manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. Ricoh
  6. •
  7. Printer
  8. •
  9. Ricoh C400DN - Aficio SP Color Laser Printer User manual

Ricoh C400DN - Aficio SP Color Laser Printer User manual

Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Aficio MP C300/C300SR/C400/C400SR series
Security Target
Author : RICOH COMPANY, LTD.
Date : 2012-08-17
Ver ion : 1.00
Portion of Aficio
MP C300/C300SR/C400/C400SR erie Security Target are
reprinted with written permi ion from IEEE, 445 Hoe Lane, Pi cataway, New
Jer ey 08855,
from IEEE 2600.1, Protection Profile for Hardcopy Device ,
Operational Environment A, Copyright © 2009 IEEE. All right re erved.
Thi document i a tran lation of the evaluated and certified ecurity target
written in Japane e.
Page 1 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Revision History
Version Date Author Detail
1.00 2012-08-17 RICOH COMPANY, LTD. Publication ver ion.
Page 2 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Table of Contents
1
11
1
ST Introduction
ST IntroductionST Introduction
ST Introduction ................................
................................................................
................................................................
................................................................
................................................................
................................................................
.....................................................
..........................................
..................... 7
77
7
1.1
1.11.1
1.1 ST Reference
ST ReferenceST Reference
ST Reference ................................
................................................................
................................................................
................................................................
................................................................
................................................................
..................................................
....................................
.................. 7
77
7
1.2
1.21.2
1.2 TOE Reference
TOE ReferenceTOE Reference
TOE Reference ................................
................................................................
................................................................
................................................................
................................................................
................................................................
...............................................
..............................
............... 7
77
7
1.3
1.31.3
1.3 TOE Overview
TOE OverviewTOE Overview
TOE Overview................................
................................................................
................................................................
................................................................
................................................................
................................................................
................................................
................................
................ 8
88
8
1.3.1 TOE Type..................................................................................................................... 8
1.3.2 TOE Usage................................................................................................................... 8
1.3.3 ajor Security Features of TOE...............................................................................11
1.4
1.41.4
1.4 TOE Description
TOE DescriptionTOE Description
TOE Description................................
................................................................
................................................................
................................................................
................................................................
................................................................
...........................................
......................
........... 11
1111
11
1.4.1 Physical Boundary of TOE ........................................................................................11
1.4.2 Guidance Documents................................................................................................ 14
1.4.3 Definition of Users .................................................................................................... 17
1.4.3.1. Direct User ......................................................................................................... 17
1.4.3.2. Indirect User ...................................................................................................... 18
1.4.4 Logical Boundary of TOE ......................................................................................... 19
1.4.4.1. Basic Functions.................................................................................................. 19
1.4.4.2. Security Functions............................................................................................. 22
1.4.5 Protected Assets ........................................................................................................ 24
1.4.5.1. User Data ........................................................................................................... 24
1.4.5.2. TSF Data ............................................................................................................ 25
1.4.5.3. Functions............................................................................................................ 25
1.5
1.51.5
1.5 Glossary
GlossaryGlossary
Glossary................................
................................................................
................................................................
................................................................
................................................................
................................................................
........................................................
................................................
........................ 25
2525
25
1.5.1 Glossary for This ST ................................................................................................. 25
2
22
2
Conformance Claim
Conformance ClaimConformance Claim
Conformance Claim................................
................................................................
................................................................
................................................................
................................................................
................................................................
.............................................
..........................
............. 29
2929
29
2.1
2.12.1
2.1 CC Conformance Claim
