Aficio MLP150DN Technical Information

Browse online or download Technical Information for Print & Scan Aficio MLP150DN. Aficio MLP150DN Technical information User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 72
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Network Security White Paper ver. G.1.2
Copyright
2011 RICOH Americas Corporation. All rights reserved. Page 1 of 72
Visit our Knowledgebase at:
http://www.ricoh-usa.com/support/knowledgebase.asp
1/24/2011
Technical Information:
Network Security
White Paper
Document Version G.1.2
Product
Code
Ricoh Savin Gestetner Lanier
D017
D018
D019
D020
Aficio MP 2550B
Aficio MP 2550
Aficio MP 3350B
Aficio MP 3350
9025b
9025
9033b
9033
MP 2550B
MP 2550
MP 3350B
MP 3350B
LD425B
LD425B
LD433B
LD433
D084
D085
Aficio MP 2851
Aficio MP 3351
9228
9233
MP 2851
MP 3351
MP 2851/LD528
MP 3351/LD533
D009
D011
D012
D013
Aficio MP 4000B
Aficio MP 4000
Aficio MP 5000B
Aficio MP 5000
9040b
9040
9050b
9050
MP 4000B
MP 4000
MP 5000B
MP 5000
LD040B
LD040
LD050B
LD050
D091
D092
Aficio MP 4001
Aficio MP 5001
9240
9250
MP 4001
MP 5001
MP 4001/LD140
MP 5001/LD150
D014
D015
Aficio MP C6000
Aficio MP C7500
C6055
C7570
MP C6000
MP C7500
LD260c
LD275c
G179 Aficio SP 8200DN MLP150DN
SP 8200DN LP150dn
Page view 0
1 2 3 4 5 6 ... 71 72

Summary of Contents

Page 1 - White Paper

Network Security White Paper ver. G.1.2 Copyright  2011 RICOH Americas Corporation. All rights reserved. Page 1 of 72 Visit our Knowledgebase

Page 2 - Page 2 of 72

Network Security White Paper ver. G.1.2 Page 10 of 72 We also recommend using the Access Control function for added security. Access Control is a li

Page 3 - Model Cross Reference:

Network Security White Paper ver. G.1.2 Page 11 of 72 1-2-5 Interception of network packets: When accessing the products using TELNET, the userna

Page 4

Network Security White Paper ver. G.1.2 Page 12 of 72 1-3 FTP 1-3-1 Function Overview The FTP (File Transfer Protocol) service is compliant with RF

Page 5

Network Security White Paper ver. G.1.2 Page 13 of 72 password that are disclosed only to Service Technicians is required to input firmware to the pr

Page 6

Network Security White Paper ver. G.1.2 Page 14 of 72 1-4-2 Destruction, Corruption and Modification of the File System or Kernel Although the SFTP

Page 7

Network Security White Paper ver. G.1.2 Page 15 of 72 1-5 HTTP 1-5-1 Function Overview The HTTP (Hypertext Transfer Protocol) service provides web

Page 8 - Page 8 of 72

Network Security White Paper ver. G.1.2 Page 16 of 72 1-5-6 Recommended Precautions The following are suggested precautions against threats to HTTP

Page 9

Network Security White Paper ver. G.1.2 Page 17 of 72 1-6-3 Theft of Print Data Interception of network packets: Using HTTPS, all data sent over th

Page 10 - Page 10 of 72

Network Security White Paper ver. G.1.2 Page 18 of 72 1-7-2 Potential Threats and Recommended Precautions Destruction, Corruption and Modification o

Page 11

Network Security White Paper ver. G.1.2 Page 19 of 72 NOTE1: Please refer to the Appendix section entitle “SNMP settings” for details about SNMP set

Page 12

Network Security White Paper ver. G.1.2 Page 2 of 72 NOTICE: This document may not be reproduced or distributed in whole or in part, for any purpose

Page 13 - Page 13 of 72

Network Security White Paper ver. G.1.2 Page 20 of 72 1-8-3 Recommended precaution Scenario 1: Basic security settings - Change the usernames and

Page 14

Network Security White Paper ver. G.1.2 Page 21 of 72 Theft of Print Data Using RSH/RCP, print/scan data is sent as clear text. If intercepted by a

Page 15 - Page 15 of 72

Network Security White Paper ver. G.1.2 Page 22 of 72 1-10-3 Recommended Precaution As stated above, there are not many threats that apply to the LPD

Page 16

Network Security White Paper ver. G.1.2 Page 23 of 72 1-11-3 Recommended Precaution In order to maintain a strict security policy, we recommend the

Page 17 - 1-7-1 Function Overview

Network Security White Paper ver. G.1.2 Page 24 of 72 1-12-3 Recommended Precautions If a strict security policy is needed, the DIPRINT port can be

Page 18 - Page 18 of 72

Network Security White Paper ver. G.1.2 Page 25 of 72 1-13-3 Visibility on the Network To protect the products from being browsed by unauthorized pa

Page 19

Network Security White Paper ver. G.1.2 Page 26 of 72 1-15-2 Potential Threats and Recommended Precautions Theft of Username and Password The SIP pro

