Home > Kyocera > Printer > Kyocera FS 2020D User Manual

Kyocera FS 2020D User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Kyocera FS 2020D User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 73 Kyocera manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							COMMAND CENTER Pages
    Operation Guide 47
    user’s settings on the basic page, and the users document box and shared document 
    box pages. 
    Advanced > Management > Notificat ion/Maintenance > Maintenance 
    Notification
    This feature defines the recipient of maintenance information reports.
    Advanced > Management > Main tenance Notification > Job Log 
    Notification
    This feature defines the Job Log  Notification information reports.
    Item
    Description
    Equipment ID This is the name by which 
    the machine will be identified.
    Recipient 
    Address The E-mail address of the recipient. If there is more than one 
    recipient then the addresses should be separated by a semi-
    colon ;. 
    Subject You can include model name, serial number, MAC address 
    and equipment ID in the subject line as follows: Enter one of 
    the following conversion strings starting with %. The string 
    will be converted into a pre-defined string to display the 
    above information.
    - %printer = Model 
    - %serial = Serial Number 
    - %etheraddr = MAC Address 
    - %equipid = Equipment ID 
    E-mail Interval Sets the time or interval for sending the status information. 
    Events will be reported at the specified interval.
    •
    None : No report is sent.
    • Monthly: Sends on the specified day of specified month.
    • Weekly : Sends on the specified day of every week.
    • Daily : Sends at the specified time of every day.
    • Hourly : Sends at the specified interval every hour.
    If a specified day does not exist in the month, such as the 
    31st, the last day of the month is used as the specified day.
    Run once now You can test this by clicking the 
    Send button to immediately 
    send a report.
    Item Description
    Recipient 
    Address The E-mail address of the recipient. If there is more than one 
    recipient then the addresses should be separated by a semi-
    colon ;. 
    Subject  You can include model name, serial number, and MAC 
    address in the subject line as follows: Enter one of the 
    following conversion strings star
    ting with %. The string will be 
    converted into a pre-defined string to display the above 
    information. - %printer = Model
    - %serial = Serial Number
    - %etheraddr = MAC Address 
    Downloaded From ManualsPrinter.com Manuals 
    						
    							COMMAND CENTER Pages
    48KYOCERA COMMAND CENTER
    Advanced > Security > Secure Protocols
    You can encrypt communication between a PC and this machine using SSL encryption. 
    After you have changed this setting, you must restart this machine. For the restarting 
    procedure, refer to Basic > Defaults > Reset  on page 9.
    Auto Sending
    Determines whether the job log report is sent or not. Set this 
    to 
    On  to send the report.
    Max Job Log Set the number of job logs for sending, from 1 to 1500.
    Run once now You can test this by clicking the 
    Send button to immediately 
    send a report.
    Item
    Description
    Item Description
    SSL Specifies whether or not to use the SSL protocol.
    Serverside 
    Settings Effective 
    Encryption Selects the encryption algorithm(s) to be used.
    HTTP 
    Security Specifies the security level.
    Secure 
    Only 
    (HTTPS) Encrypts all communication. A
    ccess is possible only with a 
    URL that begins with https://. Access attempts using an 
    ordinary http:// URL are automat ically redirected to the URL 
    where http:// is replaced with https://.
    Not 
    Secure 
    (HTTPS & 
    HTTP)Enables access for both encrypted and unencrypted 
    communication. Access is possible with https:// and http:// 
    URLs. The former URL establishes encrypted communication 
    and the latter establishes normal communication.
    IPP SecuritySpecifies the security level.
    Secure 
    Only (IPP 
    over SSL)Encrypts all communications.
    Not 
    Secure 
    (IPP over 
    SSL&IPP)Enables access for both encrypted and unencrypted 
    communications.
    Clientside 
    Settings Effective 
    Encryption Allow you to specify the encr
    yption algorithm for data 
    communication. You can use more than one algorithms at a 
    time.
    Certificate 
    Verification When set 
    On, verify the expiration of the server certificate at 
    communication. If found expi red, communication will fail. 
    When set Off , the expiration will not be verified.
    Downloaded From ManualsPrinter.com Manuals 
    						
