Comprehensive Enterprise Fleet Management

Size: px
Start display at page:

Download "Comprehensive Enterprise Fleet Management"

Transcription

1 Comprehensive Enterprise Fleet Management An Overview of Remote Communication Gate S Pro (RCG-S Pro) Enterprise Pro with Connector Option Detailed information on capabilities and functionality of RCG-S Pro with Connector Option Produced by the Global Technology Support Section Ricoh Company, Ltd. May 2010 [A Enterprise Pro On-Site white paper is also available.]

2 Table of Contents 1.0 Overview 1.1 Today s Customer Environment and IT 1.3 Advantages of RCG-S Pro with Connector Option for Network-Connected Printing Devices 1.4 RCG-S Pro OnSite Connector Option Specifications 2.0 System Structure Of RCG-S Pro Connector Option 3.0 Communication Methods and Information Security 3.1 HTTPS Communication Between RCG-S Pro and Connected Devices 3.2 SNMP Communication Between RCG-S Pro and Connected Devices 3.3 Communication Between RCG-S Pro and the Center Communication Server 3.4 Device Connection Check 3.5 Updating Firmware 3.6 AutoDiscovery 4.0 Appendix 4.1 Device Information Protocols and Open Ports 4.3 Cryptographic Algorithms of HTTPS 4.4 Network Traffic and Communication Timing 5.0 Frequently Asked Questions The content of this document, and the appearance, features and specifications of Ricoh products and services are subject to change from time to time without notice. While care has been taken to ensure the accuracy of this information, Ricoh makes no representation or warranties about the accuracy, completeness or adequacy of the information contained herein, and shall not be liable for any errors or omissions in these materials. Your actual results will vary depending upon your use of the products and services, and the conditions and factors affecting performance. THERE ARE NO GUARANTEES THAT YOU WILL ACHIEVE RESULTS SIMILAR TO OURS. The only warranties for Ricoh products and services are as set forth in the express warranty statements accompanying them. Nothing herein shall be construed as constituting an additional warranty. Ricoh does not provide legal, tax, accounting or auditing advice, or represent or warrant that our products or services will GUARANTEE OR ENSURE COMPLIANCE WITH ANY LAW, REGULATION OR SIMILAR REQUIREMENT. Customer is responsible for making the final selection of products, solutions and technical architectures, and for ensuring its own compliance with various laws such as the Gramm-Leach-Bliley Act, the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act (HIPAA).

3 Section 1.0 Overview 1.1 Today s Customer Environment Although potential for growth has never been larger, this is a challenging time for companies everywhere. Worldwide opportunities mean global competition, and businesses that want to stay ahead face complex tasks. Not the least of which is how to cut costs while staying abreast with the relentless pace of changing technology. Business is under ever-growing pressure to improve the quality and decrease the turnaround time of their products and services. Much of the success or failure of a business depends directly on the quality of the equipment and services at its disposal. In a large business environment especially, administration of the print fleet is becoming more and more important. Weak maintenance and lack of intelligent system management can negate the advantages of quality equipment and staff. Add to this the fact that the IT manager s workload is increasingly complex, as administration duties and IT development expand. Pressure to get the maximum from networked print devices has never been greater. Control over devices is an elemental factor of network efficiency, since this is key to TCO (Total Cost of Ownership the sum of three costs: start up, control/administration, and operation). Also, as competition intensifies, business system costs have grown in significance and are now a major management priority. The challenge for IT is to reduce time lost on equipment maintenance, configuring, servicing, supplying and monitoring. It is to relieve dependencies on users for reports on device population, utilization trending status or malfunctions. Reports that unfailingly come after the problem has occurred and understandably often lack the technical detail necessary for a prompt assessment and solution. To counter precisely these obstacles, an ideal remote servicing system would be capable of the following: Detecting problems before users will become aware of them to tackle firmware and reboot remotely, with minimal user intervention. Identifying and pre-diagnosing potential breakdowns or shortages. Technicians could then be dispatched, fully equipped with the necessary parts. Monitoring device population, trending performance and making whatever modifications necessary to optimize productivity and efficiency. Watching over toner consumption, and enabling re-order before toner runs out. Providing TCO-relevant data to the administrator. Establishing an automated, usage-based meter submission and billing system to streamline running costs. 1

4 Section 1.0 and is designed to be capable of exactly these functions. Its purpose is to provide five related enhancements to your fleet of networked printing devices: 1. IT equipment maintenance capabilities, including status, critical service event notification, toner alert notification and supply ordering and delivering. 2. IT equipment productivity improvement, by maximizing device utilization and aligning the right devices with applications. 3. IT cost reduction, including initial outlay for equipment, maintenance and operation costs such as monitoring device monthly volumes. 4. IT usability to the networked print population at the fleet or device level. 5. Green Reporting to determine whether the networked print fleet meets environmental and cost-saving expectations. The solution is the Ricoh Remote Communication Gate S Pro (also known as RCG-S Pro Enterprise Pro) with Connector Option. To limit the downtime of each kind of networked device (multifunction products, laser printers), it is of growing necessity that IT deploys systems and tools to help manage these devices. RCG-S Pro with Connector Option provides for this, allowing users to benefit from improved business productivity, automation of select maintenance processes and the reduced costs associated with these activities. Utilizing RCG-S Pro with Connector Option, IT administrators can map, monitor and configure devices, as well as automate service alerts, toner alerts, meter collection and submission and perform remote firmware upgrades. This option also provides secure, Web-based access to fleet reports. Green Reports provide a view to select environmental aspects of print activity such as paper and energy usage for Ricoh managed devices. 2

5 Section Advantages of RCG-S Pro with Connector Option for Network- Connected Printing Devices There are four broad features of RCG-S Pro with Connector Option that make it particularly advantageous for users: 1. Reduced Device Downtime via automated notification of critical service events to the service provider through an Internet connection. Users can print or copy with little worry about incomplete jobs or being delayed due to maintenance and repairs. And the organization is freed from time-consuming manual device monitoring and expenses associated with downtime. The solution can also perform remote firmware upgrades or, if necessary, alert dispatch personnel. 2. Automated Meter Collection and Submission so that users no longer have to manually collect and report meter figures. This means production efficiency can be measured directly, meter figures confirmed and TCO-relevant data obtained and acted upon. In the past, the traditional meter collection procedure involved: 1. The service provider requests the user to check the meter(s). 2. The user checks the device s meter. 3. The user reports the meter figure by postcard, telephone or online. 4. The service provider sends an invoice for actual usage. 3

