OKI MC860 Security Guide

Security Guide
security
P
REFACE
Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors beyond its control. The manufacturer also cannot guarantee that changes in software and equipment made by other manufacturers and referred to in this guide will not affect the applicability of the information in it. Mention of software products manufactured by other companies does not necessarily constitute endorsement by the manufacturer.
While all reasonable efforts have been made to make this document as accurate and helpful as possible, we make no warranty of any kind, expressed or implied, as to the accuracy or completeness of the information contained herein.
Copyright © 2009 Oki Europe Ltd. All rights reserved.
Oki is a registered trademark of Oki Electric Industry Company, Ltd.
Oki Printing Solutions is a registered trademark of Oki Data Corporation.
Microsoft, MS-DOS and Windows are registered trademarks of Microsoft Corporation.
Apple, Macintosh, Mac and Mac OS are registered trademarks of Apple Computer.
Other product names and brand names are registered trademarks or trademarks of their proprietors.
Preface > 2
C
ONTENTS
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Notes, cautions and warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Document security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Setting the security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Accessing the web page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Adjusting the security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Protocol on/off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Panel lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
IP filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
MAC address filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
SSL/TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Password configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Using the printer security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Secure printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Sending the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Printing the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Deleting a secure print document . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Store to hard disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Sending the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Printing the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Deleting a stored document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Encrypted secure printing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Sending the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Printing the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Contents > 3
N
OTES, CAUTIONS AND WARNINGS
NOTE A note provides additional information to supplement the main text.
CAUTION!
A caution provides additional information which, if ignored, may result in equipment malfunction or damage.
WARNING!
A warning provides additional information which, if ignored, may result in a risk of personal injury.
Specifications subject to change without notice. All trademarks acknowledged.
Notes, cautions and warnings > 4
D
OCUMENT SECURITY
Document security can be breached in many ways. Some are obvious and can be remedied quite easily;
> Unattended documents left in a printer’s output tray. Even one connected “one-to-
one” with a computer.
> Worse still, unattended documents left in a networked printer’s output tray, for all to
see!
> Personnel possessing confidential documents off-site.
Other security risks may not be so obvious.
As printers and multi-function products become more sophisticated so must the security measures to ensure your valuable data is kept secure.
If left unprotected, access to records can be achieved via a networked machine. On-board hard disk drives (HDDs) may contain confidential data such as PIN numbers, personnel names and IP addresses as well as raw text.
Your machine has a number of valuable features which, when enabled, reduce the risk of security breaches.
The following chapters guide you through the initial set up and also explain how you use the secure printing features.
G
LOSSARY
IP Internet Protocol
HDD Hard Disk Drive
MAC Address Media Access Control Address
PIN Personal Identification Number
SSL Secure Sockets Layer
TLS Transport Layer Security
Document security > 5
S
ETTING THE SECURITY
Although, in most cases, it is possible to program your machine via the operator panel, the most effective way is via the web page.
NOTE Example screenshots are used throughout this manual and as such may not represent the screens displayed for your machine. Some of the features shown on the example screenshots may not be available on your machine.
A
CCESSING THE WEB PAGE
Type the IP address of the machine in the URL field of your browser and then press Enter. The machine web page appears. For example:
http://10.18.207.15
Setting the security > 6
A
DJUSTING THE SECURITY SETTINGS
You must log on as the administrator to adjust the security settings.
NOTE The Administrative Settings are blocked by a password. Refer to your user documentation for the factory default settings.
It is recommended that the system administrator creates a new password, refer to “Password configuration” on page 14.
1. Click Administrator Login.
2. Enter the correct user name and password.
3. Click Login.
The initial administration entry screen is displayed.
Setting the security > 7
Loading...
+ 15 hidden pages