Ricoh MP 3350B Instrucciones de operaciones

Busca en linea o descarga Instrucciones de operaciones para Impresión y escaneo Ricoh MP 3350B. Ricoh MP 3350B Operating instructions [en] Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 83
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
Page 1 of 83
imagio MP 2550/3350 series, Aficio MP 2550/3350 series
Security Target
Authors : RICOH COMPANY, LTD., Yoshihiko KAMEKURA, Yasushi FUNAKI,
Fumi TAKITA
Date : 2010-02-08
Version : 1.05
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Vista de pagina 0
1 2 3 4 5 6 ... 82 83

Indice de contenidos

Pagina 1 - Security Target

Page 1 of 83 imagio MP 2550/3350 series, Aficio MP 2550/3350 series㩷Security TargetAuthors : RICOH COMPANY, LTD., Yoshihiko KAMEKURA, Yasushi FUNAKI,

Pagina 2 - Update History

Page 10 of 83 1.3 TOE Overview This chapter describes the TOE Type, TOE Usage and Major Security Features, and Environment for TOE Usage and Non-TOE C

Pagina 3 - Table of Contents

Page 11 of 83 Internal Networks, or USB-connected client PCs. Figure 1 shows and describes an assumed environment for the usage of the TOE. Figure 1:

Pagina 4 - Page 4 of 83

Page 12 of 83 SMB Server An SMB server is used to deliver the Document Data, which is stored in the TOE, to folders in an SMB server. SMTP Server An S

Pagina 5 - Page 5 of 83

Page 13 of 83 Figure 2: Hardware Configuration of TOEOperation Panel Unit (hereafter called Operation Panel) The Operation Panel is an interface devic

Pagina 6 - List of Tables

Page 14 of 83 information about the status of fax communication and controls the fax communication according to the instruction from the MFP Control S

Pagina 7 - Page 7 of 83

Page 15 of 83 When installing the TOE, the CE inserts an SD Card containing information to activate the Stored Data Protection Function into this SD C

Pagina 8 - 1 ST Introduction

Page 16 of 83 - Manuals for Administrators Security Reference 9025/9033/9025b /9033b MP 2550/3350/2550B/3350B LD425/LD433/LD425B /LD433B Aficio MP 25

Pagina 9

Page 17 of 83 Aficio MP 2550/2550B/3350/3350B MP 2550/MP 2550B/MP 3350/MP 3350B Operating Instructions About This Machine - MP 2550/MP 2550B/MP 3350/M

Pagina 10 - 1.3 TOE Overview

Page 18 of 83 1.4.3.2 Administrator An Administrator is a user who is registered on the TOE as an Administrator. There are one to four Administrators

Pagina 11

Page 19 of 83 Figure 3: Logical Scope of TOE1.4.4.1 Basic Functions Basic functions include Copy Function, Printer Function, Fax Function, Scanner Fun

Pagina 12 - 1.4 TOE Description

Page 2 of 83 Update History Version Date Authors Details 1.05 2010-02-08 Yoshihiko KAMEKURA, Yasushi FUNAKI, Fumi TAKITA Released documents Copyrigh

Pagina 13

Page 20 of 83 Figure 4: Operation Panel (for North America) In addition, General Users, Administrators, and a Supervisor can use the functions corresp

Pagina 14

Page 21 of 83 is operated from a client PC. Document Data stored in D-BOX for faxing can be printed and deleted using the "Document Server Functi

Pagina 15

Page 22 of 83 3. Delete the stored Document Data in D-BOX. 4. Download the stored Document Data in D-BOX. The Document Data stored using Scanner Fun

Pagina 16

Page 23 of 83 Document Data Access Control Function The Document Data Access Control Function is used to allow only the specific users to perform the

Pagina 17

Page 24 of 83 And the Network Administrator decides the communication protocol to use according to the environment where the TOE is placed and the int

Pagina 18

Page 25 of 83 Information. - General Users are allowed to change their own General User Information that is registered for Address Book, with the exc

Pagina 19

Page 26 of 83 2. Import from Networks/USB Convert Print Data that the TOE receives from networks or USB into a format that the TOE can handle, and ge

Pagina 20

Page 27 of 83 2 Conformance Claims This chapter describes the conformance claim. 2.1 CC Conformance Claim The CC conformance claim of this ST and TOE

Pagina 21

Page 28 of 83 3 Security Problem Definition This chapter describes the Threats, Organisational Security Policies and Assumptions.3.1 Threats The assum

Pagina 22

Page 29 of 83 P.SOFTWARE (Checking Integrity of Software) Measures are provided for verifying the integrity of MFP Control Software, which is inst

Pagina 23

Page 3 of 83 Table of Contents 1 ST Introduction ...

