Comprehensive Enterprise Fleet Management
|
|
- Gloria Hunt
- 5 years ago
- Views:
Transcription
1 Comprehensive Enterprise Fleet Management An Overview of Remote Communication Gate S Pro (RCG-S Pro) Enterprise Pro with Connector Option Detailed information on capabilities and functionality of RCG-S Pro with Connector Option Produced by the Global Technology Support Section Ricoh Company, Ltd. May 2010 [A Enterprise Pro On-Site white paper is also available.]
2 Table of Contents 1.0 Overview 1.1 Today s Customer Environment and IT 1.3 Advantages of RCG-S Pro with Connector Option for Network-Connected Printing Devices 1.4 RCG-S Pro OnSite Connector Option Specifications 2.0 System Structure Of RCG-S Pro Connector Option 3.0 Communication Methods and Information Security 3.1 HTTPS Communication Between RCG-S Pro and Connected Devices 3.2 SNMP Communication Between RCG-S Pro and Connected Devices 3.3 Communication Between RCG-S Pro and the Center Communication Server 3.4 Device Connection Check 3.5 Updating Firmware 3.6 AutoDiscovery 4.0 Appendix 4.1 Device Information Protocols and Open Ports 4.3 Cryptographic Algorithms of HTTPS 4.4 Network Traffic and Communication Timing 5.0 Frequently Asked Questions The content of this document, and the appearance, features and specifications of Ricoh products and services are subject to change from time to time without notice. While care has been taken to ensure the accuracy of this information, Ricoh makes no representation or warranties about the accuracy, completeness or adequacy of the information contained herein, and shall not be liable for any errors or omissions in these materials. Your actual results will vary depending upon your use of the products and services, and the conditions and factors affecting performance. THERE ARE NO GUARANTEES THAT YOU WILL ACHIEVE RESULTS SIMILAR TO OURS. The only warranties for Ricoh products and services are as set forth in the express warranty statements accompanying them. Nothing herein shall be construed as constituting an additional warranty. Ricoh does not provide legal, tax, accounting or auditing advice, or represent or warrant that our products or services will GUARANTEE OR ENSURE COMPLIANCE WITH ANY LAW, REGULATION OR SIMILAR REQUIREMENT. Customer is responsible for making the final selection of products, solutions and technical architectures, and for ensuring its own compliance with various laws such as the Gramm-Leach-Bliley Act, the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act (HIPAA).
3 Section 1.0 Overview 1.1 Today s Customer Environment Although potential for growth has never been larger, this is a challenging time for companies everywhere. Worldwide opportunities mean global competition, and businesses that want to stay ahead face complex tasks. Not the least of which is how to cut costs while staying abreast with the relentless pace of changing technology. Business is under ever-growing pressure to improve the quality and decrease the turnaround time of their products and services. Much of the success or failure of a business depends directly on the quality of the equipment and services at its disposal. In a large business environment especially, administration of the print fleet is becoming more and more important. Weak maintenance and lack of intelligent system management can negate the advantages of quality equipment and staff. Add to this the fact that the IT manager s workload is increasingly complex, as administration duties and IT development expand. Pressure to get the maximum from networked print devices has never been greater. Control over devices is an elemental factor of network efficiency, since this is key to TCO (Total Cost of Ownership the sum of three costs: start up, control/administration, and operation). Also, as competition intensifies, business system costs have grown in significance and are now a major management priority. The challenge for IT is to reduce time lost on equipment maintenance, configuring, servicing, supplying and monitoring. It is to relieve dependencies on users for reports on device population, utilization trending status or malfunctions. Reports that unfailingly come after the problem has occurred and understandably often lack the technical detail necessary for a prompt assessment and solution. To counter precisely these obstacles, an ideal remote servicing system would be capable of the following: Detecting problems before users will become aware of them to tackle firmware and reboot remotely, with minimal user intervention. Identifying and pre-diagnosing potential breakdowns or shortages. Technicians could then be dispatched, fully equipped with the necessary parts. Monitoring device population, trending performance and making whatever modifications necessary to optimize productivity and efficiency. Watching over toner consumption, and enabling re-order before toner runs out. Providing TCO-relevant data to the administrator. Establishing an automated, usage-based meter submission and billing system to streamline running costs. 1
