Kyocera FS 2020D User Manual
Have a look at the manual Kyocera FS 2020D User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 73 Kyocera manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
COMMAND CENTER Pages Operation Guide 47 user’s settings on the basic page, and the users document box and shared document box pages. Advanced > Management > Notificat ion/Maintenance > Maintenance Notification This feature defines the recipient of maintenance information reports. Advanced > Management > Main tenance Notification > Job Log Notification This feature defines the Job Log Notification information reports. Item Description Equipment ID This is the name by which the machine will be identified. Recipient Address The E-mail address of the recipient. If there is more than one recipient then the addresses should be separated by a semi- colon ;. Subject You can include model name, serial number, MAC address and equipment ID in the subject line as follows: Enter one of the following conversion strings starting with %. The string will be converted into a pre-defined string to display the above information. - %printer = Model - %serial = Serial Number - %etheraddr = MAC Address - %equipid = Equipment ID E-mail Interval Sets the time or interval for sending the status information. Events will be reported at the specified interval. • None : No report is sent. • Monthly: Sends on the specified day of specified month. • Weekly : Sends on the specified day of every week. • Daily : Sends at the specified time of every day. • Hourly : Sends at the specified interval every hour. If a specified day does not exist in the month, such as the 31st, the last day of the month is used as the specified day. Run once now You can test this by clicking the Send button to immediately send a report. Item Description Recipient Address The E-mail address of the recipient. If there is more than one recipient then the addresses should be separated by a semi- colon ;. Subject You can include model name, serial number, and MAC address in the subject line as follows: Enter one of the following conversion strings star ting with %. The string will be converted into a pre-defined string to display the above information. - %printer = Model - %serial = Serial Number - %etheraddr = MAC Address Downloaded From ManualsPrinter.com Manuals
COMMAND CENTER Pages 48KYOCERA COMMAND CENTER Advanced > Security > Secure Protocols You can encrypt communication between a PC and this machine using SSL encryption. After you have changed this setting, you must restart this machine. For the restarting procedure, refer to Basic > Defaults > Reset on page 9. Auto Sending Determines whether the job log report is sent or not. Set this to On to send the report. Max Job Log Set the number of job logs for sending, from 1 to 1500. Run once now You can test this by clicking the Send button to immediately send a report. Item Description Item Description SSL Specifies whether or not to use the SSL protocol. Serverside Settings Effective Encryption Selects the encryption algorithm(s) to be used. HTTP Security Specifies the security level. Secure Only (HTTPS) Encrypts all communication. A ccess is possible only with a URL that begins with https://. Access attempts using an ordinary http:// URL are automat ically redirected to the URL where http:// is replaced with https://. Not Secure (HTTPS & HTTP)Enables access for both encrypted and unencrypted communication. Access is possible with https:// and http:// URLs. The former URL establishes encrypted communication and the latter establishes normal communication. IPP SecuritySpecifies the security level. Secure Only (IPP over SSL)Encrypts all communications. Not Secure (IPP over SSL&IPP)Enables access for both encrypted and unencrypted communications. Clientside Settings Effective Encryption Allow you to specify the encr yption algorithm for data communication. You can use more than one algorithms at a time. Certificate Verification When set On, verify the expiration of the server certificate at communication. If found expi red, communication will fail. When set Off , the expiration will not be verified. Downloaded From ManualsPrinter.com Manuals