Pagina 24

Page 30 of 83 4 Security Objectives This chapter describes the Security Objectives for TOE, Security Objectives for Operational Environmentand Securit

Pagina 25

Page 31 of 83 O.LINE_PROTECT (Prevention of Intrusion from Telephone Line) The TOE shall prevent unauthorised access to the TOE from a telephone line

Pagina 26

Page 32 of 83 organisational security policies and assumptions. And the security objectives do not correspond to the assumptions (as the shaded region

Pagina 27 - 2 Conformance Claims

Page 33 of 83 A.SUPERVISOR (Supervisor's Assumption) A.SUPERVISOR presupposes that the Supervisor has adequate knowledge to operate the TOE

Pagina 28 - 3.1 Threats

Page 34 of 83 T.SALVAGE (Salvaging Memory) To counter this threat, the TOE converts the format of Document Data by O.MEM.PROTECT that makes it di

Pagina 29 - 3.3 Assumptions

Page 35 of 83 5 Extended Components Definition In this ST and TOE, there are no extended components, i.e., the new security requirements and security

Pagina 30 - 4 Security Objectives

Page 36 of 83 6 Security Requirements This chapter describes the Security Functional Requirements, Security Assurance Requirements, and Security Requi

Pagina 31

Page 37 of 83 Functional Requirements Actions which should be auditableAuditable events of TOE of the activity.㩷b) Basic: The object attribute(s), an

Pagina 32

Page 38 of 83 Functional Requirements Actions which should be auditableAuditable events of TOE FIA_SOS.1 a) Minimal: Rejection by the TSF of any test

Pagina 33

Page 39 of 83 Functional Requirements Actions which should be auditableAuditable events of TOE 3. Deleting authentication information of General User

Pagina 34

Page 4 of 83 3.3 Assumptions... 294 Secu

Pagina 35 - Conformance Claim"

Page 40 of 83 FAU_GEN.1.2 The TSF shall record within each audit record at least the following information:㩷a) Date and time of the event, type of ev

Pagina 36

Page 41 of 83 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to: No other components. Dependencies: [FC

Pagina 37

Page 42 of 83 6.1.3 Class FDP: User data protection FDP_ACC.1 Subset access controlHierarchical to: No other components. Dependencies: FDP_ACF.1 S

Pagina 38

Page 43 of 83 Table 10: Rules Governing AccessSubject Operations on objects Rules governing access Storing Document Data General Users can store th

Pagina 39

Page 44 of 83 Hierarchical to: No other components. Dependencies: FDP_IFF.1 Simple security attributes. FDP_IFC.1.1 The TSF shall enforce the [assi

Pagina 40

Page 45 of 83 FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following rules: [assignment: no rules, based on security at

Pagina 41 - Table 7] in

Page 46 of 83 Manual Lockout Release Regardless of the value set for the Lockout release time by the Machine Administrator, the Unlocking Administra

Pagina 42 - Table 10]

Page 47 of 83 Dependencies: FIA_UID.1 Timing of identification. FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated before

Pagina 43 - Table 11]

Page 48 of 83 associated with subjects acting on the behalf of users: [assignment: Administrators can add their own assigned Administrator Roles to ot

Pagina 44 - Table 13]

Page 49 of 83 Security attributes Operations User roles General User Information) Document Data 㩷FMT_MSA.3 Static attribute initialisationHierarchic

Pagina 45

Page 5 of 83 7.1.2.3 Password Feedback Area Protection...70 7.1.2.4 Password Registration

Pagina 46

Page 50 of 83 TSF data Operations User roles Change Applicable General Users of General User Information Supervisor Authentication Information Chang

Pagina 47 - Table 16]

Page 51 of 83 TSF data Operations User roles Query, newly create, delete, changeUser Administrator Applicable General User of S/MIME User Information

Pagina 48 - Table 17]

Page 52 of 83 Functional requirements Management requirements Management items Administrator. b) Management of the Unlocking Administrators and Locko

Pagina 49

Page 53 of 83 Functional requirements Management requirements Management items (Management of Administrator Information): management of own Administr

Pagina 50

Page 54 of 83 Functional requirements Management requirements Management items and second). FPT_TST.1 a) Management of the conditions under which TSF

Pagina 51 - Table 20]

Page 55 of 83 6.1.7 Class FTP: Trusted path/channels FTP_ITC.1 Inter-TSF trusted channel Hierarchical to: No other components.㩷Dependencies: No dep

Pagina 52

Page 56 of 83 6.2 Security Assurance Requirements The evaluation assurance level of this TOE is EAL3. The assurance components of the TOE are shown in

Pagina 53

Page 57 of 83 6.3 Security Requirements Rationale This chapter describes the rationale for the security requirements. As described below, if all secu

Pagina 54

Page 58 of 83 FIA_UID.2 X FIA_USB.1 X FMT_MSA.1 X FMT_MSA.3 X FMT_MTD.1 X FMT_SMF.1 X FMT_SMR.1 X FPT_STM.1 X FPT_TST.1 XXFTP_ITC.1 X FTP_TR

Pagina 55

Page 59 of 83 manage security intrusions. For this, FPT_STM.1 provides the trusted time stamp. O.I&A User Identification and Authentication The f

Pagina 56

Page 6 of 83 List of Figures Figure 1: Environment for Usage of TOE...