4 Section 1.0 and is designed to be capable of exactly these functions. Its purpose is to provide five related enhancements to your fleet of networked printing devices: 1. IT equipment maintenance capabilities, including status, critical service event notification, toner alert notification and supply ordering and delivering. 2. IT equipment productivity improvement, by maximizing device utilization and aligning the right devices with applications. 3. IT cost reduction, including initial outlay for equipment, maintenance and operation costs such as monitoring device monthly volumes. 4. IT usability to the networked print population at the fleet or device level. 5. Green Reporting to determine whether the networked print fleet meets environmental and cost-saving expectations. The solution is the Ricoh Remote Communication Gate S Pro (also known as RCG-S Pro Enterprise Pro) with Connector Option. To limit the downtime of each kind of networked device (multifunction products, laser printers), it is of growing necessity that IT deploys systems and tools to help manage these devices. RCG-S Pro with Connector Option provides for this, allowing users to benefit from improved business productivity, automation of select maintenance processes and the reduced costs associated with these activities. Utilizing RCG-S Pro with Connector Option, IT administrators can map, monitor and configure devices, as well as automate service alerts, toner alerts, meter collection and submission and perform remote firmware upgrades. This option also provides secure, Web-based access to fleet reports. Green Reports provide a view to select environmental aspects of print activity such as paper and energy usage for Ricoh managed devices. 2
5 Section Advantages of RCG-S Pro with Connector Option for Network- Connected Printing Devices There are four broad features of RCG-S Pro with Connector Option that make it particularly advantageous for users: 1. Reduced Device Downtime via automated notification of critical service events to the service provider through an Internet connection. Users can print or copy with little worry about incomplete jobs or being delayed due to maintenance and repairs. And the organization is freed from time-consuming manual device monitoring and expenses associated with downtime. The solution can also perform remote firmware upgrades or, if necessary, alert dispatch personnel. 2. Automated Meter Collection and Submission so that users no longer have to manually collect and report meter figures. This means production efficiency can be measured directly, meter figures confirmed and TCO-relevant data obtained and acted upon. In the past, the traditional meter collection procedure involved: 1. The service provider requests the user to check the meter(s). 2. The user checks the device s meter. 3. The user reports the meter figure by postcard, telephone or online. 4. The service provider sends an invoice for actual usage. 3
6 Section 1.0 With RCG-S Pro and Connector Option, workload is dramatically reduced and efficiency is greatly increased. 1. RCG-S Pro collects and submits the meter information to the service provider automatically. Human touch is eliminated. 2. The service provider sends an invoice for actual usage. 3. Receive Alerts when Toner Nears End automatically when toner levels are at near end or depleted. Formerly, the process was: 1. Device runs out of toner. User calls the service provider. 2. The service provider requests toner delivery from the delivery center. 3. The delivery center delivers the toner to the user. With RCG-S Pro, Connector Option and a qualified service provider, the user no longer has to worry about devices running out of toner. The device can alert the service provider when 10% of toner is remaining. Depending on the capabilities of the service provider, even more automation is available. 4
7 Section Device Monitoring by RCG-S Pro to gather information on device/fleet population, utilization, operational status and trending. In many cases, IT managers have to utilize each vendor s management software to monitor devices and prevent potential issues. RCG-S Pro not only automatically monitors Ricoh devices but also those of other providers to keep track of device/fleet population. AtRemote.net device monitoring reports offer a variety of print fleet views including vendor population by units and prints. Monthly trending reports from AtRemote.net show page volumes by vendor with drill down detail to an individual device. 5
8 Section RCG-S Pro OnSite Connector Option Enterprise Pro (RCG-S Pro) OnSite SNMP Trap Real-Time Database SQL Express 2005 Grouping Manual Batch Configuration Yes Counters Detailed (for most Ricoh devices); Total Print Counter for third-party networked devices Device Mapping Yes, with user-supplied.jpg file OnSite Dedicated Server Hardware Operating Systems Browser Screen Resolution Network Virtual Server Database Web Server Flash Player CPU: Pentium 4 2.8GHz Hyper-Threading support or better recommended Memory: 1 GB or more minimum; 2 GB or more recommended when managing 1,000+ devices or when using the Connector Free disk space: OS recommended space + 10 GB Server must utilize an intelligent UPS (Uninterruptible Power Source). The server running Connector should not be powered down without completing the normal Windows Server operating system shutdown procedure. Windows Server 2003 Standard Edition/Enterprise Edition SP2 or later; Windows Server 2003 R2 Standard Edition/Enterprise Edition SP2 or later; Windows Server 2008 Standard Edition/Enterprise Edition (only 32 bit OS is supported) Microsoft Internet Explorer 6 (SP1), 7 with Java Script 1024 x 768 or more TCP/IP must be installed and configured correctly (only IPv4 is supported); 100Mbps or more network speed is recommended; Internet connection is required to use the RFU functions VMware Infrastructure 3 Standard Edition SQL Server 2005 Express Edition SP2 or later;.net Framework 2.0 must be installed before installing SQL Server 2005;.NET Framework 2.0 is not included in the server installer; Please download it using Windows Update or from Microsoft s Web site Apache ; Apache is included in the server installer IIS 6.0 or later; IIS is not included with the server installer; install IIS before installing the server Adobe Flash Player 9.0 or later 6