6 Section 1.0 With RCG-S Pro and Connector Option, workload is dramatically reduced and efficiency is greatly increased. 1. RCG-S Pro collects and submits the meter information to the service provider automatically. Human touch is eliminated. 2. The service provider sends an invoice for actual usage. 3. Receive Alerts when Toner Nears End automatically when toner levels are at near end or depleted. Formerly, the process was: 1. Device runs out of toner. User calls the service provider. 2. The service provider requests toner delivery from the delivery center. 3. The delivery center delivers the toner to the user. With RCG-S Pro, Connector Option and a qualified service provider, the user no longer has to worry about devices running out of toner. The device can alert the service provider when 10% of toner is remaining. Depending on the capabilities of the service provider, even more automation is available. 4

7 Section Device Monitoring by RCG-S Pro to gather information on device/fleet population, utilization, operational status and trending. In many cases, IT managers have to utilize each vendor s management software to monitor devices and prevent potential issues. RCG-S Pro not only automatically monitors Ricoh devices but also those of other providers to keep track of device/fleet population. AtRemote.net device monitoring reports offer a variety of print fleet views including vendor population by units and prints. Monthly trending reports from AtRemote.net show page volumes by vendor with drill down detail to an individual device. 5

8 Section RCG-S Pro OnSite Connector Option Enterprise Pro (RCG-S Pro) OnSite SNMP Trap Real-Time Database SQL Express 2005 Grouping Manual Batch Configuration Yes Counters Detailed (for most Ricoh devices); Total Print Counter for third-party networked devices Device Mapping Yes, with user-supplied.jpg file OnSite Dedicated Server Hardware Operating Systems Browser Screen Resolution Network Virtual Server Database Web Server Flash Player CPU: Pentium 4 2.8GHz Hyper-Threading support or better recommended Memory: 1 GB or more minimum; 2 GB or more recommended when managing 1,000+ devices or when using the Connector Free disk space: OS recommended space + 10 GB Server must utilize an intelligent UPS (Uninterruptible Power Source). The server running Connector should not be powered down without completing the normal Windows Server operating system shutdown procedure. Windows Server 2003 Standard Edition/Enterprise Edition SP2 or later; Windows Server 2003 R2 Standard Edition/Enterprise Edition SP2 or later; Windows Server 2008 Standard Edition/Enterprise Edition (only 32 bit OS is supported) Microsoft Internet Explorer 6 (SP1), 7 with Java Script 1024 x 768 or more TCP/IP must be installed and configured correctly (only IPv4 is supported); 100Mbps or more network speed is recommended; Internet connection is required to use the RFU functions VMware Infrastructure 3 Standard Edition SQL Server 2005 Express Edition SP2 or later;.net Framework 2.0 must be installed before installing SQL Server 2005;.NET Framework 2.0 is not included in the server installer; Please download it using Windows Update or from Microsoft s Web site Apache ; Apache is included in the server installer IIS 6.0 or later; IIS is not included with the server installer; install IIS before installing the server Adobe Flash Player 9.0 or later 6

9 Section 1.0 OnSite Client Hardware Operating Systems CPU: Pentium 500MHz recommended Memory: 128 MB recommended Windows 2000 Professional/Server/Advanced Server SP4 or later; Windows XP Home/Professional SP2 or later; Windows Server 2003 Standard Edition/Enterprise Edition SP2 or later; Windows 2003 R2 Standard Edition/Enterprise Edition SP2 or later; Windows Vista Ultimate/Enterprise/Business/Home Premium/Home Basic; Windows Server 2008 Standard Edition/Enterprise Edition SP2 or later Supported Browser Microsoft Internet Explorer 6 (SP1), 7 Screen Resolution Flash Player 1024 x 768 recommended Adobe Flash Player 9.0 or later Printer and Multi-function Device Requirements Network Protocol TCP/IP Standard MIB Printer MIB (RFC 1759); MIB-II (RFC 1213); Host Resource MIB (RFC 2790) Interfaces 10/100MB Ethernet (802.x.x compatible); Wireless LAN devices (802.x.x compatible); IP over Connector Options Toner Alerts Service Alerts Automated Meter Submission Remote Firmware Upgrade Access to Fleet Reports (for most Ricoh devices) Communicate to atremote.net 7

10 Section 2.0 System Structure of RCG-S Pro with Connector Option RCG-S Pro with Connector Option is an interactive system, allowing data to flow between two main components: 1. The RCG-S Pro software installed on a server at the customer s location. This server acts as a relay unit through which all networked devices (MFPs, printers, copiers) communicate. 2. The Center Communication Server, a Ricoh facility where the RCG-S Pro data is received and hosted. Note that communication to and from the RCG-S Pro server to the Center is limited only technology systems. No other system will communicate with the RCG-S Pro server. Also, no system, including the Center Communication Server, can initiate communication to the RCG-S Pro server. The RCG-S Pro server always initiates outbound communication. 8

11 Section 3.0 Communication Methods and Information Security RCG-S Pro utilizes two communication methods to communicate between devices and the Center Communication Server HTTPS (Hyper Text Transfer Protocol Security) and SNMP (Simple Network Management Protocol). It is also important to note that communication between the RCG-S Pro server and the devices is available in two modes: Monitored or Managed. In Monitored mode the RCG-S Pro server provides AutoDiscovery, automates meter collection/submission and allows access to the atremote.net secure fleet reporting Web portal for discovered devices. Managed mode includes the same capabilities as Monitored mode plus automated alerts for critical service events, automated toner alerts, remote firmware upgrades and Green Reports via the atremote.net Web portal for managed, networkconnected Ricoh devices. 3.1 HTTPS Communication Between RCG-S Pro and Connected Devices HTTPS communication takes two forms: I. Access from devices to the RCG-S Pro server via HTTPS PKI (Public Key Infrastructure). For example, a service emergency alert such as device failure or low toner/toner out. 1. When there is a device alarm, the device initiates authentication in real time via electronic certificate with RCG-S Pro. 2. Devices send device failure call information to RCG-S Pro by HTTPS Post Request. 3. The RCG-S Pro confirms receipt of device failure call information by sending back the result via HTTPS Response. 9