CC Conformance ClaimCC Conformance Claim
CC Conformance Claim................................
................................................................
................................................................
................................................................
................................................................
................................................................
................................ 29
2929
29
2.2
2.22.2
2.2 PP Claims
PP ClaimsPP Claims
PP Claims................................
................................................................
................................................................
................................................................
................................................................
................................................................
.....................................................
..........................................
..................... 29
2929
29
2.3
2.32.3
2.3 Package Claims
Package ClaimsPackage Claims
Package Claims ................................
................................................................
................................................................
................................................................
................................................................
................................................................
............................................
........................
............ 29
2929
29
2.4
2.42.4
2.4 Conformance Claim Rationale
Conformance Claim RationaleConformance Claim Rationale
Conformance Claim Rationale ................................
................................................................
................................................................
................................................................
.....................................................
..........................................
..................... 30
3030
30
2.4.1 Consistency Claim with TOE Type in PP................................................................ 30
2.4.2 Consistency Claim with Security Problems and Security Objectives in PP......... 30
2.4.3 Consistency Claim with Security Requirements in PP.......................................... 31
3
33
3
Security Problem Definitions
Security Problem DefinitionsSecurity Problem Definitions
Security Problem Definitions................................
................................................................
................................................................
................................................................
..............................................................
............................................................
.............................. 34
3434
34
Page 3 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
3.1
3.13.1
3.1 Threats
ThreatsThreats
Threats ................................
................................................................
................................................................
................................................................
................................................................
................................................................
.........................................................
..................................................
......................... 34
3434
34
3.2
3.23.2
3.2 Organisational Security Policies
Organisational Security PoliciesOrganisational Security Policies
Organisational Security Policies................................
................................................................
................................................................
................................................................
..................................................
....................................
.................. 35
3535
35
3.3
3.33.3
3.3 Assumptions
AssumptionsAssumptions
Assumptions................................
................................................................
................................................................
................................................................
................................................................
................................................................
.................................................
..................................
................. 35
3535
35
4
44
4
Security Objectives
Security ObjectivesSecurity Objectives
Security Objectives................................
................................................................
................................................................
................................................................
................................................................
................................................................
..............................................
............................
.............. 37
3737
37
4.1
4.14.1
4.1 Security Objectives for TOE
Security Objectives for TOESecurity Objectives for TOE
Security Objectives for TOE................................
................................................................
................................................................
................................................................
.........................................................
..................................................
......................... 37
3737
37
4.2
4.24.2
4.2 Security Objectives of Operational Enviro
Security Objectives of Operational EnviroSecurity Objectives of Operational Enviro
Security Objectives of Operational Environment
nmentnment
nment................................
................................................................
........................................................
................................................
........................ 38
3838
38
4.2.1 IT Environment......................................................................................................... 38
4.2.2 Non-IT Environment................................................................................................. 39
4.3
4.34.3
4.3 Security Objectives Rationale
Security Objectives RationaleSecurity Objectives Rationale
Security Objectives Rationale ................................
................................................................
................................................................
................................................................
......................................................
............................................
...................... 40
4040
40
4.3.1 Correspondence Table of Security Objectives ......................................................... 40
4.3.2 Security Objectives Descriptions ............................................................................. 41