9 Section 1.0 OnSite Client Hardware Operating Systems CPU: Pentium 500MHz recommended Memory: 128 MB recommended Windows 2000 Professional/Server/Advanced Server SP4 or later; Windows XP Home/Professional SP2 or later; Windows Server 2003 Standard Edition/Enterprise Edition SP2 or later; Windows 2003 R2 Standard Edition/Enterprise Edition SP2 or later; Windows Vista Ultimate/Enterprise/Business/Home Premium/Home Basic; Windows Server 2008 Standard Edition/Enterprise Edition SP2 or later Supported Browser Microsoft Internet Explorer 6 (SP1), 7 Screen Resolution Flash Player 1024 x 768 recommended Adobe Flash Player 9.0 or later Printer and Multi-function Device Requirements Network Protocol TCP/IP Standard MIB Printer MIB (RFC 1759); MIB-II (RFC 1213); Host Resource MIB (RFC 2790) Interfaces 10/100MB Ethernet (802.x.x compatible); Wireless LAN devices (802.x.x compatible); IP over Connector Options Toner Alerts Service Alerts Automated Meter Submission Remote Firmware Upgrade Access to Fleet Reports (for most Ricoh devices) Communicate to atremote.net 7
10 Section 2.0 System Structure of RCG-S Pro with Connector Option RCG-S Pro with Connector Option is an interactive system, allowing data to flow between two main components: 1. The RCG-S Pro software installed on a server at the customer s location. This server acts as a relay unit through which all networked devices (MFPs, printers, copiers) communicate. 2. The Center Communication Server, a Ricoh facility where the RCG-S Pro data is received and hosted. Note that communication to and from the RCG-S Pro server to the Center is limited only technology systems. No other system will communicate with the RCG-S Pro server. Also, no system, including the Center Communication Server, can initiate communication to the RCG-S Pro server. The RCG-S Pro server always initiates outbound communication. 8
11 Section 3.0 Communication Methods and Information Security RCG-S Pro utilizes two communication methods to communicate between devices and the Center Communication Server HTTPS (Hyper Text Transfer Protocol Security) and SNMP (Simple Network Management Protocol). It is also important to note that communication between the RCG-S Pro server and the devices is available in two modes: Monitored or Managed. In Monitored mode the RCG-S Pro server provides AutoDiscovery, automates meter collection/submission and allows access to the atremote.net secure fleet reporting Web portal for discovered devices. Managed mode includes the same capabilities as Monitored mode plus automated alerts for critical service events, automated toner alerts, remote firmware upgrades and Green Reports via the atremote.net Web portal for managed, networkconnected Ricoh devices. 3.1 HTTPS Communication Between RCG-S Pro and Connected Devices HTTPS communication takes two forms: I. Access from devices to the RCG-S Pro server via HTTPS PKI (Public Key Infrastructure). For example, a service emergency alert such as device failure or low toner/toner out. 1. When there is a device alarm, the device initiates authentication in real time via electronic certificate with RCG-S Pro. 2. Devices send device failure call information to RCG-S Pro by HTTPS Post Request. 3. The RCG-S Pro confirms receipt of device failure call information by sending back the result via HTTPS Response. 9
12 Section 3.0 II. Access from the RCG-S Pro server to device via HTTPS PKI. For example, meter counter information and service information (device settings, historical data, etc.) 1. When the RCG-S Pro is initiating, authentication via electronic certificate takes place between RCG-S Pro and the devices. 2. The RCG-S Pro sends the obtain counter information request to devices using HTTPS Post Request. 3. Devices confirm receipt of the counter information request by sending back the meter information via HTTPS Response. HTTPS-related information for connected Ricoh-compatible devices includes: 1. RCG-S Pro to device communication (and vice versa) is in Secure Socket Layer (SSL) format. 2. Data is encrypted. RCG-S Pro supports cipher RC4-MD5 128 bits. However, if the device supports only a DES 56 bits key, the encryption level will be reduced to a DES 56 bits key. This key is created and changed for every session. 3. Both RCG-S Pro and the devices have RSA 512 bit certificates and use security authentication checks. 4. For each communication, a mutual authentication procedure is completed before the data is sent. The RCG-S Pro server recognizes and communicates only with devices that have a printer MIB (Management Information Base). Also, print devices connected to print servers or client PCs are not discovered. 10