12 Section 3.0 II. Access from the RCG-S Pro server to device via HTTPS PKI. For example, meter counter information and service information (device settings, historical data, etc.) 1. When the RCG-S Pro is initiating, authentication via electronic certificate takes place between RCG-S Pro and the devices. 2. The RCG-S Pro sends the obtain counter information request to devices using HTTPS Post Request. 3. Devices confirm receipt of the counter information request by sending back the meter information via HTTPS Response. HTTPS-related information for connected Ricoh-compatible devices includes: 1. RCG-S Pro to device communication (and vice versa) is in Secure Socket Layer (SSL) format. 2. Data is encrypted. RCG-S Pro supports cipher RC4-MD5 128 bits. However, if the device supports only a DES 56 bits key, the encryption level will be reduced to a DES 56 bits key. This key is created and changed for every session. 3. Both RCG-S Pro and the devices have RSA 512 bit certificates and use security authentication checks. 4. For each communication, a mutual authentication procedure is completed before the data is sent. The RCG-S Pro server recognizes and communicates only with devices that have a printer MIB (Management Information Base). Also, print devices connected to print servers or client PCs are not discovered. 10

13 Section SNMP Communication Between RCG-S Pro and Connected Devices Utilizing SNMP communication, device MIB information is obtained by periodic polling from the RCG-S Pro server to the device. For example, meter counter information and a service emergency alert such as device failure or lower toner/toner out. The default setting for polling is 10 minutes. 1. Devices obtain counter information request OIDs from the RCG-S Pro via SNMP Request. 2. Devices send back their counter information via SNMP Response. 11

14 Section Communication Between RCG-S Pro and the Center Communication Server Only one type of communication method is used between the RCG-S Pro server and the service provider s Center Communication Server an HTTPS Internet connection. As with HTTPS communication between the RCG-S Pro server and connected devices, HTTPS communication between the RCG-S Pro server and Center Communication Server utilizes encrypted data in an SSL format. Both servers perform security authentication checks. Before communicating, a mutual verification procedure is completed before the data is sent. Also, because communication can only be initiated from the RCG-S Pro server to the Center Communication Server, it is not necessary to open an additional port for HTTPS reception from outside the customer s firewall. HTTPS communication utilizes Port 443 (See Appendix 4.2). HTTPS communication is initiated from the RCG-S Pro server to the Center Communication Server for two reasons: I. Critical Service Alerts such as device failure or low toner/toner out. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends device failure call information to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of device failure call information by sending back the result via HTTPS Response. Note: Normally, polling between the RCG-S Pro server and Center Communication Server is performed once an hour. However, when the Center Communication Server receives specific call information (such as a device service call), the polling interval is changed to once a minute. After the Center Communication Server receives a Service Call Reset, the polling interval is reset to once an hour. 12

15 Section 3.0 II. Meter Counter Collection 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends polling information to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of polling information by sending back the result to the RCG-S Pro via HTTPS Response along with further counter information request commands. 5. The RCG-S Pro, when the counter information request commands in the HTTPS Response are processed, responds to the Center Communication Server after initializing mutual electronic certificate authentication. 6. The RCG-S Pro send its response to meter information back to the Center Communication Server via HTTPS Post Request. 7. The Center Communication Server confirms receipt of response by sending back the result via HTTPS Response. 13

16 Section Device Connection Check Between RCG-S Pro and devices via HTTPS: 1. Mutual authentication takes place between RCG-S Pro and the device. 2. An ID2 request is sent from RCG-S Pro to the device via HTTPS Post Request. 3. The device sends back ID2 information to RCG-S Pro via HTTPS Response. Between RCG-S Pro and devices via SNMP: 1. RCG-S Pro performs serial number information request OIDs via SNMP Request. (Ricoh devices provide serial number information. Third-party devices provide a MAC address.) 2. Devices send back serial number information via SNMP Response. 14

17 Section Updating Firmware RCG-S Pro with Connector Option has the ability to update device firmware for Ricoh managed devices via HTTPS broadband Internet connection. In order to do so the following equipment is utilized: The Center Communication Server, which manages communication between RCG-S Pro and devices, obtains the required firmware version, and completes updates on the requested implementation date.* The RCG-S Pro Server to acquire firmware data from the Ricoh Global Server and transfer the data to the target device. The Ricoh Global Server to warehouse the firmware versions. The device for the firmware update. * Firmware updates can be implemented at any specified time, such as after working hours. One or multiple firmware versions can be upgraded or downgraded in a scheduled session. The request to update device firmware process is as follows: 15

18 Section 3.0 Steps 1 & 2 RCG-S Pro initiates communication to the Center Communication Server to request any device firmware updates. The Center Communication Server responds to the RCG-S Pro server for a list of target devices requesting firmware updates and the date of the scheduled update. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends polling to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of polling by sending back the request to update firmware information via HTTPS Response. 5. The RCG-S Pro sends a response to the request to update firmware to the Center Communication Server via HTTPS Post Request. 6. The Center Communication Server sends an HTTPS Response. Note: Communication between RCG-S Pro and the Center Communication Server is initiated only by the RCG-S Pro. Step 3 When the date of the scheduled update is reached, RCG-S Pro acquires the firmware data from the Ricoh Global Server via the Center Communication Server. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 16