Page 20

Network Security White Paper ver. G.1.2 Page 27 of 72 1-17 WS-Device 1-17-1 Function Overview WS-Device (‘Web Service’ Device) is a Windows Vista

Page 21 - Page 21 of 72

Network Security White Paper ver. G.1.2 Page 28 of 72 1-18 IPDS 1-18-1 Function Overview Intelligent Printer Data Stream (IPDS) is a structured f

Page 22

Network Security White Paper ver. G.1.2 Page 29 of 72 1-19 RHPP 1-19-1 Function Overview Though MFPs of all regions support RHPP, Ricoh has not r

Page 23 - 1-12-1 Function Overview

Network Security White Paper ver. G.1.2 Page 3 of 72 Terms: The following terms are used in this document. Please familiarize yourself with them. Th

Page 24 - Page 24 of 72

Network Security White Paper ver. G.1.2 Page 30 of 72 2. Other Network Services The previous section dealt mainly with physical port based network s

Page 25

Network Security White Paper ver. G.1.2 Page 31 of 72 WPA employs four authentication modes: ‘WPA-PSK’, ‘WPA2-PSK’, ‘WPA (802.1X)’ and ‘WPA2 (802.1X

Page 26 - Page 26 of 72

Network Security White Paper ver. G.1.2 Page 32 of 72 Scenario 2: Standard security settings: WEP We recommend making regular changes to the PSK.

Page 27

Network Security White Paper ver. G.1.2 Page 33 of 72 Encryption: Clear Text (No encryption) DES 3DES AES-128 AES-192 AES-256 Authentication: HMAC-

Page 28 - Page 28 of 72

Network Security White Paper ver. G.1.2 Page 34 of 72 Scenario 3 High: ESP+AH Very secure. Encryption of the payload and headers Data integrity Au

Page 29

Network Security White Paper ver. G.1.2 Page 35 of 72 3. Appendix 3-1 Services Requiring Open TCP/UDP Ports Protocol Port Num. Login Username Ch

Page 30 - 2. Other Network Services

Network Security White Paper ver. G.1.2 Page 36 of 72 Protocol Port Num. Login Username Changeable Password Password Changeable Note H323gatestat

Page 31 - Page 31 of 72

Network Security White Paper ver. G.1.2 Page 37 of 72 3-2 Related Protocols Protocol Protocol Suite Commonly Used Port Num. Description of the proto

Page 32

Network Security White Paper ver. G.1.2 Page 38 of 72 Protocol Protocol Suite Commonly Used Port Num. Description of the protocol’s function in the P

Page 33 - Page 33 of 72

Network Security White Paper ver. G.1.2 Page 39 of 72 3-2-2 Access Control – Web Image Monitor Web Image Monitor can be used for accessing the produ

Page 34

Network Security White Paper ver. G.1.2 Page 4 of 72 Table of Contents: 1. Introduction ...

Page 35 - 3. Appendix

Network Security White Paper ver. G.1.2 Page 40 of 72 3-2-3 Login as Administrator

Page 36 - Page 36 of 72

Network Security White Paper ver. G.1.2 Page 41 of 72 The four administrator types are identified as follows: : Machine Administrator : Network Admi

Page 37

Network Security White Paper ver. G.1.2 Page 42 of 72 Input the range of IP addresses that you wish to permit communication. Click the ‘OK’ button to

Page 38 - 3-2-1 Access Control

Network Security White Paper ver. G.1.2 Page 43 of 72 3-2-4 Access Control – mshell The following example is shown using the Windows XP telnet clien

Page 39 - Page 39 of 72

Network Security White Paper ver. G.1.2 Page 44 of 72 If changes have been made, the following question will appear when the user tries to logout. ‘D

Page 40 - Page 40 of 72

Network Security White Paper ver. G.1.2 Page 45 of 72 FTP 21 Y Y Y Y Setting FTP to down closes FTP port (21/tcp). The FTP server service will

Page 41

Network Security White Paper ver. G.1.2 Page 46 of 72 SNMP 161 Y Y Y Y Use Web Image Monitor’ to close this port. Setting SNMP to down closes

Page 42 - Page 42 of 72

Network Security White Paper ver. G.1.2 Page 47 of 72 RFU 10021 - - Y Y If this port is closed, remote firmware update will still be availabl

Page 43

Network Security White Paper ver. G.1.2 Page 48 of 72 3-3 Disabling Services – Web Image Monitor

Page 44 - 3-2-5 Disabling Services

Network Security White Paper ver. G.1.2 Page 49 of 72 3-3-1 Disabling Services – mshell Set <service> up/down After saving, the user will be

Page 45 - Page 45 of 72

Network Security White Paper ver. G.1.2 Page 5 of 72 1-5-6 Recommended Precautions ...