13 Section SNMP Communication Between RCG-S Pro and Connected Devices Utilizing SNMP communication, device MIB information is obtained by periodic polling from the RCG-S Pro server to the device. For example, meter counter information and a service emergency alert such as device failure or lower toner/toner out. The default setting for polling is 10 minutes. 1. Devices obtain counter information request OIDs from the RCG-S Pro via SNMP Request. 2. Devices send back their counter information via SNMP Response. 11
14 Section Communication Between RCG-S Pro and the Center Communication Server Only one type of communication method is used between the RCG-S Pro server and the service provider s Center Communication Server an HTTPS Internet connection. As with HTTPS communication between the RCG-S Pro server and connected devices, HTTPS communication between the RCG-S Pro server and Center Communication Server utilizes encrypted data in an SSL format. Both servers perform security authentication checks. Before communicating, a mutual verification procedure is completed before the data is sent. Also, because communication can only be initiated from the RCG-S Pro server to the Center Communication Server, it is not necessary to open an additional port for HTTPS reception from outside the customer s firewall. HTTPS communication utilizes Port 443 (See Appendix 4.2). HTTPS communication is initiated from the RCG-S Pro server to the Center Communication Server for two reasons: I. Critical Service Alerts such as device failure or low toner/toner out. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends device failure call information to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of device failure call information by sending back the result via HTTPS Response. Note: Normally, polling between the RCG-S Pro server and Center Communication Server is performed once an hour. However, when the Center Communication Server receives specific call information (such as a device service call), the polling interval is changed to once a minute. After the Center Communication Server receives a Service Call Reset, the polling interval is reset to once an hour. 12
15 Section 3.0 II. Meter Counter Collection 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends polling information to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of polling information by sending back the result to the RCG-S Pro via HTTPS Response along with further counter information request commands. 5. The RCG-S Pro, when the counter information request commands in the HTTPS Response are processed, responds to the Center Communication Server after initializing mutual electronic certificate authentication. 6. The RCG-S Pro send its response to meter information back to the Center Communication Server via HTTPS Post Request. 7. The Center Communication Server confirms receipt of response by sending back the result via HTTPS Response. 13
16 Section Device Connection Check Between RCG-S Pro and devices via HTTPS: 1. Mutual authentication takes place between RCG-S Pro and the device. 2. An ID2 request is sent from RCG-S Pro to the device via HTTPS Post Request. 3. The device sends back ID2 information to RCG-S Pro via HTTPS Response. Between RCG-S Pro and devices via SNMP: 1. RCG-S Pro performs serial number information request OIDs via SNMP Request. (Ricoh devices provide serial number information. Third-party devices provide a MAC address.) 2. Devices send back serial number information via SNMP Response. 14
17 Section Updating Firmware RCG-S Pro with Connector Option has the ability to update device firmware for Ricoh managed devices via HTTPS broadband Internet connection. In order to do so the following equipment is utilized: The Center Communication Server, which manages communication between RCG-S Pro and devices, obtains the required firmware version, and completes updates on the requested implementation date.* The RCG-S Pro Server to acquire firmware data from the Ricoh Global Server and transfer the data to the target device. The Ricoh Global Server to warehouse the firmware versions. The device for the firmware update. * Firmware updates can be implemented at any specified time, such as after working hours. One or multiple firmware versions can be upgraded or downgraded in a scheduled session. The request to update device firmware process is as follows: 15
18 Section 3.0 Steps 1 & 2 RCG-S Pro initiates communication to the Center Communication Server to request any device firmware updates. The Center Communication Server responds to the RCG-S Pro server for a list of target devices requesting firmware updates and the date of the scheduled update. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends polling to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of polling by sending back the request to update firmware information via HTTPS Response. 5. The RCG-S Pro sends a response to the request to update firmware to the Center Communication Server via HTTPS Post Request. 6. The Center Communication Server sends an HTTPS Response. Note: Communication between RCG-S Pro and the Center Communication Server is initiated only by the RCG-S Pro. Step 3 When the date of the scheduled update is reached, RCG-S Pro acquires the firmware data from the Ricoh Global Server via the Center Communication Server. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 16