5
55
5
Extended Components Definition
Extended Components DefinitionExtended Components Definition
Extended Components Definition................................
................................................................
................................................................
................................................................
.......................................................
..............................................
....................... 45
4545
45
5.1
5.15.1
5.1 Restricted forwarding of data to external interfaces (FPT_FDI_EXP)
Restricted forwarding of data to external interfaces (FPT_FDI_EXP)Restricted forwarding of data to external interfaces (FPT_FDI_EXP)
Restricted forwarding of data to external interfaces (FPT_FDI_EXP) .......................
..............................................
....................... 45
4545
45
6
66
6
Security Requirements
Security RequirementsSecurity Requirements
Security Requirements................................
................................................................
................................................................
................................................................
................................................................
................................................................
........................................
................
........ 47
4747
47
6.1
6.16.1
6.1 Security Functional Requirements
Security Functional RequirementsSecurity Functional Requirements
Security Functional Requirements................................
................................................................
................................................................
................................................................
..............................................
............................
.............. 47
4747
47
6.1.1 Class FAU: Security audit........................................................................................ 47
6.1.2 Class FCS: Cryptographic support .......................................................................... 50
6.1.3 Class FDP: User data protection ............................................................................. 51
6.1.4 Class FIA: Identification and authentication ......................................................... 55
6.1.5 Class F T: Security management........................................................................... 59
6.1.6 Class FPT: Protection of the TSF............................................................................. 65
6.1.7 Class FTA: TOE access ............................................................................................. 65
6.1.8 Class FTP: Trusted path/channels........................................................................... 65
6.2
6.26.2
6.2 Security Assurance Requirements
Security Assurance RequirementsSecurity Assurance Requirements
Security Assurance Requirements................................
................................................................
................................................................
................................................................
...............................................
..............................
............... 66
6666
66
6.3
6.36.3
6.3 Security Requirements Rationale
Security Requirements RationaleSecurity Requirements Rationale
Security Requirements Rationale................................
................................................................
................................................................
................................................................
................................................
................................
................ 67
6767
67
6.3.1 Tracing ....................................................................................................................... 67
6.3.2 Justification of Traceability...................................................................................... 68
6.3.3 Dependency Analysis ................................................................................................ 75
6.3.4 Security Assurance Requirements Rationale.......................................................... 77
7
77
7
TOE Summary Specification
TOE Summary SpecificationTOE Summary Specification
TOE Summary Specification................................
................................................................
................................................................
................................................................
...............................................................
..............................................................
............................... 78
7878
78
7.1
7.17.1
7.1 Audit Function
Audit FunctionAudit Function
Audit Function ................................
................................................................
................................................................
................................................................
................................................................
................................................................
.............................................
..........................
............. 78
7878
78
7.2
7.27.2
7.2 Identification and Authentication Function
Identification and Authentication FunctionIdentification and Authentication Function
Identification and Authentication Function ................................
................................................................
................................................................
................................................................
................................ 80
8080
80
Page 4 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
7.3
7.37.3
7.3 Document Access Control Function
Document Access Control FunctionDocument Access Control Function
Document Access Control Function ................................
................................................................
................................................................
................................................................
.............................................
..........................
............. 82
8282
82
7.4
7.47.4
7.4 Use
UseUse
Use-
--
-of
ofof
of-
--
-Feature Restriction Function
Feature Restriction FunctionFeature Restriction Function
Feature Restriction Function ................................
................................................................
................................................................
................................................................
...........................................
......................
........... 84
8484
84