19 Section RCG-S Pro sends a request for firmware information to the Ricoh Global Server via HTTPS Get Request. 4. The Ricoh Global Server confirms receipt of request for firmware data by sending back the result to the RCG-S Pro via HTTPS Response along with further firmware data request commands. Note: It is not necessary to open a port for HTTPS reception from outside the customer s firewall because the Center Communication Server is not initiating communication through the customer firewall. Steps 4 & 5 For access from RCG-S Pro to devices, RCG-S Pro sets up the device ID and password via FTP login. A connection is made when the ID and password are correct. Updated firmware is then sent to the device via FTP and a response is sent if the firmware data was received. The device also sends a boot notification to the RCG-S Pro server to automatically reboot after the firmware update. 1. Send ID and password via FTP login. 2. Connection is made when ID and password are correct. 3. Send firmware data to the device via FTP. 4. Receive response if firmware data was received via FTP. 5. When there is a device alarm, the device initiates authentication via electronic certificate with RCG-S Pro. 6. Devices send boot notification information to RCG-S Pro by HTTPS Post Request. 7. RCG-S Pro confirms receipt of boot notification information by sending back the result via HTTPS Response. 17

20 Section 3.0 Step 6 RCG-S Pro sends the results of the firmware update to the Center Communication Server. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends notification of the results of updating the firmware version of the device to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of response to the notification of the results of updating the firmware version of the device by sending back the result to the RCG-S Pro via HTTPS Response. 3.6 AutoDiscovery With AutoDiscovery, the RCG-S Pro can automatically discover network-connected devices and with Connector Option encrypt and send information (e.g. Printer MIB, meter data) to the Center Communication Server via a secure HTTPS connection. RCG-S Pro collects device information from devices which are specified by identifying selected network segments in the Discovery Settings menu of the user interface for RCG-S Pro. The following intervals can be set for RCG-S Pro AutoDiscovery: Execution interval Set value Note Once per day Time: 0:00 23:59 Example: 13:00 Once per week Day: Sunday Saturday Example: 12:00, Sunday Time: 0:00 23:59 Once per month Day of month: 1 28th Example: 9:00, the 20th Time: 0:00 23:59 Note: The factory default setting is Not Used. If the device is without electrical power or is not connected to the network, no device information will be obtained. 18

21 Section 3.0 Traffic utilization with the RCG-S Pro server is also negligible. Traffic Size & Communication Timing via SMNP for Meter Data Between Device & RCG-S Pro Between RCG-S Pro & Center Communication Server Approx 4 KB or less per device traffic size User set communication timing Approx. 4 KB or less per message traffic size* Approx. 8 KB after the device data is captured *Data size is doubled when using SSL communication. SNMP The AutoDiscovery process between the RCG-S Pro server and device is shown below. Device MIB information is obtained from periodic RCG-S Pro to device polling. 1. Devices obtain counter information request OIDs from RCG-S Pro via SNMP Request. 2. Devices send back their counter and device information via SNMP Response. 19

22 Section 3.0 HTTPS The following diagram depicts the procedure to securely transmit stored device data on the RCG-S Pro server to the Center Communication Server. The device information acquired via SNMP is stored with RCG-S Pro temporarily and then notified collectively by the following procedures for every ten devices. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. RCG-S Pro sends polling information to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of polling information by sending back the result to the RCG-S Pro via HTTPS Response along with further counter information request commands. 5. RCG-S Pro, when the counter information request commands in the HTTPS Response are processed, responds to the Center Communication Server after initializing mutual electronic certificate authentication. 6. RCG-S Pro sends its response to counter information back to the Center Communication Server via HTTPS Post Request. 7. The Center Communications Server confirms receipt by sending back the result via HTTPS Response. AutoDiscovery Network Security Security Concern HTTPS Security Threat? Reason Attack from outside of customer s network NO No HTTPS server at customer location. Communication can only be initiated by RCG-S Pro from behind the customer firewall. Customer data security including: NO All data is transmitted in SSL protocol Unauthorized access only after both ends verify each other s identity and only to the address specified Malicious data interference at setup. The data itself is also encrypted Illicit network monitoring (cipher RC4-MD5 128 bits). 20

23 Section 4.0 Appendix Appendix 4.1 Device Information Information obtained during the AutoDiscovery process: Select meter counters Controller/NIC version Model and vendor name MAC/Serial number IP address Advantages Information Obtained Device Details Reduces downtime Alert Firmware Device failure call (jam, cover open, etc.) Controller/NIC version Automated counter checking Counter Total/copier, fax, printer/black & white, color counter Toner alert Toner low, Staples out Toner end/near end Device monitoring Device information Model name, vendor name, IP address, etc. 21

24 Section 4.0 Appendix Protocols and Open Ports RCG-S Pro Port Usage and Communication Methodologies No. Occasion Communication Direction Port. No. Protocol Type 1 RCG-S Pro is connecting to device by FTP. 2 RCG-S Pro is sending firmware information. 3 RCG-S Pro is capturing MIB information from device. RCG-S Pro = > Device 20 FTP TCP RCG-S Pro = > Device 21 FTP TCP RCG-S Pro = > Device 161 SNMP UDP* 4 RCG-S Pro is sending notification to Center Communication Server via HTTPS. RCG-S Pro = > Center Communication Server 9443 HTTPS TCP Device is sending notification such as emergency call. CE/Service Technician is operating RCG-S Pro via laptop. RCG-S Pro is requesting firmware information. 5 RCG-S Pro is capturing device information. 6 RCG-S Pro tries to communicate with device for the first time. Device = > RCG-S Pro CE s Laptop = > RCG-S Pro RCG-S Pro = > Center Communication Server RCG-S Pro = > Device 7443 HTTPS TCP RCG-S Pro = > Device 7444 HTTPS TCP *User Datagram Protocol Open Ports and Communication Methodologies Communication No. Type 1 Device is sending notification such as Emergency Call. Communication Direction Port. No. Protocol Type Device = > RCG-S Pro 9443 HTTPS TCP CE/Service Technician operates RCG-S Pro via laptop. CE s Laptop = > RCG-S Pro 22