19 Section RCG-S Pro sends a request for firmware information to the Ricoh Global Server via HTTPS Get Request. 4. The Ricoh Global Server confirms receipt of request for firmware data by sending back the result to the RCG-S Pro via HTTPS Response along with further firmware data request commands. Note: It is not necessary to open a port for HTTPS reception from outside the customer s firewall because the Center Communication Server is not initiating communication through the customer firewall. Steps 4 & 5 For access from RCG-S Pro to devices, RCG-S Pro sets up the device ID and password via FTP login. A connection is made when the ID and password are correct. Updated firmware is then sent to the device via FTP and a response is sent if the firmware data was received. The device also sends a boot notification to the RCG-S Pro server to automatically reboot after the firmware update. 1. Send ID and password via FTP login. 2. Connection is made when ID and password are correct. 3. Send firmware data to the device via FTP. 4. Receive response if firmware data was received via FTP. 5. When there is a device alarm, the device initiates authentication via electronic certificate with RCG-S Pro. 6. Devices send boot notification information to RCG-S Pro by HTTPS Post Request. 7. RCG-S Pro confirms receipt of boot notification information by sending back the result via HTTPS Response. 17
20 Section 3.0 Step 6 RCG-S Pro sends the results of the firmware update to the Center Communication Server. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. The RCG-S Pro sends notification of the results of updating the firmware version of the device to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of response to the notification of the results of updating the firmware version of the device by sending back the result to the RCG-S Pro via HTTPS Response. 3.6 AutoDiscovery With AutoDiscovery, the RCG-S Pro can automatically discover network-connected devices and with Connector Option encrypt and send information (e.g. Printer MIB, meter data) to the Center Communication Server via a secure HTTPS connection. RCG-S Pro collects device information from devices which are specified by identifying selected network segments in the Discovery Settings menu of the user interface for RCG-S Pro. The following intervals can be set for RCG-S Pro AutoDiscovery: Execution interval Set value Note Once per day Time: 0:00 23:59 Example: 13:00 Once per week Day: Sunday Saturday Example: 12:00, Sunday Time: 0:00 23:59 Once per month Day of month: 1 28th Example: 9:00, the 20th Time: 0:00 23:59 Note: The factory default setting is Not Used. If the device is without electrical power or is not connected to the network, no device information will be obtained. 18
21 Section 3.0 Traffic utilization with the RCG-S Pro server is also negligible. Traffic Size & Communication Timing via SMNP for Meter Data Between Device & RCG-S Pro Between RCG-S Pro & Center Communication Server Approx 4 KB or less per device traffic size User set communication timing Approx. 4 KB or less per message traffic size* Approx. 8 KB after the device data is captured *Data size is doubled when using SSL communication. SNMP The AutoDiscovery process between the RCG-S Pro server and device is shown below. Device MIB information is obtained from periodic RCG-S Pro to device polling. 1. Devices obtain counter information request OIDs from RCG-S Pro via SNMP Request. 2. Devices send back their counter and device information via SNMP Response. 19
22 Section 3.0 HTTPS The following diagram depicts the procedure to securely transmit stored device data on the RCG-S Pro server to the Center Communication Server. The device information acquired via SNMP is stored with RCG-S Pro temporarily and then notified collectively by the following procedures for every ten devices. 1. RCG-S Pro initiates communication. 2. Mutual authentication via electronic certificate takes place between RCG-S Pro and the Center Communication Server. 3. RCG-S Pro sends polling information to the Center Communication Server via HTTPS Post Request. 4. The Center Communication Server confirms receipt of polling information by sending back the result to the RCG-S Pro via HTTPS Response along with further counter information request commands. 5. RCG-S Pro, when the counter information request commands in the HTTPS Response are processed, responds to the Center Communication Server after initializing mutual electronic certificate authentication. 6. RCG-S Pro sends its response to counter information back to the Center Communication Server via HTTPS Post Request. 7. The Center Communications Server confirms receipt by sending back the result via HTTPS Response. AutoDiscovery Network Security Security Concern HTTPS Security Threat? Reason Attack from outside of customer s network NO No HTTPS server at customer location. Communication can only be initiated by RCG-S Pro from behind the customer firewall. Customer data security including: NO All data is transmitted in SSL protocol Unauthorized access only after both ends verify each other s identity and only to the address specified Malicious data interference at setup. The data itself is also encrypted Illicit network monitoring (cipher RC4-MD5 128 bits). 20