7.5
7.57.5
7.5 Network Protection Function
Network Protection FunctionNetwork Protection Function
Network Protection Function................................
................................................................
................................................................
................................................................
.......................................................
..............................................
....................... 85
8585
85
7.6
7.67.6
7.6 Residual Data Ov
Residual Data OvResidual Data Ov
Residual Data Overwrite Function
erwrite Functionerwrite Function
erwrite Function................................
................................................................
................................................................
................................................................
..............................................
............................
.............. 85
8585
85
7.7
7.77.7
7.7 Stored Data Protection Function
Stored Data Protection FunctionStored Data Protection Function
Stored Data Protection Function ................................
................................................................
................................................................
................................................................
.................................................
..................................
................. 86
8686
86
7.8
7.87.8
7.8 Security anagement Function
Security anagement FunctionSecurity anagement Function
Security anagement Function ................................
................................................................
................................................................
................................................................
..................................................
....................................
.................. 86
8686
86
7.9
7.97.9
7.9 Software Verification Function
Software Verification FunctionSoftware Verification Function
Software Verification Function ................................
................................................................
................................................................
................................................................
....................................................
........................................
.................... 91
9191
91
7.10
7.107.10
7.10 Fax Line Separation Function
Fax Line Separation FunctionFax Line Separation Function
Fax Line Separation Function ................................
................................................................
................................................................
................................................................
.....................................................
..........................................
..................... 91
9191
91
Page 5 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
List of Figures
Figure 1 : Example of TOE Environment ....................................................................................................... 9
Figure 2 : Hardware Configuration of the TOE ............................................................................................ 12
Figure 3 : Logical Scope of the TOE ............................................................................................................ 19
List of Tables
Table 1 : Identification Information of MFP ................................................................................................... 7
Table 2 : Guidance for Engli h Ver ion-1 ..................................................................................................... 14
Table 3 : Guidance for Engli h Ver ion-2 ..................................................................................................... 15
Table 4 : Guidance for Engli h Ver ion-3 ..................................................................................................... 16
Table 5 : Definition of U er ......................................................................................................................... 18
Table 6 : Li t of Admini trative Role .......................................................................................................... 18
Table 7 : Definition of U er Data.................................................................................................................. 24
Table 8 : Definition of TSF Data................................................................................................................... 25
Table 9 : Specific Term Related to Thi ST................................................................................................. 25
Table 10 : Rationale for Security Objective ................................................................................................. 40
Table 11 : Li t of Auditable Event ............................................................................................................... 48
Table 12 : Li t of Cryptographic Key Generation......................................................................................... 51
Table 13 : Li t of Cryptographic Operation .................................................................................................. 51
Table 14 : Li t of Subject , Object , and Operation among Subject and Object (a)................................. 52
Table 15 : Li t of Subject , Object , and Operation among Subject and Object (b)................................. 52
Table 16 : Subject , Object and Security Attribute (a) ............................................................................... 52
Table 17 : Rule to Control Operation on Document Data and U er Job (a) ............................................. 53
Table 18 : Additional Rule to Control Operation on Document Data and U er Job (a)............................ 54
Table 19 : Subject , Object and Security Attribute (b)............................................................................... 55
Table 20 : Rule to Control Operation on MFP Application (b) .................................................................. 55
Table 21 : Li t of Authentication Event of Ba ic Authentication ................................................................ 56
Table 22 : Li t of Action for Authentication Failure.................................................................................... 56
Table 23 : Li t of Security Attribute for Each U er That Shall Be Maintained ........................................... 56
Table 24 : Rule for Initial A ociation of Attribute .................................................................................... 59
Table 25 : U er Role for Security Attribute (a) .......................................................................................... 60