    							COMMAND CENTER Pages
    Operation Guide 49
    NOTE: When the SSL is set to On and HTTP Security is set to Secure (HTTPS), the 
    document boxes cannot be accessed the TWAIN driver.
    Advanced > Security > IEEE802.1x
    The IEEE802.1x security protocol allows the user to login to the secured networks based 
    on the client certificates.
    Advanced > Security > IPSec > General
    This page allows you to set access restrictions for IPSec protocol-based communication.
    ItemDescription
    IEEE802.1x Specifies whether or not to 
    use the IEEE802.1x protocol.
    Authentication 
    Ty p e Selects either EAP-TLS or 
    PEAP (EAP-MS-CHAPv2) for the 
    authentication type. 
    Login User 
    Name Enter the name of the user who accesses the printing 
    system. The IEEE8
    02.1x client certificate of this user must 
    be valid.
    Login Password You can set a PEAP-based password. (This setting is valid 
    when PEAP (EAP-MS-CHAPv2) 
    authentication type is 
    selected.)
    Common NameSpecifies the common name of the server certificate if the 
    server is required to be authenticated. (This setting is valid 
    when PEAP (EAP-MS-CHAPv2)  authentication type is 
    selected.) 
    Match Rule of 
    Common NameWhen the server certificate is verified, the common name 
    specified under 
    Common Name is compared with the 
    common name on the server certificate. This item allows you 
    to specify whether the common names are considered to be 
    matched if they exactly or partially match. (This setting is valid 
    when PEAP (EAP-MS-CHAPv2)  authentication type is 
    selected.) 
    Certificate 
    StatusDisplays whether the certificate is valid or not.
    Item Description
    IPSec Specifies whether or not to enable the IPSec protocol. Select 
    On
     to enable the IPSec protocol. Select  Off to disable it.
    Restriction
    Specifies the default policy for non-IPSec packets. 
    Select 
    Allow to allow communication with all hosts and 
    networks including those not permitted by the rules described 
    under  Advanced > Security > IPSec > Rule1 (to Rule3)  on 
    page 50. Select 
    Deny to allow communication only with the 
    hosts and networks permitted by the rules.
    Downloaded From ManualsPrinter.com Manuals 
    						
    							COMMAND CENTER Pages
    50KYOCERA COMMAND CENTER
    Advanced > Security > IPSec > Rule1 (to Rule3)
    These pages allow you to select or edit rules to use for IPSec protocol-based communication.
    Authentication 
    Ty p eSpecifies the authentication type
     used for IKE phase1. To set 
    a character string as the shared key and use it for 
    communication, select  Pre-shared and enter the string of 
    the pre-shared key in the text box. To use a CA-issued 
    device certificate or root certificate, select  Certificates.
    When  Expiration Verification  is enabled, the expiration of 
    the server certificate is veri fied at communicating. If the 
    server certificate is found  expired, communication will fail. 
    When it is disabled, the ex piration will not be verified. 
    When you select  Certificates, the contents of the CA 
    certificate and root 1 to 3 certif icates are displayed if they are 
    enabled.  When you click the  CA or Root button, you can 
    view, import or delete CA-issued or root certificates.
    Rule1 (to Rule3)
    Shows whether the set rule is enabled or disabled. To enable 
    or disable the rule, refer to  Advanced > Security > IPSec > 
    Rule1 (to Rule3)  on page 50.
    Item Description
    ItemDescription
    Rule Specifies whether or not to enable the selected IPSec policy 
    rule. Select 
    On to enable the rule. Select  Off to disable it.
    Key Exchange 
    (IKE phase1)
    When using IKE phase1, a secure connection with the other 
    end is established by generating ISAKMP SAs. Configure the 
    following items so that they m eet the requirement of the other 
    end.
    Policy Main Mode
     protects identifications but requires more 
    messages to be exchanged with the other end.  Aggressive 
    Mode requires fewer messages to be exchanged with the 
    other end than  Main Mode but restricts identification 
    protection and narrows the  extent of the parameter 
    negotiations. When  Aggressive Mode is selected and Pre-
    shared  is selected for Authentication Type , only host 
    addresses can be specified for IP addresses of the rule.
    Hash
    Selects the hash algorithm.
    EncryptionSelects the encryption algorithm.
    Diffie-
    Hellman 
    GroupThe Diffie-Hellman key-sharing algorithm allows two hosts on 
    an unsecured network to share a private key securely. Select 
    the Diffie-Hellman group to use for key sharing.
    Lifetime 
    (Time)Specifies the lifetime of an ISAKMP SA in seconds.
    Data Protection 
    (IKE phase2)In IKE phase2, IPSec SAs such as AH or ESP are established 
    by using SAs established in IKE phase1. Configure the 
    following items so that they meet the requirement of the other 
    end.
    Downloaded From ManualsPrinter.com Manuals 
    						