23 Section 4.0 Appendix Appendix 4.1 Device Information Information obtained during the AutoDiscovery process: Select meter counters Controller/NIC version Model and vendor name MAC/Serial number IP address Advantages Information Obtained Device Details Reduces downtime Alert Firmware Device failure call (jam, cover open, etc.) Controller/NIC version Automated counter checking Counter Total/copier, fax, printer/black & white, color counter Toner alert Toner low, Staples out Toner end/near end Device monitoring Device information Model name, vendor name, IP address, etc. 21
24 Section 4.0 Appendix Protocols and Open Ports RCG-S Pro Port Usage and Communication Methodologies No. Occasion Communication Direction Port. No. Protocol Type 1 RCG-S Pro is connecting to device by FTP. 2 RCG-S Pro is sending firmware information. 3 RCG-S Pro is capturing MIB information from device. RCG-S Pro = > Device 20 FTP TCP RCG-S Pro = > Device 21 FTP TCP RCG-S Pro = > Device 161 SNMP UDP* 4 RCG-S Pro is sending notification to Center Communication Server via HTTPS. RCG-S Pro = > Center Communication Server 9443 HTTPS TCP Device is sending notification such as emergency call. CE/Service Technician is operating RCG-S Pro via laptop. RCG-S Pro is requesting firmware information. 5 RCG-S Pro is capturing device information. 6 RCG-S Pro tries to communicate with device for the first time. Device = > RCG-S Pro CE s Laptop = > RCG-S Pro RCG-S Pro = > Center Communication Server RCG-S Pro = > Device 7443 HTTPS TCP RCG-S Pro = > Device 7444 HTTPS TCP *User Datagram Protocol Open Ports and Communication Methodologies Communication No. Type 1 Device is sending notification such as Emergency Call. Communication Direction Port. No. Protocol Type Device = > RCG-S Pro 9443 HTTPS TCP CE/Service Technician operates RCG-S Pro via laptop. CE s Laptop = > RCG-S Pro 22
25 Section 4.0 Appendix 4.3 Cryptographic Algorithms of HTTPS Figure 1 below shows SSL negotiation with mutual authentication, client authentication and server authentication. Steps are detailed on the following page. REMOTE COMMUNICATION GATE (CLIENT) COMMUNICATION SERVER (SERVER) Client private key Certificate: RSA-512 Client public key Certificate: RSA-512 CA public key Certificate: RSA-512 Server private key Certificate: RSA-512 Server public key Certificate: RSA-512 CA public key Certificate: RSA-512 (1) SSL version, Seed (random number),supported cipher suite (2) SSL version, Seed (random number), Session ID, Cipher used in the conversation (3) Server Certificate (4) Client Certificate Request (5) Server Certificate Verify (6) Client Certificate (7) Pre master secret (Random number) generation (8) Pre-master secret (9) Sign to data using client private key (10) Data with signature (11) Session Key generation Cipher RC4-MD5 128 bits (RCG-S Pro V3.34 or later) with two seeds and pre master secret (12) Client Certificate Verify Session Key generation Cipher RC4-MD5 128 bits (RCG-S Pro V3.34 or later) (13) Finished (14) Finished/Session Start Figure 1: SSL Handshake Change Cipher Protocol 23
26 Section 4.0 (1) The first step in the process is for the client to send the server a Client Hello message. This hello message contains the SSL version and the cipher suites the client can talk and seed of random number. The client sends its maximum key length details at this time. (2) The server returns the hello message with one of its own in which it nominates the version of SSL and the ciphers and key lengths to be used in the conversation, chosen from those offered in the client hello. (3) The server sends its digital certificate to the client for inspection. (4) The server sends a client certificate request after sending its own certificate. (5) The client verifies the server certificate. (6) The client sends its certificate. (7) The client generates a pre master secret and encrypts it using the server's public key. (8) The client sends a pre master secret to the server. (9) The client signs to data using client secret key. (10) The client sends a certificate verify message in which it encrypts a known piece of plaintext using its private key. The server uses the client certificate to decrypt, therefore ascertaining the client has the private key. (11) The client generates a session key with two seeds and pre master secret. (12) The server verifies the client certificate. The server decrypts pre master secret using server private key, and generates a session key. (13) The client now sends a Finished message using the new key to determine if the server is able to decrypt the message and the negotiation was successful. (14) The server sends its own Finished encrypted message using the key. If the client can read this message then the negotiation is successfully completed. RCG-S Pro and the Center Communication Server have a 512 bit certificate. Therefore an RSA 512 bits cipher suite is used. For RCG-S Pro Ver and later an RC4-MD5 128 bits cipher is used for encryption. When HTTPS method is selected, the session key (i.e. the encryption key for HTTPS) is created each and every time. 24