Table 26 : U er Role for Security Attribute (b) .......................................................................................... 61
Table 27 : Authori ed Identified Role Allowed to Override Default Value ................................................ 61
Table 28 : Li t of TSF Data........................................................................................................................... 62
Table 29 : Li t of Specification of Management Function ........................................................................... 63
Table 30 : TOE Security A urance Requirement (EAL3+ALC_FLR.2).................................................... 66
Table 31 : Relation hip between Security Objective and Functional Requirement ................................... 67
Table 32 : Re ult of Dependency Analy i of TOE Security Functional Requirement .............................. 75
Table 33 : Li t of Audit Event ...................................................................................................................... 78
Table 34 : Li t of Audit Log Item ................................................................................................................ 79
Table 35 : Unlocking Admini trator for Each U er Role............................................................................. 81
Page 6 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Table 36 : Stored Document Acce Control Rule for Normal U er ........................................................ 83
Table 37 : Encrypted Communication Provided by the TOE ...................................................................... 85
Table 38 : Li t of Cryptographic Operation for Stored Data Protection ...................................................... 86
Table 39 : Management of TSF Data ............................................................................................................ 87
Table 40 : Li t of Static Initiali ation for Security Attribute of Document Acce Control SFP ................. 90
Page 7 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
1 ST Introduction
Thi ection de cribe ST Reference, TOE Reference, TOE Overview and TOE De cription.
1.1 ST Reference
The following are the identification information of thi ST.
Title : Aficio MP C300/C300SR/C400/C400SR erie Security Target
Ver ion : 1.00
Date : 2012-08-17
Author : RICOH COMPANY, LTD.
1.2 TOE Reference
Thi TOE i a digital multifunction product (hereafter "MFP") with "Fax Option Type C400" option in talled.
The TOE i identified by the MFP name and the ver ion of component that con titute the TOE. The
identification information of the TOE i hown below. Although there are everal MFP product name
depending on ale area and/or ale companie , their component are identical.
Table 1 Identification Information of MFP
MFP Name Ricoh Aficio MP C300, Ricoh Aficio MP C300SR,
Ricoh Aficio MP C400, Ricoh Aficio MP C400SR,
Savin C230, Savin C230SR,
Savin C240, Savin C240SR,
Lanier LD130C, Lanier LD130CSR,
Lanier LD140C, Lanier LD140CSR,
Lanier MP C300, Lanier MP C300SR,
Lanier MP C400, Lanier MP C400SR,
na huatec MP C300, na huatec MP C300SR,
na huatec MP C400, na huatec MP C400SR,
Rex-Rotary MP C300, Rex-Rotary MP C300SR,
Rex-Rotary MP C400, Rex-Rotary MP C400SR,
Ge tetner MP C300, Ge tetner MP C300SR,
Ge tetner MP C400, Ge tetner MP C400SR,
infotec MP C300, infotec MP C300SR,
infotec MP C400, infotec MP C400SR
Software
Sy tem/Copy 2.05
TOE Ver ion
Network Support 10.57
Page 8 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Fax 02.00.00
RemoteFax 01.00.00
NetworkDocBox 1.04
Web Support 1.02
Web Uapl 1.01
animation 1.00
Scanner 01.04
Printer 1.01
PCL 1.07
OptionPCLFont 1.02
Data Era e Std 1.01x
GWFCU3-23 (WW) 03.00.00
Engine 1.02:02
OpePanel 1.03
LANG0 1.03
LANG1 1.03
Hardware
Ic Key 01020700
Ic Ctlr 03
Keyword : Digital MFP, Document , Copy, Print, Scanner, Network, Office, Fax
1. TOE Overview
Thi ection define TOE Type, TOE U age and Major Security Feature of TOE.
1. .1 TOE Type
Thi TOE i an MFP, which i an IT device that input , tore , and output document .
1. .2 TOE Usage
The operational environment of the TOE i illu trated below and the u age of the TOE i outlined in thi
ection.
Page 9 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Figure 1 Example of TOE Environment
The TOE i u ed by connecting to the local area network (hereafter "LAN") and telephone line , a hown in
Figure 1. U er can operate the TOE from the Operation Panel of the TOE or through LAN communication .
Below, explanation are provided for the MFP, which i the TOE it elf, and hardware and oftware other
than the TOE.
MFP
A machinery that i defined a the TOE. The MFP i connected to the office LAN, and u er can perform the
following operation from the Operation Panel of the MFP:
- Variou etting for the MFP,
- Copy, fax, torage, and network tran mi ion of paper document ,
- Print, fax, network tran mi ion, and deletion of the tored document .
Al o, the TOE receive information via telephone line and can tore it a a document.
LAN
Network u ed in the TOE environment.
Page 10 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Client computer
A computer that perform a a client of the TOE if it i connected to the LAN, and u er can remotely
operate the MFP from the client computer. The po ible remote operation from the client computer are a
follow :
- Variou etting for the MFP u ing a Web brow er in talled on the client computer,
- Operation of document u ing a Web brow er in talled on the client computer,
- Storage and printing of document u ing the printer driver in talled on the client computer,
- Storage and faxing of document u ing the fax driver in talled on the client computer.
Telephone line
A public line for the TOE to communicate with external faxe .
Firewall
A device to prevent the office environment from network attack via the Internet.
FTP Server
A erver u ed by the TOE for folder tran mi ion of the tored document in the TOE to it folder .
SMB Server
A erver u ed by the TOE for folder tran mi ion of the tored document in the TOE to it folder .
SMTP Server
A erver u ed by the TOE for e-mail tran mi ion of the tored document in the TOE.
External Authentication Server
A erver that identifie and authenticate the TOE u er with Window authentication (Kerbero
authentication method). Thi erver i only u ed when External Authentication i applied. The TOE
identifie and authenticate the u er by communicating with the external authentication erver via LAN.
RC Gate
An IT device u ed for @Remote. The function of RC Gate for @Remote i to relay communication
between the MFP and maintenance centre. A tran fer path to other external interface for input information
from the RC Gate via network interface i not implemented in the TOE. The RC Gate product include