25 Section 4.0 Appendix 4.3 Cryptographic Algorithms of HTTPS Figure 1 below shows SSL negotiation with mutual authentication, client authentication and server authentication. Steps are detailed on the following page. REMOTE COMMUNICATION GATE (CLIENT) COMMUNICATION SERVER (SERVER) Client private key Certificate: RSA-512 Client public key Certificate: RSA-512 CA public key Certificate: RSA-512 Server private key Certificate: RSA-512 Server public key Certificate: RSA-512 CA public key Certificate: RSA-512 (1) SSL version, Seed (random number),supported cipher suite (2) SSL version, Seed (random number), Session ID, Cipher used in the conversation (3) Server Certificate (4) Client Certificate Request (5) Server Certificate Verify (6) Client Certificate (7) Pre master secret (Random number) generation (8) Pre-master secret (9) Sign to data using client private key (10) Data with signature (11) Session Key generation Cipher RC4-MD5 128 bits (RCG-S Pro V3.34 or later) with two seeds and pre master secret (12) Client Certificate Verify Session Key generation Cipher RC4-MD5 128 bits (RCG-S Pro V3.34 or later) (13) Finished (14) Finished/Session Start Figure 1: SSL Handshake Change Cipher Protocol 23

26 Section 4.0 (1) The first step in the process is for the client to send the server a Client Hello message. This hello message contains the SSL version and the cipher suites the client can talk and seed of random number. The client sends its maximum key length details at this time. (2) The server returns the hello message with one of its own in which it nominates the version of SSL and the ciphers and key lengths to be used in the conversation, chosen from those offered in the client hello. (3) The server sends its digital certificate to the client for inspection. (4) The server sends a client certificate request after sending its own certificate. (5) The client verifies the server certificate. (6) The client sends its certificate. (7) The client generates a pre master secret and encrypts it using the server's public key. (8) The client sends a pre master secret to the server. (9) The client signs to data using client secret key. (10) The client sends a certificate verify message in which it encrypts a known piece of plaintext using its private key. The server uses the client certificate to decrypt, therefore ascertaining the client has the private key. (11) The client generates a session key with two seeds and pre master secret. (12) The server verifies the client certificate. The server decrypts pre master secret using server private key, and generates a session key. (13) The client now sends a Finished message using the new key to determine if the server is able to decrypt the message and the negotiation was successful. (14) The server sends its own Finished encrypted message using the key. If the client can read this message then the negotiation is successfully completed. RCG-S Pro and the Center Communication Server have a 512 bit certificate. Therefore an RSA 512 bits cipher suite is used. For RCG-S Pro Ver and later an RC4-MD5 128 bits cipher is used for encryption. When HTTPS method is selected, the session key (i.e. the encryption key for HTTPS) is created each and every time. 24

27 Section 4.0 Appendix 4.4 Network Traffic and Communication Timing Traffic Size & Communication Timing (By Device Type & Purpose) Between Device & RCG-S Pro Between RCG-S Pro & Center Communication Server SNMP Communication Meter Date Server Traffic Size Approx 4 KB or less per device before encryption Approx 80 KB or less per message (depending on the # of devices) Communication Timing Every 24 hours polling as default Daily/weekly/monthly (On the meter reading due date)/18:00-10:00 local time Failure Supply Call Traffic Size Approx 4 KB per device Approx 8 KB per device Communication Timing Every 10 minutes polling as default Real-time (right after Failure Call/Supply Call is captured) Device Connection Check when Disconnected Traffic Size Communication Timing Approx 1 KB per disconnected device Search for the disconnected device every 12 hours HTTPS Communication Device Meter Data Traffic Size Approx 160 KB per device Approx 1.5 MB or less per message (depending on the # of devices) Communication Timing Every 24 hours polling as default Daily at random times Service Call/Supply Call Traffic Size Approx 100 KB per device Approx 10 KB per device Communication Timing Real-time Real-time Firmware Update Traffic Size Avg. 6 MB (Max 16 MB per firmware) Avg. 6 MB (Max. 16 MB per firmware) Communication Timing Specified date and time Specified date and time Device Connection Check when Disconnected Traffic Size Communication Timing Approx 1 KB per disconnected device Search for the disconnected device every 12 hours Note: Although RCG-S Pro executes a connection check and collects device information from monitored devices, only data from managed devices is sent to the Center Communication Server. 25

28 Section 5.0 Frequently Asked Questions Q1. Should the RCG-S Pro be installed in a special location? A. The RCG-S Pro does not require any specific location. Install it where you would IT servers. Q2. How are RCG-S Pro settings protected? A. Access is user name and password protected. Q3. Should power to the RCG-S Pro normally be left on? What about power to devices? A. Leave the server powered on, so the RCG-S Pro can collect device data at the times specified during setup. Also, because it should remain connected, the RCG-S Pro is a server PC. Make sure main power switches on devices are on (a device s status cannot be read if its main power is switched off). Q4. How can I turn off the RCG-S Pro? A. 1. Double-click C:Program Files RMWSDMEX tool atremote_stop_manual.bat to stop service in the server PC. 2. Confirm by Services in Server Manager that service (DH AtRemoteService) is stopped. 3. Shut down Windows by the normal procedure. 4. Unplug or turn off the power switch. Q5. How can I turn on the RCG-S Pro? A. 1. Plug in or turn on the server s power switch. 2. Start up Windows by the normal procedure. Note: Wait for about 30 seconds after Windows starts up, because you must wait until RCG-S Pro is started and in standby. 3. Double-click C: Program Files RMWSDMEX tool atremote_start_auto.bat to start service in the server PC. 4. Confirm by Services in Server Manager that service (DH AtRemoteService) is started. Q6. Is data that is sent out over the Internet secure? A. Yes, because it is transmitted in SSL protocol after both ends verify each other s identity, and only to the address specified at setup. Also, for further security, the data itself is encrypted between the device, RCG-S Pro and the Center Communication Server (encryption level is at cipher RC4-MD5 128 bits). Communication between RCG-S Pro and the Center Communication Server uses the form initiated by RCG-S Pro. Communication is never initiated from the Center Communication Server. 26