27 Section 4.0 Appendix 4.4 Network Traffic and Communication Timing Traffic Size & Communication Timing (By Device Type & Purpose) Between Device & RCG-S Pro Between RCG-S Pro & Center Communication Server SNMP Communication Meter Date Server Traffic Size Approx 4 KB or less per device before encryption Approx 80 KB or less per message (depending on the # of devices) Communication Timing Every 24 hours polling as default Daily/weekly/monthly (On the meter reading due date)/18:00-10:00 local time Failure Supply Call Traffic Size Approx 4 KB per device Approx 8 KB per device Communication Timing Every 10 minutes polling as default Real-time (right after Failure Call/Supply Call is captured) Device Connection Check when Disconnected Traffic Size Communication Timing Approx 1 KB per disconnected device Search for the disconnected device every 12 hours HTTPS Communication Device Meter Data Traffic Size Approx 160 KB per device Approx 1.5 MB or less per message (depending on the # of devices) Communication Timing Every 24 hours polling as default Daily at random times Service Call/Supply Call Traffic Size Approx 100 KB per device Approx 10 KB per device Communication Timing Real-time Real-time Firmware Update Traffic Size Avg. 6 MB (Max 16 MB per firmware) Avg. 6 MB (Max. 16 MB per firmware) Communication Timing Specified date and time Specified date and time Device Connection Check when Disconnected Traffic Size Communication Timing Approx 1 KB per disconnected device Search for the disconnected device every 12 hours Note: Although RCG-S Pro executes a connection check and collects device information from monitored devices, only data from managed devices is sent to the Center Communication Server. 25
28 Section 5.0 Frequently Asked Questions Q1. Should the RCG-S Pro be installed in a special location? A. The RCG-S Pro does not require any specific location. Install it where you would IT servers. Q2. How are RCG-S Pro settings protected? A. Access is user name and password protected. Q3. Should power to the RCG-S Pro normally be left on? What about power to devices? A. Leave the server powered on, so the RCG-S Pro can collect device data at the times specified during setup. Also, because it should remain connected, the RCG-S Pro is a server PC. Make sure main power switches on devices are on (a device s status cannot be read if its main power is switched off). Q4. How can I turn off the RCG-S Pro? A. 1. Double-click C:Program Files RMWSDMEX tool atremote_stop_manual.bat to stop service in the server PC. 2. Confirm by Services in Server Manager that service (DH AtRemoteService) is stopped. 3. Shut down Windows by the normal procedure. 4. Unplug or turn off the power switch. Q5. How can I turn on the RCG-S Pro? A. 1. Plug in or turn on the server s power switch. 2. Start up Windows by the normal procedure. Note: Wait for about 30 seconds after Windows starts up, because you must wait until RCG-S Pro is started and in standby. 3. Double-click C: Program Files RMWSDMEX tool atremote_start_auto.bat to start service in the server PC. 4. Confirm by Services in Server Manager that service (DH AtRemoteService) is started. Q6. Is data that is sent out over the Internet secure? A. Yes, because it is transmitted in SSL protocol after both ends verify each other s identity, and only to the address specified at setup. Also, for further security, the data itself is encrypted between the device, RCG-S Pro and the Center Communication Server (encryption level is at cipher RC4-MD5 128 bits). Communication between RCG-S Pro and the Center Communication Server uses the form initiated by RCG-S Pro. Communication is never initiated from the Center Communication Server. 26
29 Section 5.0 Q7. What kind of data is received from the Center Communication Server? A. When the Center Communication Server requires device information it sends a request (status sense) for it. Q8. Can system communicate into the RCG-S Pro? A. Initiated communication is from RCG-S Pro: To go through the firewall, the Center Communication Server must send necessary information in reply to the signals sent regularly from the RCG-S Pro (frequency specified at setup).* * Communication is not initiated by the Center Communication Server. Q9. Can viruses enter the user network when communicating over the Internet? A. No, because communication occurs only within the limits of RCG-S Pro and the Center Communication Server. Also, the data is sent in SSL protocol after mutual authentication (virus checks are carried out before sending). Q10. How many devices can RCG-S Pro monitor and manage? A. Up to 5,000 managed devices can be registered to the Center Communication Server. For AutoDiscovery, RCG-S Pro can monitor and manage a total of 5,000 devices per instance, including those devices registered to the Center Communication Server. Q11. What about traffic size on the user network and its communication timing? A. Traffic size and its communication timing will differ depending on the communication data type. Please refer to Appendix 4.4 for the detailed traffic size and its communication timing. Q12. Is there any chance of obtaining the customer's server or client PC s information via RCG-S Pro? A. No. Information on the customer's server or client PC is never obtained via RCG-S Pro. Q13. Does RCG-S Pro support a Token Ring environment? A. No, it does not. 27
30 Ricoh Americas Corporation, Five Dedrick Place, West Caldwell, NJ Ricoh and the Ricoh logo are registered trademarks of Ricoh Company Ltd. All other trademarks are the property of their respective owners.