    							COMMAND CENTER Pages
    Operation Guide 51
    ProtocolSelect ESP or AH for the protocol. ESP protects the privacy 
    and integrity of the packet contents. Select the hash algorithm 
    and encryption algorithm below. 
    AH protects the integrity of 
    the packet contents using encryption checksum. Select the 
    hash algorithm below.
    HashSelects the hash algorithm.
    EncryptionSelects the encryption algorithm. (When ESP is selected 
    under 
    Protocol.)
    PFSWhen PFS is set to On (enabled), even if a key is decrypted, 
    the decrypted key cannot be used to decrypt the other keys 
    generated after the decryption. This improves the safety, but 
    imposes a heavy burden because of more key-generation 
    processes.
    Diffie-
    Hellman 
    GroupThe Diffie-Hellman key-sharing algorithm allows two hosts on 
    an unsecured network to share a private key securely. Select 
    the Diffie-Hellman group  to use for key sharing.
    Lifetime 
    Measure-
    mentSpecifies whether the lifetime is measured by time or by time 
    and data size.
    Lifetime 
    (Time)/
    Lifetime 
    (Data 
    Size)Specifies the lifetime of an IPSec SA. Lifetime Measurement 
    allows you to select whether to use time or data size to specify 
    the lifetime. When you select 
    Time & Data Size, an SA is 
    disabled and updated when either the time or data size of the 
    SA exceeds the specified value.
    IP VersionSpecifies the IP version of the other end. Select IPv4 or IPv6.
    IP 
    Address 
    (IPv4)Specifies the IPv4 addresses of the hosts or network with 
    which the print system is connecting via IPSec. When you are 
    restricting the scope of IPSec,  be sure to specify the IP 
    addresses. If this field is blank, all IPv4 addresses will be 
    allowed to connect the print system.
    IP 
    Address 
    (IPv6)Specifies the IPv6 addresses of the hosts or network with 
    which the print system is connecting via IPSec. When you are 
    restricting the scope of IPSec,  be sure to specify the IP 
    addresses. If this field is blank, all IPv6 addresses will be 
    allowed to connect the print system.
    Subnet 
    MaskWhen IPv4 is selected for IP Version, this specifies the 
    subnet mask of the hosts or network with which the print 
    system is connecting via IPSec. If this field is blank, the 
    specified addresses are considered to be host addresses.
    Prefix 
    LengthWhen IPv6 is selected for IP Version, this specifies the prefix 
    length of the hosts or network with which the print system is 
    connecting via IPSec. If this  field is blank, the specified 
    addresses are considered to be host addresses.
    Item Description
    Downloaded From ManualsPrinter.com Manuals 
    						
    							Troubleshooting
    52KYOCERA COMMAND CENTER
    4 Troubleshooting
    Consult the table below to find basic solutions for problems you may encounter with 
    COMMAND CENTER.
    Symptom Check Items Corrective Action Reference
    I can’t access 
    COMMAND 
    CENTER. Is the power turned on 
    to this machine?
    Turn the power on to 
    this machine, wait until 
    it is a ready state, and 
    try to access 
    COMMAND CENTER. Operation 
    Guide
    Is the network cable 
    properly connected? Connect the network 
    cable properly. Operation 
    Guide
    Are the network 
    settings that are made 
    in this machine 
    correct? Perform the network 
    settings from the 
    operation panel. 
    Contact your network 
    administrator for the 
    appropriate settings. -
    Is the IP address for 
    this machine entered 
    correctly? Enter the correct IP 
    address. Check this 
    machine IP address 
    with your network 
    administrator. -
    Are the LAN settings 
    that are made in Web 
    browser correct? Check the settings 
    made in Web browser. 
    Refer to the Help 
    function in your 
    browser. -
    Has the administrator 
    set up an IP Filter 
    function? Access COMMAND 
    CENTER from an 
    approved IP address. page 36
    Is HTTP Security on 
    the  Advanced > 
    Security > Secure 
    Protocol  page set to 
    Secure (HTTPS) ?When HTTP Security is 
    set to 
    Secure (HTTPS) , 
    specify a URL that 
    begins with https://. You 
    cannot access 
    COMMAND CENTER 
    with an http:// URL. page 48
    Does the version of 
    your browser 
    application support 
    operation using 
    COMMAND 
    CENTER? Use a browser 
    application that 
    supports COMMAND 
    CENTER.
    page 1
    Downloaded From ManualsPrinter.com Manuals 
    						
    							Troubleshooting
    Operation Guide 53
    Characters do 
    not display 
    properly in 
    COMMAND 
    CENTER.Does the version of 
    your browser 
    application support 
    operation using 
    COMMAND 
    CENTER? Use a browser 
    application that 
    supports COMMAND 
    CENTER.
    page 1
    Is the same language 
    as that displayed on 
    the operation panel 
    selected? Select the same 
    language as that 
    displayed on the 
    operation panel. page 9
    I can’t access 
    the other 
    pages. Has the administrator 
    set a password?
    Enter the password.
    page 12
    I can’t perform 
    settings. Is the printer or 
    scanner currently in 
    operation? Wait until the operation 
    has been completed.
    -
    The settings I 
    made are not 
    registered. Did you click the 
    Submit
     button after 
    making the settings? Click the 
    Submit button 
    and move to another 
    page or close 
    COMMAND CENTER 
    window. -
    Did you click the 
    Restart  button after 
    making the settings?  Restart this machine. 
    All settings will be 
    registered. page 9
    Are you using the 
    System menu on this 
    machines panel while 
    COMMAND CENTER 
    is being operated? Operate COMMAND 
    CENTER after you 
    have finished with the 
    System menu.
    -
    The 
    administrator 
    has forgotten 
    the Admin 
    password. -
    Contact your dealer or 
    service center. -
    Error or 
    Warning is 
    displayed 
    under the 
    STATUS 
    indicator. Is there an error 
    message shown in the 
    display?
    Perform the 
    troubleshooting 
    procedure the 
    messages suggests 
    referring to the 
    Operation Guide
    .Operation 
    Guide
    Symptom Check Items
    Corrective Action Reference
    Downloaded From ManualsPrinter.com Manuals 
    						
    							Downloaded From ManualsPrinter.com Manuals 
    						
    							    First Edition 2009.9
    Downloaded From ManualsPrinter.com Manuals 
    						
    All Kyocera manuals Comments (14)

    Related Manuals for Kyocera FS 2020D User Manual