29 Section 5.0 Q7. What kind of data is received from the Center Communication Server? A. When the Center Communication Server requires device information it sends a request (status sense) for it. Q8. Can system communicate into the RCG-S Pro? A. Initiated communication is from RCG-S Pro: To go through the firewall, the Center Communication Server must send necessary information in reply to the signals sent regularly from the RCG-S Pro (frequency specified at setup).* * Communication is not initiated by the Center Communication Server. Q9. Can viruses enter the user network when communicating over the Internet? A. No, because communication occurs only within the limits of RCG-S Pro and the Center Communication Server. Also, the data is sent in SSL protocol after mutual authentication (virus checks are carried out before sending). Q10. How many devices can RCG-S Pro monitor and manage? A. Up to 5,000 managed devices can be registered to the Center Communication Server. For AutoDiscovery, RCG-S Pro can monitor and manage a total of 5,000 devices per instance, including those devices registered to the Center Communication Server. Q11. What about traffic size on the user network and its communication timing? A. Traffic size and its communication timing will differ depending on the communication data type. Please refer to Appendix 4.4 for the detailed traffic size and its communication timing. Q12. Is there any chance of obtaining the customer's server or client PC s information via RCG-S Pro? A. No. Information on the customer's server or client PC is never obtained via RCG-S Pro. Q13. Does RCG-S Pro support a Token Ring environment? A. No, it does not. 27

30 Ricoh Americas Corporation, Five Dedrick Place, West Caldwell, NJ Ricoh and the Ricoh logo are registered trademarks of Ricoh Company Ltd. All other trademarks are the property of their respective owners.

White Paper. 2005, Ricoh Corporation

White Paper. 2005, Ricoh Corporation White Paper This guide is intended solely for the use and information of Ricoh Corporation, its designated agents and their employees. The information in this guide was obtained from several different

More information

@ Remote. Intelligent Remote Management System for the Network Connected Printing Devices. White Paper (External Appliance Type)

@ Remote. Intelligent Remote Management System for the Network Connected Printing Devices. White Paper (External Appliance Type) @ Intelligent Management System for the Network Connected Printing s White Paper (External Appliance Type) Version 6.00 June.15th,2006 Copyright c 2004-2006 Ricoh Company, Ltd. All rights reserved. Update

More information

Security for Streamline NX Secure Print Manager White Paper

Security for Streamline NX Secure Print Manager White Paper 11/2/2011 Technical Information: Security for Streamline NX Secure Print Manager White Paper Document Version 1.2 Copyright 2011 RICOH Americas Corporation. All rights reserved. Page 1 of 16 Visit our

More information

Security White Paper For GlobalScan NX Version 1.5

Security White Paper For GlobalScan NX Version 1.5 10/12/2011 Security White Paper For GlobalScan NX Version 1.5 Copyright 2011 RICOH Americas Corporation. All rights reserved. Page 1 of 14 Visit our Knowledgebase at: http://www.ricoh-usa.com/support/knowledgebase.asp

More information

easy ntelligent convenient GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows

easy ntelligent convenient GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows easy convenient Server 5/Server 32/Server 750 ntelligent Ricoh GlobalScan NX Server 5/Server 32/Server

More information

Web Point and Print White Paper

Web Point and Print White Paper 07/26/2010 Technical Information: White Paper Document Version 1.0 Copyright 2010 RICOH Americas Corporation. All rights reserved. Page 1 of 9 Visit our Knowledgebase at: http://tsrc.ricoh-usa.com/ref/faq.asp

More information

Facilities Manager Technical Overview

Facilities Manager Technical Overview Facilities Manager Technical Overview Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfillment and report service

More information

Infinite Device Management

Infinite Device Management Infinite Device Management Version: Date: 18 04-Dec-2018 15:18 Table of Contents Infinite Device Management Features...................................... 3 Minimal software to install......................................................

More information

HP E-PCM Plus Network Management Software Series Overview

HP E-PCM Plus Network Management Software Series Overview Overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security and extensibility

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

Securing Mainframe File Transfers and TN3270

Securing Mainframe File Transfers and TN3270 Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Complete document security

Complete document security DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

Security Testing Summary of Konica Minolta bizhub vcare 2.8 Device Management and Communications System and Various bizhub Products

Security Testing Summary of Konica Minolta bizhub vcare 2.8 Device Management and Communications System and Various bizhub Products Security Testing Summary of Konica Minolta bizhub vcare 2.8 Device Management and Communications System and Various bizhub Products SR140630B July 2014 Miercom www.miercom.com Overview Konica Minolta Business

More information

QuickSpecs HP ProCurve Manager Plus 3.1

QuickSpecs HP ProCurve Manager Plus 3.1 Overview HP ProCurve Manager Plus is a Microsoft Windows-based network management platform that enables mapping, configuration, and monitoring. HP ProCurve Manager Plus provides security and extensibility

More information

User's Guide. 1 Pre-operation Confirmation 2 Login and Logout 3 Displaying Device Information 4 Downloading and Installing Packages 5 Appendix

User's Guide. 1 Pre-operation Confirmation 2 Login and Logout 3 Displaying Device Information 4 Downloading and Installing Packages 5 Appendix User's Guide 1 Pre-operation Confirmation 2 Login and Logout Displaying Device Information 4 Downloading and Installing Packages 5 Appendix Read this manual carefully before you use this product and keep

More information

IBM SmartCloud Notes Security

IBM SmartCloud Notes Security IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM

More information

Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1

Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1 Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1 January 10, 2018 Security Measures for Introduction Ensure the following settings before introducing a product.

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

HP ProCurve Manager Plus 3.0

HP ProCurve Manager Plus 3.0 Product overview HP ProCurve Manager Plus is a Microsoft Windows-based network management platform that enables mapping, configuration, and monitoring. HP ProCurve Manager Plus 3.0 provides security and

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide

HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide Abstract This guide provides information about developing encryption key management processes, configuring the tape autoloader

More information

Secure Login for SAP Single Sign-On Sizing Guide

Secure Login for SAP Single Sign-On Sizing Guide PUBLIC SAP Single Sign-On Document Version: 1.1 2018-07-31 Secure Login for SAP Single Sign-On 3.0 - Sizing Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduction....3

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

HP S1500 SSL Appliance. Product overview. Key features. Data sheet

HP S1500 SSL Appliance. Product overview. Key features. Data sheet HP S1500 SSL Appliance Data sheet Product overview The HP S1500 SSL Appliance provides hardware-accelerated Secure Sockets Layer (SSL) offloading and bridging to enable high-performance intrusion prevention