COMMAND CENTER Pages Operation Guide 49 NOTE: When the SSL is set to On and HTTP Security is set to Secure (HTTPS), the document boxes cannot be accessed the TWAIN driver. Advanced > Security > IEEE802.1x The IEEE802.1x security protocol allows the user to login to the secured networks based on the client certificates. Advanced > Security > IPSec > General This page allows you to set access restrictions for IPSec protocol-based communication. ItemDescription IEEE802.1x Specifies whether or not to use the IEEE802.1x protocol. Authentication Ty p e Selects either EAP-TLS or PEAP (EAP-MS-CHAPv2) for the authentication type. Login User Name Enter the name of the user who accesses the printing system. The IEEE8 02.1x client certificate of this user must be valid. Login Password You can set a PEAP-based password. (This setting is valid when PEAP (EAP-MS-CHAPv2) authentication type is selected.) Common NameSpecifies the common name of the server certificate if the server is required to be authenticated. (This setting is valid when PEAP (EAP-MS-CHAPv2) authentication type is selected.) Match Rule of Common NameWhen the server certificate is verified, the common name specified under Common Name is compared with the common name on the server certificate. This item allows you to specify whether the common names are considered to be matched if they exactly or partially match. (This setting is valid when PEAP (EAP-MS-CHAPv2) authentication type is selected.) Certificate StatusDisplays whether the certificate is valid or not. Item Description IPSec Specifies whether or not to enable the IPSec protocol. Select On to enable the IPSec protocol. Select Off to disable it. Restriction Specifies the default policy for non-IPSec packets. Select Allow to allow communication with all hosts and networks including those not permitted by the rules described under Advanced > Security > IPSec > Rule1 (to Rule3) on page 50. Select Deny to allow communication only with the hosts and networks permitted by the rules. Downloaded From ManualsPrinter.com Manuals
COMMAND CENTER Pages 50KYOCERA COMMAND CENTER Advanced > Security > IPSec > Rule1 (to Rule3) These pages allow you to select or edit rules to use for IPSec protocol-based communication. Authentication Ty p eSpecifies the authentication type used for IKE phase1. To set a character string as the shared key and use it for communication, select Pre-shared and enter the string of the pre-shared key in the text box. To use a CA-issued device certificate or root certificate, select Certificates. When Expiration Verification is enabled, the expiration of the server certificate is veri fied at communicating. If the server certificate is found expired, communication will fail. When it is disabled, the ex piration will not be verified. When you select Certificates, the contents of the CA certificate and root 1 to 3 certif icates are displayed if they are enabled. When you click the CA or Root button, you can view, import or delete CA-issued or root certificates. Rule1 (to Rule3) Shows whether the set rule is enabled or disabled. To enable or disable the rule, refer to Advanced > Security > IPSec > Rule1 (to Rule3) on page 50. Item Description ItemDescription Rule Specifies whether or not to enable the selected IPSec policy rule. Select On to enable the rule. Select Off to disable it. Key Exchange (IKE phase1) When using IKE phase1, a secure connection with the other end is established by generating ISAKMP SAs. Configure the following items so that they m eet the requirement of the other end. Policy Main Mode protects identifications but requires more messages to be exchanged with the other end. Aggressive Mode requires fewer messages to be exchanged with the other end than Main Mode but restricts identification protection and narrows the extent of the parameter negotiations. When Aggressive Mode is selected and Pre- shared is selected for Authentication Type , only host addresses can be specified for IP addresses of the rule. Hash Selects the hash algorithm. EncryptionSelects the encryption algorithm. Diffie- Hellman GroupThe Diffie-Hellman key-sharing algorithm allows two hosts on an unsecured network to share a private key securely. Select the Diffie-Hellman group to use for key sharing. Lifetime (Time)Specifies the lifetime of an ISAKMP SA in seconds. Data Protection (IKE phase2)In IKE phase2, IPSec SAs such as AH or ESP are established by using SAs established in IKE phase1. Configure the following items so that they meet the requirement of the other end. Downloaded From ManualsPrinter.com Manuals
COMMAND CENTER Pages Operation Guide 51 ProtocolSelect ESP or AH for the protocol. ESP protects the privacy and integrity of the packet contents. Select the hash algorithm and encryption algorithm below. AH protects the integrity of the packet contents using encryption checksum. Select the hash algorithm below. HashSelects the hash algorithm. EncryptionSelects the encryption algorithm. (When ESP is selected under Protocol.) PFSWhen PFS is set to On (enabled), even if a key is decrypted, the decrypted key cannot be used to decrypt the other keys generated after the decryption. This improves the safety, but imposes a heavy burden because of more key-generation processes. Diffie- Hellman GroupThe Diffie-Hellman key-sharing algorithm allows two hosts