Remote Communication Gate A, Remote Communication Gate Type BN1, and Remote Communication
Gate Type BM1.
Page 11 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
1. . Major Security Features of TOE
The TOE tore document in it, and end and receive document to and from the IT device connected to
the LAN. To en ure provi ion of confidentiality and integrity for tho e document , the TOE ha the
following ecurity feature :
- Audit Function
- Identification and Authentication Function
- Document Acce Control Function
- U e-of-Feature Re triction Function
- Network Protection Function
- Re idual Data Overwrite Function
- Stored Data Protection Function
- Security Management Function
- Software Verification Function
- Fax Line Separation Function
1.4 TOE Description
Thi ection de cribe Phy ical Boundary of TOE, Guidance Document , Definition of U er , Logical
Boundary of TOE, and Protected A et .
1.4.1 Physical Boundary of TOE
The phy ical boundary of the TOE i the MFP, which con i t of the following hardware component
( hown in Figure 2): Operation Panel Unit, Engine Unit, Fax Controller Unit, Controller Board, HDD, Ic Ctlr,
Network Unit, USB Port, SD Card Slot, and SD Card.
Page 12 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Figure 2 Hardware Configuration of the TOE
Controller Board
The Controller Board i a device that contain Proce or , RAM, NVRAM, Ic Key, and Fla hROM. The
Controller Board end and receive information to and from the unit and device that con titute the MFP,
and thi information i u ed to control the MFP. The information to control the MFP i proce ed by the
MFP Control Software on the Controller Board. The following de cribe the component of the Controller
Board:
- Proce or
A emiconductor chip that perform ba ic arithmetic proce ing for MFP operation .
- RAM
A volatile memory medium which i u ed a a working area for image proce ing uch a
compre ing/decompre ing the image data. It can al o be u ed to temporarily read and write
internal information.
- NVRAM
A non-volatile memory medium in which TSF data for configuring MFP operation i tored.
- Ic Key
A ecurity chip that ha the function of random number generation, cryptographic key generation
Page 13 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
and digital ignature. It ha the memory medium in ide, and the ignature root key i in talled
before the TOE i hipped.
- Fla hROM
A non-volatile memory medium in which the following oftware component are in talled:
Sy tem/Copy, Network Support, Scanner, Printer, Fax, RemoteFax, Web Support, Web Uapl,
NetworkDocBox, animation, PCL, OptionPCLFont, LANG0, and LANG1. The e are part of the
TOE and are included in the MFP Control Software.
Operation Panel Unit (hereafter "Operation Panel")
The Operation Panel i a u er interface in talled on the TOE and con i t of the following device : key
witche , LED indicator , an LCD touch creen, and Operation Control Board. The Operation Control Board
i connected to the key witche , LED indicator , and LCD touch creen. The Operation Panel Control
Software i in talled on the Operation Panel Control Board. The Operation Panel Control Software perform
the following:
1. Tran fer operation in truction from the key witche and the LCD touch creen to the
Controller Board.
2. Control the LED and di play information on the LCD touch creen according to di play
in truction from the Controller Board.
OpePanel, which i one of the component that con titute the TOE, i the identifier for the Operation Panel
Control Software.
Engine Unit
The Engine Unit con i t of Scanner Engine that i an input device to read paper document , Printer Engine
that i an output device to print and eject paper document , and Engine Control Board. The Engine Control
Software i in talled in the Engine Control Board. The Engine Control Software end tatu information
about the Scanner Engine and Printer Engine to the Controller Board, and operate the Scanner Engine or
Printer Engine according to in truction from the MFP Control Software. Engine, which i one of the
component that con titute the TOE, i the identifier for the Engine Control Software.
Fax Controller Unit (FCU)
The Fax Controller Unit i a unit that ha a modem function for connection to a telephone line. It al o end
and receive fax data to and from other fax device u ing the G3 tandard for communication. The Fax
Controller Unit end and receive control information about the Controller Board and the FCU and fax data.
FCU Control Software i in talled on the FCU. GWFCU3-23(WW), which i one of the component that
con titute the TOE, i the identifier for the FCU Control Software.
HDD
The HDD i a hard di k drive that i a non-volatile memory medium. It tore document , login u er name
and login pa word of normal u er .
Page 14 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Ic Ctlr
The Ic Ctlr i a board that implement data encryption and decryption function . It i provided with function
for HDD encryption reali ation.
Network Unit
The Network Unit i an external interface to an Ethernet (100BASE-TX/10BASE-T) LAN.
USB Port
The USB Port i an external interface to connect a client computer to the TOE for printing directly from the
client computer. During in tallation, thi interface i di abled.
SD Card/SD Card Slot
There are SD Card Slot for cu tomer engineer and for u er .
The SD Card Slot for cu tomer engineer i u ed when the cu tomer engineer in tall the TOE. A cover i
placed on the SD Card Slot during the TOE operation o that an SD Card cannot be in erted into or removed
from the lot. The SD Card, where Data Era e Std i written, i in erted into the lot in advance.
The SD Card Slot for u er i u ed by u er to print document in the SD Card. The lot i di abled at the
time of in tallation.
1.4.2 Guidance Documents
The following et of u er guidance document are available for thi TOE: [Engli h ver ion-1], [Engli h
ver ion-2], and [Engli h ver ion-3]. Selection of the guidance document et depend on the ale area and/or
ale company. Guidance document et will be upplied with individual TOE component. Detail of the
document et are a follow .
[Engli h ver ion-1]
Table 2 Guidance for English Version-1
TOE
Components
Guidance Documents for Product
MFP - C230/C230SR/C240/C240SR
LD130C/LD130CSR/LD140C/LD140CSR
Aficio MP C300/C300SR/C400/C400SR
Operating In truction
About Thi Machine M026-7401
- Note for U er M026-7438
- Quick Reference Copy Guide M026-7412
- Quick Reference Printer Guide M026-7429
- Quick Reference Scanner Guide M026-7434
Page 15 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
- C230/C230SR/C240/C240SR
LD130C/LD130CSR/LD140C/LD140CSR
Aficio MP C300/C300SR/C400/C400SR
Operating In truction
Trouble hooting M026-7415
- Note for U er M026-7439
- Note to u er in the United State of America D566-7091
- About the Software on the CD-ROM M080-8547
- SOFTWARE LICENSE AGREEMENT D376-7905