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

RICOH MP 501SPF/ MP 601SPF

RICOH MP 501SPF/ MP 601SPF Multifunction B&W RICOH MP 501SPF/ MP 601SPF Printer Copier Facsimile Scanner MP 501SPF 52 ppm monochrome MP 601SPF 62 ppm monochrome Frequently Asked Questions Ricoh USA, Inc. 70 Valley Stream Parkway

More information

HP Device Connect - Software Lite Technical Quick Specs

HP Device Connect - Software Lite Technical Quick Specs HP Device Connect - Software Lite Software Release Version: 4.4 Document Version: 1.3 Document Release Date: January, 2016 Document Last Update Date: December, 2016 Software Release Date: December, 2016

More information

IDM Technical Overview

IDM Technical Overview IDM Technical Overview Infinite Device Management Features Minimal software to install Infinite Device Management uses a small software program called the Information Collection Engine to perform periodic

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Automated Meter Collection Software Powered by FMAudit

Automated Meter Collection Software Powered by FMAudit Overview The powered by FMAudit suite of products deliver an enterprise class managed print solution that is very easy to use and deploy. It is architected and designed to take advantage of the advanced

More information

Security Guide SAP Supplier InfoNet

Security Guide SAP Supplier InfoNet SAP Supplier InfoNet Table of Contents 1 About this document....3 2 Network and communication security....4 2.1 Network security....4 2.2 Communication channel security....4 2.3 Network resource security....4

More information

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the

More information

It is also available as part of the HP IS DVD and the Management DVD/HPSIM install.

It is also available as part of the HP IS DVD and the Management DVD/HPSIM install. Overview The HP is a web-based interface that consolidates and simplifies the management of individual ProLiant and Integrity servers running Microsoft Windows or Linux operating systems. By aggregating

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

User s Guide: Applied Functions

User s Guide: Applied Functions User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1

More information

HPE Aruba Airwave Installation and Startup Service

HPE Aruba Airwave Installation and Startup Service Data sheet HPE Aruba Airwave Installation and Startup Service Support Services HPE Installation and Startup Service for select Aruba Airwave products coordinates installation, configuration, and verification

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

PageScope Enterprise Suite Ver. 3.1 Installation Guide

PageScope Enterprise Suite Ver. 3.1 Installation Guide PageScope Enterprise Suite Ver. 3.1 Installation Guide Enterprise Suite Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic functions... 1-1 1.1. Add-on (extension) applications...1-1.1.3

More information

Revised September 2011 Broadband Access Agreement for BIT Communications

Revised September 2011 Broadband Access Agreement for BIT Communications Revised September 2011 Broadband Access Agreement for BIT Communications 1 This Broadband Access Agreement for BIT Communications High Speed Internet serves as a confirmation and acknowledgment of the

More information

HP JetAdvantage Security Manager. User Guide

HP JetAdvantage Security Manager. User Guide HP JetAdvantage Security Manager User Guide Copyright 2017 HP Development Company, L.P. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under

More information

User's Guide Applied Functions

User's Guide Applied Functions User's Guide Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-3 1.2.1

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A Wireless USB 2.0 1-Port Multi-Functional Printer Server Model # AMPS240W User s Manual Ver. 1A Table of Contents 1 Introduction...3 1.1 Package Contents... 3 1.2 System Requirements... 3 2 Multi-Functional

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

Belarc Product Description

Belarc Product Description Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision B McAfee Network Security Platform (8.1.7.5-8.1.3.43 M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Manual Version: V1.00. Video Decoder User Manual

Manual Version: V1.00. Video Decoder User Manual Manual Version: V1.00 Video Decoder User Manual Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. Copyright Copyright 2016 Zhejiang

More information

Table of contents. Security and privacy white paper. Technical white paper HP Partner Link Pay-per-use Portal 1. About this white paper

Table of contents. Security and privacy white paper. Technical white paper HP Partner Link Pay-per-use Portal 1. About this white paper Technical white paper HP Partner Link Pay-per-use Portal 1 Security and privacy white paper Table of contents About this white paper White paper summary What is the HP Partner Link Pay-per-use Portal?

More information

Information Security in Corporation

Information Security in Corporation Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

SolarWinds Engineer s Toolset Fast Fixes to Network Issues

SolarWinds Engineer s Toolset Fast Fixes to Network Issues DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

A guide to CLARiSUITE TM network solutions

A guide to CLARiSUITE TM network solutions Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

TP-LINK TD-W9970 Wireless ADSL2+ Modem Router

TP-LINK TD-W9970 Wireless ADSL2+ Modem Router Welcome to ACN This guide is designed to help you connect your new ACN ADSL Broadband service. Your modem has been pre-configured to simply Plug n Play so you ll be up and running in no time. Once you

More information

R M S N e t w o r k :

R M S N e t w o r k : RMS NETWORK WHITE PAPER AMX R M S N e t w o r k : T e c h n o l o g y W h i t e P a p e r Table of Contents Table of Contents 2 Overview: 3 Resource Management Suite (RMS) Requirements: 4 RMS Network Configuration:

More information

Tracking and Reporting

Tracking and Reporting Secure File Transfer Tracking and Reporting w w w. b i s c o m. c o m 321 Billerica Road, Chelmsford, MA phone: 978-250-1800 email: sales@biscom.com EXECUTIVE SUMMARY The Internet has made it easier than

More information

NMS300 Network Management System Application

NMS300 Network Management System Application NMS300 Network Management System Application Quick Start Guide October 2013 202-11288-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing

More information

WorldExtend Environment Preparation Guide

WorldExtend Environment Preparation Guide WorldExtend Environment Preparation Guide WorldExtend IronDoor Version 3.5 WorldExtend, LLC. Published: March 2008 Abstract This guide explains how to prepare your application environment for WorldExtend

More information

MIU-1000 v. Revised: 4/20/2009. Copyright 2008, Traf-SYS, Inc.

