Main content
Security of RICOH Production Printers
Along with the development of the information society, we are facing various threats, such as computer viruses, personal information leakage and unauthorized access. In such situations, it is important to take the necessary security measures for everybody.
This is now important not only for PCs, servers, and networks, but also for.
In order to use RICOH Production Printers more safely, we would like to recommend taking the following security measures.
Measures with your network and PCs
- Connect your ICT devices, including Production Printers, to a network isolated by a firewall to prevent unauthorized access from the Internet.
- PC Operation
- Set screen locks
It is recommended to lock the PC screen when leaving it unattended.
- Use different browsers for Production Printers and Internet
While operating this product from the Web browser, it is recommended to use a different browser application, except for sites that can trusted. Another option is to fully log out from this product, not just closing the window or tab, before browsing other sites.
- Only open hyperlinks that can be trusted
Be careful when opening hyperlinks in emails and Web pages. Only open links that can be trusted.
Measures with Production Printers
- Use a private IP address
Unauthorized access from the Internet can be prevented by operating in a local area network environment such as an in-house LAN.
- Change the password
By changing the password of Production Printers, it is possible to prevent attacks, such as setting changes, by a malicious third party from the Internet. Be sure to change the password from the default value.
- Protection for Production Printers stored data
It is recommended to protect the data stored in Production Printers with user authentication and stored document password setting.
-By performing user authentication such as identifying and authenticating the user (IC card and password input), only authorized users can use Production Printers.
-Set the stored document password so that it cannot be used by a third party by setting a password for accessing the stored document
- SMB setting
It is recommended to use v3.0 or higher for SMB. For the models that do not allow such settings, it is recommended to protect them with IPsec.
- Storage encryption
It is recommended to encrypt the memory (NVRAM) / HDD/ SSD of Production Printers.
- Access permission setting
It is recommended to limit the permissions that allow to cancel jobs to job owners and administrators.
- IP Use a Restricted IP Address
It is recommended to limit the range of IP addresses that can access to Production Printers as much as possible. It will prevent unauthorized access from the Internet.
- Disable unused network services
It is recommended to disable unnecessary networks services. In particular, rsh, telnet, ftp, lpr, etc. do not have encryption function by themselves, so if concerned about network eavesdropping, it is recommended to disable network services or protect it with IPsec described later. You can check the applications that are affected by disabling services in the user manual of the device you are using. If you have any questions, please contact the service providers.
- SSL/TLS setting
- Certificate settings
To prevent information leakage via the network, it is recommended to use encrypted communication if supported. Encrypted communication includes SSL / TLS and IPsec. See the manual for supported communications.
It is recommended to use a certificate issued by a trusted third-party certificate authority instead of a self-signed certificate as the digital certificate used to encrypt the communication.
If a self-signed certificate is used, it is needed to install it on a PC that uses a browser.
- Limitation of SSL2.0/3.0
It is recommended to not use SSL 2.0 or SSL 3.0 that are older standards. For the models that do not allow such settings, it is recommended to protect with IPsec.
- Limitation of encryption suite
It is recommended to not use RC4 or DES, which have low encryption strength.
- IPsec setting
If network eavesdropping is concerned but need to use a communication method that does not have encryption, it is recommended to protect with IPsec.
- SNMP settings
To reduce the risk of network load attacks using SNMP, the following are recommended:
- Change the community name from the default name.
- Ensure the community name is segmented appropriately. For example, avoid sharing the same community name used by an entire business division.
Alternatively, SNMPv3 is recommend.
- HTTP port setting
Changing the HTTP port number will reduce the risk of unauthorized access to Web interface.
Production Printers support various security functions, so please use it according to your environment. For the security function, check the user manual of Production Printers. If you have any questions, please contact our sales or service providers.