on an unsecured network to share a private key securely. Select the Diffie-Hellman group to use for key sharing. Lifetime Measure- mentSpecifies whether the lifetime is measured by time or by time and data size. Lifetime (Time)/ Lifetime (Data Size)Specifies the lifetime of an IPSec SA. Lifetime Measurement allows you to select whether to use time or data size to specify the lifetime. When you select Time & Data Size, an SA is disabled and updated when either the time or data size of the SA exceeds the specified value. IP VersionSpecifies the IP version of the other end. Select IPv4 or IPv6. IP Address (IPv4)Specifies the IPv4 addresses of the hosts or network with which the print system is connecting via IPSec. When you are restricting the scope of IPSec, be sure to specify the IP addresses. If this field is blank, all IPv4 addresses will be allowed to connect the print system. IP Address (IPv6)Specifies the IPv6 addresses of the hosts or network with which the print system is connecting via IPSec. When you are restricting the scope of IPSec, be sure to specify the IP addresses. If this field is blank, all IPv6 addresses will be allowed to connect the print system. Subnet MaskWhen IPv4 is selected for IP Version, this specifies the subnet mask of the hosts or network with which the print system is connecting via IPSec. If this field is blank, the specified addresses are considered to be host addresses. Prefix LengthWhen IPv6 is selected for IP Version, this specifies the prefix length of the hosts or network with which the print system is connecting via IPSec. If this field is blank, the specified addresses are considered to be host addresses. Item Description Downloaded From ManualsPrinter.com Manuals
Troubleshooting 52KYOCERA COMMAND CENTER 4 Troubleshooting Consult the table below to find basic solutions for problems you may encounter with COMMAND CENTER. Symptom Check Items Corrective Action Reference I can’t access COMMAND CENTER. Is the power turned on to this machine? Turn the power on to this machine, wait until it is a ready state, and try to access COMMAND CENTER. Operation Guide Is the network cable properly connected? Connect the network cable properly. Operation Guide Are the network settings that are made in this machine correct? Perform the network settings from the operation panel. Contact your network administrator for the appropriate settings. - Is the IP address for this machine entered correctly? Enter the correct IP address. Check this machine IP address with your network administrator. - Are the LAN settings that are made in Web browser correct? Check the settings made in Web browser. Refer to the Help function in your browser. - Has the administrator set up an IP Filter function? Access COMMAND CENTER from an approved IP address. page 36 Is HTTP Security on the Advanced > Security > Secure Protocol page set to Secure (HTTPS) ?When HTTP Security is set to Secure (HTTPS) , specify a URL that begins with https://. You cannot access COMMAND CENTER with an http:// URL. page 48 Does the version of your browser application support operation using COMMAND CENTER? Use a browser application that supports COMMAND CENTER. page 1 Downloaded From ManualsPrinter.com Manuals
Troubleshooting Operation Guide 53 Characters do not display properly in COMMAND CENTER.Does the version of your browser application support operation using COMMAND CENTER? Use a browser application that supports COMMAND CENTER. page 1 Is the same language as that displayed on the operation panel selected? Select the same language as that displayed on the operation panel. page 9 I can’t access the other pages. Has the administrator set a password? Enter the password. page 12 I can’t perform settings. Is the printer or scanner currently in operation? Wait until the operation has been completed. - The settings I made are not registered. Did you click the Submit button after making the settings? Click the Submit button and move to another page or close COMMAND CENTER window. - Did you click the Restart button after making the settings? Restart this machine. All settings will be registered. page 9 Are you using the System menu on this machines panel while COMMAND CENTER is being operated? Operate COMMAND CENTER after you have finished with the System menu. - The administrator has forgotten the Admin password. - Contact your dealer or service center. - Error or Warning is displayed under the STATUS indicator. Is there an error message shown in the display? Perform the troubleshooting procedure the messages suggests referring to the Operation Guide .Operation Guide Symptom Check Items Corrective Action Reference Downloaded From ManualsPrinter.com Manuals
First Edition 2009.9 Downloaded From ManualsPrinter.com Manuals