return arrow buttons instead however the procedure is identical.
If your machine has a touch screen and numerical keypad buttons, the principle is basically the same; press the Print button to access the print menu options. There are on-screen instructions to guide you through the process.
If you change your mind about printing a secure document, you can delete it from the machine’s hard disk without printing it first.
1.
2.
3.
Follow steps 1 to
4 in the above procedure for printing the document.
Use the +/- buttons to highlight the DELETE option and press ENTER.
If necessary, use the +/- buttons to highlight the YES choice, and press ENTER to confirm the deletion.
Your document is deleted from the machine’s hard disk without printing.
Using the printer security features > 18
S
TORE TO HARD DISK
This feature allows print jobs to be created on the PC and stored on the machine’s hard disk for printing on demand. This is good for forms, generic memos, letterhead, stationery, etc.
If you use this feature for standard forms, for example, you can walk up to the machine at any time and print off your forms without having to re-send them from the PC.
This feature works in exactly the same way as the secure printing feature described earlier in this chapter, and is available only in the Windows PostScript and PCL drivers. The difference with job spooling is that the document is not automatically deleted from the machine’s hard disk after printing. It remains there for future use until you delete it from the Printer Control Panel or from your PC with the Storage Device Manager utility.
NOTE
If this choice does not appear in the driver screens, or if it is greyed out, check to ensure that the hard disk is enabled in the printer driver.
>
>
Like the secure printing feature, there are three activities in job spooling:
> Sending the document
Printing the document
Deleting a stored document
S
ENDING THE DOCUMENT
Follow the same procedures as described in the section
“Sending the document” on page 16
for sending a secure document, except that on the Job Options tab in step 2, click Store to HDD.
Printing Preferences
P
RINTING THE DOCUMENT
Follow the same procedures as described in
“Printing the document” on page 17
for printing a secure document. In this case the document will not be deleted from the hard disk after it has been printed.
D
ELETING A STORED DOCUMENT
Follow the procedure as described in
“Deleting a secure print document” on page 18
for deleting a secure print document.
Like secure print documents, any other documents stored on the machine’s hard disk can also be deleted remotely from the PC using the Storage Device Manager utility.
Using the printer security features > 19
E
NCRYPTED SECURE PRINTING
Security over the network is an increasing concern for some organisations. Encrypted secure printing allows you to send, store and print confidential documents on machines that are shared with other users in a network environment.
Encrypting your documents before sending them to your machine will prevent unauthorised personnel accessing confidential or sensitive information.
Print jobs are encrypted immediately before transmission to the machine, where they are stored in an encrypted format on the hard disk drive. The documents will remain stored and unprinted until an authorised user authenticates the print job; decryption only happens when the job is actually printing.
This feature requires the hard disk drive to be installed in your machine and enabled in the printer driver.
NOTE
1. The secure printing feature may not be available from within some PC applications.
2. The secure printing feature is not supported in the Mac environment.
If your application software has a collate print option, turn it off otherwise encrypted printing may not work.
As deletion is automatic, there are only two activities in encrypted secure printing:
> Sending the document
> Printing the document
S
ENDING THE DOCUMENT
1.
2.
If using the PCL driver, in the Setup tab choose any saved driver settings you wish to use.
In the driver’s Job Options tab, click Encrypted Secure Print.
The Encrypted Secure Print window opens.
Printing Preferences
3.
4.
In the Encrypted Secure Print window, enter a Password for this print job:
The password must be between 4 and 12 alpha-numeric characters. Numbers 1 to 9 and letters a to z are all valid.
If you would like a prompt at the machine for the job password, click the Always
ask for password checkbox below the password entry.
Using the printer security features > 20
5.
6.
7.
8.
9.
Select the required erase option for your print job:
> No overwrite: simply erases a print job without over writing the job with data.
This erase method poses a risk as the print job can be reconstructed.
> Zero out once: erases a print job after over writing it with data once. This erase method is safer than the “No overwrite” option. However it still poses a risk of the print job being reconstructed.
> Multiple Random Overwrites: erases a print job after overwriting it with data three times. This is the safest method of erasing a print job. However it takes longer to complete the job.
Select the Auto Erase Time-out period.
Specify a period of time (hours:minutes) during which the print job is stored in the machine’s HDD. When this period expires, the print job is automatically erased from the HDD.
Click OK to accept your changes.
Click OK to close the Printer Properties window.
Print your document.
P
RINTING THE DOCUMENT
Follow the same procedures as described in the section
“Printing the document” on page 17
for printing a secure document.
In this case you will enter your password, and the document will be erased from the hard disk depending on the options you specified in Sending the document, step 5 “Select the required erase option for your print job:” on page 21 when sending the document to print.
Using the printer security features > 21
Oki Data Corporation
4-11-22 Shibaura, Minato-ku, Tokyo
108-8551, Japan www.okiprintingsolutions.com
44295201EE
advertisement
Related manuals
advertisement
Table of contents
- 2 Preface
- 3 Contents
- 4 Notes, cautions and warnings
- 5 Document security
- 5 Glossary
- 6 Setting the security
- 6 Accessing the web page
- 7 Adjusting the security settings
- 9 Protocol on/off
- 10 Panel lockout
- 11 IP filtering
- 12 MAC address filtering
- 13 SSL/TLS
- 14 Password configuration
- 15 Using the printer security features
- 15 Secure printing
- 16 Sending the document
- 17 Printing the document
- 18 Deleting a secure print document
- 19 Store to hard disk
- 19 Sending the document
- 19 Printing the document
- 19 Deleting a stored document
- 20 Encrypted secure printing
- 20 Sending the document
- 21 Printing the document