MIU-1000 v. Revised: 4/20/2009. Copyright 2008, Traf-SYS, Inc. MIU-1000 v 2.6g Revised: 4/20/2009 Copyright 2008, Traf-SYS, Inc. Contents Introduction... 3 Setting up your MIU-1000 for the first time... 3 Connections... 3 Connecting with a Serial Cable... 3 Connecting

More information

CLIQ Remote - System description and requirements

CLIQ Remote - System description and requirements CLIQ Remote - System description and requirements 1. Introduction CLIQ Remote - Access at a distance CLIQ Remote is an electromechanical lock system with an additional level of security and flexibility,

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

Course overview CompTIA A Official Study Guide

Course overview CompTIA A Official Study Guide Course overview CompTIA A+ 220-801 Official Study Guide (G183eng ver092) Overview CompTIA A+ courses are intended for students wishing to qualify with CompTIA A+ Certification. A+ certification is designed

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

CODE ALERT Enterprise Software Customer Information Technology Requirements

CODE ALERT Enterprise Software Customer Information Technology Requirements CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

QuickSpecs Insight Manager 7 Service Pack 2

QuickSpecs Insight Manager 7 Service Pack 2 Overview Product Description Insight Manager 7, the core of the ProLiant Essentials Foundation Pack, maximizes system uptime, reduces total cost of ownership, and provides powerful monitoring and control

More information

Quick Start Guide. W-118 Access Point. Arista Networks. DOC

Quick Start Guide. W-118 Access Point. Arista Networks.   DOC Quick Start Guide W-118 Access Point Arista Networks www.arista.com DOC-03485-01 Headquarters 5453 Great America Parkway Santa Clara, CA 95054 USA + 1 408 547-5500 www.arista.com Support +1408547-5502+

More information

HP Web Jetadmin Report Generation Plug-in

HP Web Jetadmin Report Generation Plug-in HP Web Jetadmin Report Generation Plug-in HP Web Jetadmin Report Generation Plug-in Reference Manual Copyright notice 2006 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation

More information

Goverlan Remote Administration Suite

Goverlan Remote Administration Suite manage IT complexity simply REMOTE ADMINISTRATION SUITE Goverlan Remote Administration Suite IT Governance made easy Get broad-scope, enterprise-level administration of your users & machines along with

More information

QuickSpecs HP Insight Rapid Deployment software 6.0

QuickSpecs HP Insight Rapid Deployment software 6.0 Overview HP Insight Rapid Deployment software is a complete deployment solution for ProLiant and Integrity servers. HP Insight Rapid Deployment software automates the process of deploying and provisioning

More information

Securing Access to Network Devices

Securing Access to Network Devices Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard

More information

A Guide to Closing All Potential VDI Security Gaps

A Guide to Closing All Potential VDI Security Gaps Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse

More information

User Guide Supplement Measurement Systems International

User Guide Supplement Measurement Systems International MSI-9850 Ethernet Option User Guide Supplement Measurement Systems International Integrated System Solutions for Industrial Weighing and Process Control Table of Contents Introduction...4 Quick Start...4

More information

HP PageWide Managed Color P75250dn Firmware Readme

HP PageWide Managed Color P75250dn Firmware Readme HP PageWide Managed Color P75250dn Firmware Readme Product Name(s): HP PageWide Managed Color P75250dn Model Number(s): Y3Z49A This document contains information for the firmware revision number: Firmware

More information

Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS)

Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS) Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS) January 2009 1 January 2009 Polycom White Paper: Complying with PCI-DSS Page 2 1.

More information

Print Server Appliance

Print Server Appliance Print Server Appliance Easily manage your organization s network printing with Canon s Print Server Appliance. Canon s Print Server Appliance (PSA) is a Windows 2000 turnkey server appliance designed to

More information

AW-HE40 / HE65 Firmware Update Procedure

AW-HE40 / HE65 Firmware Update Procedure AW-HE40 / HE65 Firmware Update Procedure Please be sure to read this first. The update of AW-HE40/ HE65 camera is performed via a network from Web setting screen on PC. There might be accidents in the

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Connectware Manager Getting Started Guide

Connectware Manager Getting Started Guide Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi

More information

Equitrac Integrated for Konica Minolta

Equitrac Integrated for Konica Minolta Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac

More information

Protect enterprise data, achieve long-term data retention

Protect enterprise data, achieve long-term data retention Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce

More information

AW-HE50 Firmware Upgrade Procedure

AW-HE50 Firmware Upgrade Procedure AW-HE50 Firmware Upgrade Procedure Please be sure to read this first. AW-HE50 Upgrade Procedure July 2013 The update of AW-HE50 camera is performed via a network from Web setting screen on PC. There might

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

VMware View Upgrade Guide

VMware View Upgrade Guide View 4.0 View Manager 4.0 View Composer 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for

More information

Xerox Mobile Print Solution

Xerox Mobile Print Solution Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright

More information

QuickSpecs HP Insight with Microsoft System Center Essentials 2010

QuickSpecs HP Insight with Microsoft System Center Essentials 2010 Overview HP Insight with Microsoft System Center Essentials 2010 integrates management of your physical and virtual IT environmentsincluding servers, PCs, storage, networking devices and software-using

More information

SNMP: Simplified. White Paper by F5

SNMP: Simplified. White Paper by F5 The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

HP Designjets and HP Security Features

HP Designjets and HP Security Features HP Designjets and HP Security Features Overview and solutions for managing Security features in HP Designjets using the printers Embedded Web Server technology, Front Panel and Web Jetadmin Table of contents

More information

HP SmartTracker. Installation guide

HP SmartTracker. Installation guide HP SmartTracker Installation guide Edition 1 Copyright 2017 HP Development Company, L.P. Legal notices The information contained herein is subject to change without notice. The only warranties for HP products

More information

PageScope Net Care Device Manager Ver. 2.0 User s Guide

PageScope Net Care Device Manager Ver. 2.0 User s Guide PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration

More information

Network Management Card. User Manual

Network Management Card. User Manual User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1

More information

StruxureWare TM. Data Center Expert. Data Center Infrastructure Management (DCIM) Software

StruxureWare TM. Data Center Expert. Data Center Infrastructure Management (DCIM) Software StruxureWare TM Data Center Expert Data Center Infrastructure Management (DCIM) Software End to end data center infrastructure management software for monitoring and control of power, cooling, security

More information