- Note for U er D081-7678
- Note for Admini trator : U ing thi Machine in a Network Environment
Compliant with IEEE Std. 2600.1
TM
-2009 M026-7442
- Operating In truction Note on Security Function M026-7443
- Manual for U er
Aficio MP C300/MP C300SR/MP C400/MP C400SR
C230/C230SR/C240/C240SR
LD130C/LD130CSR/LD140C/LD140CSR M026-6908
- Manual for Admini trator
Aficio MP C300/MP C300SR/MP C400/MP C400SR
C230/C230SR/C240/C240SR
LD130C/LD130CSR/LD140C/LD140CSR M026-6909
- Help 83NHBVENZ1.00 v118
FCU - Quick Reference Fax Guide D483-8504
- Fax Option Type C400
(Machine Code: D483)
In tallation Procedure
For Machine Code:
M022/ M024/ M026/ M028 Copier D483-8610A
[Engli h ver ion-2]
Table 3 Guidance for English Version-2
TOE
Components
Guidance Documents for Product
MFP - Safety Information for MP C300/MP C300SR/MP C400/MP C400SR/Aficio MP C300/
Aficio MP C300SR/Aficio MP C400/Aficio MP C400SR M026-7399
- Note for U er M026-7437
- Quick Reference Copy Guide M026-7411
- Quick Reference Fax Guide D483-8503
Page 16 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
- Quick Reference Printer Guide M026-7428
- Quick Reference Scanner Guide M026-7433
- CE Marking Traceability Information
(For EU Countrie Only) AA00-0253A
- Note for U er M026-7510
- About the Software on the CD-ROM M080-8547
- Manual for Thi Machine D081-7602
- Safety Information A232-8561A
- Note for U er D081-7676
- SOFTWARE LICENSE AGREEMENT D376-7905
- Note for Admini trator : U ing thi Machine in a Network Environment
Compliant with IEEE Std. 2600.1
TM
-2009 M026-7440
- Operating In truction Note on Security Function M026-7441
- Manual for U er
Aficio MP C300/MP C300SR/MP C400/MP C400SR
MP C300/MP C300SR/MP C400/MP C400SR
A M026-6906
- Manual for Admini trator
Security Reference
Aficio MP C300/MP C300SR/MP C400/MP C400SR
MP C300/MP C300SR/MP C400/MP C400SR M026-6910
- Help 83NHBVENZ1.00 v118
FCU - Fax Option Type C400
(Machine Code: D483)
In tallation Procedure
For Machine Code:
M022/ M024/ M026/ M028 Copier D483-8610A
[Engli h ver ion-3]
Table 4 Guidance for English Version-3
TOE
Components
Guidance Documents for Product
MFP - MP C300/C300SR/C400/C400SR
MP C300/C300SR/C400/C400SR
Aficio MP C300/C300SR/C400/C400SR
Operating In truction
About Thi Machine M026-7403
- Note for U er M026-7438
Page 17 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
- Quick Reference Copy Guide M026-7413
- Quick Reference Printer Guide M026-7429
- Quick Reference Scanner Guide M026-7435
- MP C300/C300SR/C400/C400SR
MP C300/C300SR/C400/C400SR
Aficio MP C300/C300SR/C400/C400SR
Operating In truction
Trouble hooting M026-7417
- Note for U er M026-7439
- About the Software on the CD-ROM M080-8547
- SOFTWARE LICENSE AGREEMENT D376-7905
- Note for U er D081-7678
- U er Information on Electrical & Electronic Equipment D127-6601
- Note for Admini trator : U ing thi Machine in a Network Environment
Compliant with IEEE Std. 2600.1
TM
-2009 M026-7442
- Operating In truction Note on Security Function M026-7443
- Manual for U er
Aficio MP C300/MP C300SR/MP C400/MP C400SR
MP C300/MP C300SR/MP C400/MP C400SR M026-6904
- Manual for Admini trator
Aficio MP C300/MP C300SR/MP C400/MP C400SR
MP C300/MP C300SR/MP C400/MP C400SR M026-6905
- Help 83NHBVENZ1.00 v118
FCU - Quick Reference Fax Guide D483-8505
- Fax Option Type C400
(Machine Code: D483)
In tallation Procedure
For Machine Code:
M022/ M024/ M026/ M028 Copier D483-8610A
1.4. Definition of Users
Thi ection define the u er related to the TOE. The e u er include tho e who routinely u e the TOE
(direct u er ) and tho e who do not (indirect u er ). The direct u er and indirect u er are de cribed a
follow :
1.4. .1. Direct User
The "u er" referred to in thi ST indicate a direct u er. Thi direct u er con i t of normal u er ,
admini trator , and RC Gate. The following table (Table 5) how the definition of the e direct u er .
Page 18 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
Table 5 Definition of Users
Definition of
Users
Explanation
Normal u er
A u er who i allowed to u e the TOE. A normal u er i provided with a login u er
name and can u e Copy Function, Fax Function, Scanner Function, Printer Function,
and Document Server Function.
Admini trator A u er who i allowed to manage the TOE. An admini trator perform management
operation , which include i uing login name to normal u er .
RC Gate
An IT device connected to network . RC Gate perform the @Remote Service Function
of the TOE via RC Gate communication interface. Copy Function, Fax Function,
Scanner Function, Printer Function, Document Server Function, and Management
Function cannot be u ed.
The admini trator mean the u er regi tered for TOE management. According to it role , the admini trator
can be cla ified a the upervi or and the MFP admini trator. Up to four MFP admini trator can be
regi tered and electively authori ed to perform u er management, machine management, network
management, and file management. Therefore, the different role of the management privilege can be
allocated to multiple MFP admini trator individually. The "MFP admini trator" in thi ST refer to the MFP
admini trator who ha all management privilege (Table 6).
Table 6 List of Administrative Roles
Definition of
Administrator Management Privileges Explanation
Supervi or Supervi or Authori ed to modify the login pa word of the
MFP admini trator.
U er management privilege
Authori ed to manage normal u er . Thi
privilege allow configuration of normal u er
etting .
Machine management
privilege
Authori ed to pecify MFP device behaviour
(network behaviour excluded). Thi privilege
allow configuration of device etting and
view of the audit log.
Network management
privilege
Authori ed to manage network and configure
LAN etting . Thi privilege allow
configuration of network etting .
MFP admini trator
File management privilege
Authori ed to manage tored document . Thi
privilege allow acce management of tored
document .
1.4. .2. Indirect User
Responsible manager of MFP
Page 19 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All right re erved.
The re pon ible manager of MFP i a per on who i re pon ible for election of the TOE admini trator in
the organi ation where the TOE i u ed.
Customer engineer
The cu tomer engineer i a per on who belong to the organi ation which maintain TOE operation. The
cu tomer engineer i in charge of in tallation, etup, and maintenance of the TOE.
1.4.4 Logical Boundary of TOE
The Ba ic Function and Security Function are de cribed a follow :
Figure 3 Logical Scope of the TOE
1.4.4.1. Basic Functions
The overview of the Ba ic Function i de cribed a follow :
Copy Function
The Copy Function i to can paper document and copy canned image data from the Operation Panel.
Magnification and other editorial job can be applied to the copy image. It can al o be tored on the HDD a
a Document Server document.