Pagina 57

Page 60 of 83 Document Data ACL of each Document Data, then FDP_ACC.1 and FDP_ACF.1 allow the General User process to perform operations on Document D

Pagina 58

Page 61 of 83 - The User Administrator and General Users to query S/MIME User Information and destination information for Deliver to Folder, - Super

Pagina 59

Page 62 of 83 FTP_TRP.1 also protects Document Data on networks from leakage and detects the tampering by using a trusted path, which is described lat

Pagina 60

Page 63 of 83 TOE Security Functional Requirements Dependenciesclaimed by CC Dependenciessatisfied in ST Dependencies not satisfied in ST FCS_COP.1] F

Pagina 61

Page 64 of 83 In this TOE, HDD encryption keys are stored in the area that cannot be accessed from outside Ic Hdd. In addition, after the Administrato

Pagina 62

Page 65 of 83 7 TOE Summary Specification This chapter describes the summary specification of the security functions of this TOE. 7.1 TOE Security Fu

Pagina 63

Page 66 of 83 SF.AUDIT SF.I&A SF.DOC_ACCSF.SEC_MNG SF.CE_OPE_LOCK SF.CIPHER SF.NET_PROT SF.FAX_LINE SF.GENUINE FDP_ACF.1 X FDP_IFC.1 X FDP_IFF.1

Pagina 64

Page 67 of 83 7.1.1.1 Audit logs generation The TOE generates the audit logs when auditable events occur, and appends them to the audit log files. Au

Pagina 65 - 7 TOE Summary Specification

Page 68 of 83 Communication with trusted IT product Communication IP address Communication with remote user-Deleting the entire audit log --: No appl

Pagina 66

Page 69 of 83 7.1.2 SF.I&A User Identification and Authentication Function The TOE identifies and authenticates users prior to the use of the

Pagina 67

Page 7 of 83 Table 33: List of Administrator for Machine Control Data ... 75Ta

Pagina 68

Page 70 of 83 meets the Number of Attempts before Lockout, the TOE Lockouts the user and the Lockout Flag for that user is set to "Active".

Pagina 69

Page 71 of 83 password meets those conditions, it registers the password. If the password does not meet those conditions, it does not register passwor

Pagina 70

Page 72 of 83 Document Data. Table 29 shows the value of the Document Data ACL when storing Document Data. Table 29: Initial Value for Document Data A

Pagina 71

Page 73 of 83 - Document File Owners - General Users with full control authorisation Delete the Document File Users - File Administrator - Document F

Pagina 72

Page 74 of 83 Operations on Administrator InformationAuthorised operators Authentication Information Add and query Administrator Roles The Administrat

Pagina 73

Page 75 of 83 Operations on General User Information Authorised operators Data Default ACL, S/MIME User Information) Query General User Information r

Pagina 74

Page 76 of 83 Machine control data items Range of values Operations Authorised setter OperationinterfacesLength (digits) modify Panel Password Comp

Pagina 75

Page 77 of 83 The HDD encryption keys are generated by the Machine Administrator. If the login user is the Machine Administrator, the TOE provides the

Pagina 76

Page 78 of 83 7.1.7.3 Sending by E-mail from TOE When sending Document Data by e-mail from the TOE to client PC, the TOE attaches the Document Data t

Pagina 77

Page 79 of 83 8 Appendix 8.1 Terminology Description Table 35 shows the definitions of specific terms for clearly understanding of this ST. Table 35:

Pagina 78

Page 8 of 83 1 ST Introduction This chapter describes the ST Reference, TOE Reference, TOE Overview and TOE Description. 1.1 ST Reference The followin

Pagina 79 - 8 Appendix

Page 80 of 83 Terms Definitions Back Up/Restore Address Book To back up the Address Book to SD cards or to restore the backup copy of the Address Book

Pagina 80

Page 81 of 83 Terms Definitions Lockout A function that prohibits the access for the specific user IDs to the TOE. Lockout Flag A data that is assig

Pagina 81

Page 82 of 83 Terms Definitions Machine Administration One of the Administrator Roles that manages machines and plays the role of performing the audi

Pagina 82 - 8.2 Reference

Page 83 of 83 - CC Version 3.1 Revision 2 Evaluation Criteria: "English version" Common Criteria for Information Technology Security Evalua

Pagina 83

Page 9 of 83 Table 1: List of TOE Series Name Series Details Ricoh imagio MP 2550/3350 series Ricoh imagio MP 2550SP Ricoh imagio MP 2550SPF Ricoh i

Comentarios a estos manuales

Sin comentarios