Page 46

Network Security White Paper ver. G.1.2 Page 50 of 72 3-3-2 HTTP/HTTPS settings Security > SSL/TLS 3-3-3 Permit SSL/TLS Communication • Ciph

Page 47 - Page 47 of 72

Network Security White Paper ver. G.1.2 Page 51 of 72 HTTP/HTTPS settings Security > SSL/TLS In addition to the features described on the previou

Page 48

Network Security White Paper ver. G.1.2 Page 52 of 72 • The ability to enable/disable specific versions of SSL/TLS: • Support for certificate signi

Page 49 - Page 49 of 72

Network Security White Paper ver. G.1.2 Page 53 of 72 3-4 SNMP settings: 3-4-1 Web Image Monitor To access the SNMP (v1/v2) settings, click Network

Page 50 - 3-3-2 HTTP/HTTPS settings

Network Security White Paper ver. G.1.2 Page 54 of 72 3-5 Network > SNMP v3 • SNMP (This setting can be configured either from here or from th

Page 51 - HTTP/HTTPS settings

Network Security White Paper ver. G.1.2 Page 55 of 72 There are 3 different types of accounts that can be used for SNMPv3 connections. Only the Us

Page 52 - • 2048 bits (sha1WithRSA)

Network Security White Paper ver. G.1.2 Page 56 of 72 3-6 Mshell You can configure SNMP settings using snmp commands from mshell. These commands can

Page 53 - 3-4-1 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 57 of 72 3-7 Administrator Account Settings 3-7-1 Web Image Monitor Device Settings > Program/Chang

Page 54 - 3-5 Network > SNMP v3

Network Security White Paper ver. G.1.2 Page 58 of 72 3-8 Network Security Level Settings 3-8-1 Configuration Network Security Levels are settings

Page 55 - Page 55 of 72

Network Security White Paper ver. G.1.2 Page 59 of 72 3-8-2 Description of the Levels: Network Security Level Setting Level 0 Level 1 Level 2 IE

Page 56

Network Security White Paper ver. G.1.2 Page 6 of 72 1-13-1 Function Overview ...

Page 57 - 3-7-1 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 60 of 72 3-9 Wireless LAN settings WEP, WPA-PSK/WPA2-PSK, and WPA (802.1X)/WPA2 (802.1X) can be configu

Page 58 - 3-8-1 Configuration

Network Security White Paper ver. G.1.2 Page 61 of 72 3-9-2 [IEEE802.11b Settings] • Network Enable: IEEE802.11b is enabled Disable: IEEE802.11b

Page 59 - Page 59 of 72

Network Security White Paper ver. G.1.2 Page 62 of 72 3-9-3 WEP WEP settings can only be configured if ‘WEP’ is selected in ‘IEEE802.11b Settings

Page 60 - 3-9-1 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 63 of 72 3-9-4 WPA WPA settings can only be configured if ‘WPA’ is selected in ‘IEEE802.11b Settings’ -

Page 61 - Page 61 of 72

Network Security White Paper ver. G.1.2 Page 64 of 72 WPA/WPA2 • User Name: This is the username used for EAP authentication on the Radius server.

Page 62

Network Security White Paper ver. G.1.2 Page 65 of 72 3-9-5 mshell Configure Wireless LAN settings using ‘wiconfig’ commands from mshell. For a list

Page 63 - 3-9-4 WPA

Network Security White Paper ver. G.1.2 Page 66 of 72 3-9-6 IPsec Settings IPsec settings can be configured via telnet, or Web Image Monitor. In ord

Page 64 - Page 64 of 72

Network Security White Paper ver. G.1.2 Page 67 of 72 IPsec: • IPsec Active: Activate IPsec Inactive: Deactivate IPsec • Exclude HTTPS Communicati

Page 65

Network Security White Paper ver. G.1.2 Page 68 of 72 Encryption Key Manual Settings: • Address Type Inactive: Do not use IPsec IPv4: Apply IPsec

Page 66 - 3-9-7 Web Image Monitor

Network Security White Paper ver. G.1.2 Page 69 of 72 • Security Protocol ESP: Uses ESP AH: Uses AH AH+ESP: Uses dual mode (AH + ESP) • Authenti

Page 67 - Page 67 of 72

Network Security White Paper ver. G.1.2 Page 7 of 72 2-1-3 WEP...

Page 68

Network Security White Paper ver. G.1.2 Page 70 of 72 Encryption Key Auto Exchange Settings: • Address Type Inactive: Do not use IPsec IPv4: Apply I

Page 69 - Page 69 of 72

Network Security White Paper ver. G.1.2 Page 71 of 72 Phase 2: • Security Protocol ESP: Uses ESP AH: Uses AH AH+ESP: Uses dual mode (AH + ESP) •

Page 70 - Page 70 of 72

Network Security White Paper ver. G.1.2 Page 72 of 72 4. Reference List • RFC: HTTP://www.faqs.org/rfcs/ • CVE: HTTP://cve.mitre.org/ • CERT: H

Page 71

Network Security White Paper ver. G.1.2 Page 8 of 72 3-9-1 Web Image Monitor......

Page 72 - 4. Reference List

Network Security White Paper ver. G.1.2 Page 9 of 72 1. Introduction This document describes potential network threats and recommended precautions f

Comments to this Manuals

No comments