This manual suits for next models

4

Other Ricoh Printer manuals

Ricoh SP C360SNw User manual

Ricoh

Ricoh SP C360SNw User manual

Ricoh Aficio 180 User manual

Ricoh

Ricoh Aficio 180 User manual

Ricoh M181-21 Quick start guide

Ricoh

Ricoh M181-21 Quick start guide

Ricoh Infoprint 4100 User manual

Ricoh

Ricoh Infoprint 4100 User manual

Ricoh SP 213SFw User manual

Ricoh

Ricoh SP 213SFw User manual

Ricoh SP 150w Instruction manual

Ricoh

Ricoh SP 150w Instruction manual

Ricoh Pro C900s User manual

Ricoh

Ricoh Pro C900s User manual

Ricoh Ri 100 User manual

Ricoh

Ricoh Ri 100 User manual

Ricoh Aficio SP C231SF User manual

Ricoh

Ricoh Aficio SP C231SF User manual

Ricoh SP 8400DN User manual

Ricoh

Ricoh SP 8400DN User manual

Ricoh Pro L4130 User manual

Ricoh

Ricoh Pro L4130 User manual

Ricoh PRO C7200X User manual

Ricoh

Ricoh PRO C7200X User manual

Ricoh AP1400 User manual

Ricoh

Ricoh AP1400 User manual

Ricoh Ri 1000X User manual

Ricoh

Ricoh Ri 1000X User manual

Ricoh C220N - Aficio SP Color Laser Printer User manual

Ricoh

Ricoh C220N - Aficio SP Color Laser Printer User manual

Ricoh Pro 907 Operating instructions

Ricoh

Ricoh Pro 907 Operating instructions

Ricoh Pro L4160 User manual

Ricoh

Ricoh Pro L4160 User manual

Ricoh Aficio GX7000 User manual

Ricoh

Ricoh Aficio GX7000 User manual

Ricoh Pro 8300 Series Installation guide

Ricoh

Ricoh Pro 8300 Series Installation guide

Ricoh G186 User manual

Ricoh

Ricoh G186 User manual

Ricoh InfoPrint 1767 User manual

Ricoh

Ricoh InfoPrint 1767 User manual

Ricoh Aficio 2238C User manual

Ricoh

Ricoh Aficio 2238C User manual

Ricoh OP-P1 Manual

Ricoh

Ricoh OP-P1 Manual

Ricoh C231 User manual

Ricoh

Ricoh C231 User manual

Popular Printer manuals by other brands

DEC LP20 System manual

DEC

DEC LP20 System manual

Oce TCS300 user manual

Oce

Oce TCS300 user manual

Evolis Primacy user guide

Evolis

Evolis Primacy user guide

Star Micronics TSP400 Series Programmer's manual

Star Micronics

Star Micronics TSP400 Series Programmer's manual

NEC 4650NX - SuperScript Color Laser Printer quick start

NEC

NEC 4650NX - SuperScript Color Laser Printer quick start

Rtai LUCA-40KM user guide

Rtai

Rtai LUCA-40KM user guide

Zonerich AB-320M user manual

Zonerich

Zonerich AB-320M user manual

Lexmark C748 printing guide

Lexmark

Lexmark C748 printing guide

Roland VersaCamm SP-300V user manual

Roland

Roland VersaCamm SP-300V user manual

Datamax M-Class Mark II M-4206 Operator's manual

Datamax

Datamax M-Class Mark II M-4206 Operator's manual

Fargo DTC4000 Specifications

Fargo

Fargo DTC4000 Specifications

Saxxot CRU-158 Operation manual

Saxxot

Saxxot CRU-158 Operation manual

Metapace T-3II Windows driver manual

Metapace

Metapace T-3II Windows driver manual

Brady BBP 33 user manual

Brady

Brady BBP 33 user manual

Epson TM-U590 Series user manual

Epson

Epson TM-U590 Series user manual

DNP DP-DS80D Startup guide

DNP

DNP DP-DS80D Startup guide

Magicard Prima 3 XID570ie Driver manual

Magicard

Magicard Prima 3 XID570ie Driver manual

Citizen iDP-560RS owner's manual

Citizen

Citizen iDP-560RS owner's manual

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.