White Paper. 2005, Ricoh Corporation
White Paper This guide is intended solely for the use and information of Ricoh Corporation, its designated agents and their employees. The information in this guide was obtained from several different
More information@ Remote. Intelligent Remote Management System for the Network Connected Printing Devices. White Paper (External Appliance Type)
@ Intelligent Management System for the Network Connected Printing s White Paper (External Appliance Type) Version 6.00 June.15th,2006 Copyright c 2004-2006 Ricoh Company, Ltd. All rights reserved. Update
More informationSecurity for Streamline NX Secure Print Manager White Paper
11/2/2011 Technical Information: Security for Streamline NX Secure Print Manager White Paper Document Version 1.2 Copyright 2011 RICOH Americas Corporation. All rights reserved. Page 1 of 16 Visit our
More informationSecurity White Paper For GlobalScan NX Version 1.5
10/12/2011 Security White Paper For GlobalScan NX Version 1.5 Copyright 2011 RICOH Americas Corporation. All rights reserved. Page 1 of 14 Visit our Knowledgebase at: http://www.ricoh-usa.com/support/knowledgebase.asp
More informationeasy ntelligent convenient GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows
GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows easy convenient Server 5/Server 32/Server 750 ntelligent Ricoh GlobalScan NX Server 5/Server 32/Server
More informationWeb Point and Print White Paper
07/26/2010 Technical Information: White Paper Document Version 1.0 Copyright 2010 RICOH Americas Corporation. All rights reserved. Page 1 of 9 Visit our Knowledgebase at: http://tsrc.ricoh-usa.com/ref/faq.asp
More informationFacilities Manager Technical Overview
Facilities Manager Technical Overview Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfillment and report service
More informationInfinite Device Management
Infinite Device Management Version: Date: 18 04-Dec-2018 15:18 Table of Contents Infinite Device Management Features...................................... 3 Minimal software to install......................................................
More informationHP E-PCM Plus Network Management Software Series Overview
Overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security and extensibility
More informationDolby Conference Phone 3.1 configuration guide for West
Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San
More informationSecuring Mainframe File Transfers and TN3270
Securing Mainframe File Transfers and TN3270 with SSH Tectia Server for IBM z/os White Paper October 2007 SSH Tectia provides a versatile, enterprise-class Secure Shell protocol (SSH2) implementation for
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationComplete document security
DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important
More informationXerox Device Data Collector 1.1 Security and Evaluation Guide
Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation
More informationSecurity Testing Summary of Konica Minolta bizhub vcare 2.8 Device Management and Communications System and Various bizhub Products
Security Testing Summary of Konica Minolta bizhub vcare 2.8 Device Management and Communications System and Various bizhub Products SR140630B July 2014 Miercom www.miercom.com Overview Konica Minolta Business
More informationQuickSpecs HP ProCurve Manager Plus 3.1
Overview HP ProCurve Manager Plus is a Microsoft Windows-based network management platform that enables mapping, configuration, and monitoring. HP ProCurve Manager Plus provides security and extensibility
More informationUser's Guide. 1 Pre-operation Confirmation 2 Login and Logout 3 Displaying Device Information 4 Downloading and Installing Packages 5 Appendix
User's Guide 1 Pre-operation Confirmation 2 Login and Logout Displaying Device Information 4 Downloading and Installing Packages 5 Appendix Read this manual carefully before you use this product and keep
More informationIBM SmartCloud Notes Security
IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM
More informationSecurity Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1
Security Guide: For the safety use of Digital Multifunction Printer (Digital MFP) Version 1.1 January 10, 2018 Security Measures for Introduction Ensure the following settings before introducing a product.
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationHP ProCurve Manager Plus 3.0
Product overview HP ProCurve Manager Plus is a Microsoft Windows-based network management platform that enables mapping, configuration, and monitoring. HP ProCurve Manager Plus 3.0 provides security and
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationHPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide
HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide Abstract This guide provides information about developing encryption key management processes, configuring the tape autoloader
More informationSecure Login for SAP Single Sign-On Sizing Guide
PUBLIC SAP Single Sign-On Document Version: 1.1 2018-07-31 Secure Login for SAP Single Sign-On 3.0 - Sizing Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduction....3
More informationHPE Intelligent Management Center
HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for
More informationHP S1500 SSL Appliance. Product overview. Key features. Data sheet
HP S1500 SSL Appliance Data sheet Product overview The HP S1500 SSL Appliance provides hardware-accelerated Secure Sockets Layer (SSL) offloading and bridging to enable high-performance intrusion prevention
More informationemarketeer Information Security Policy
emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service
More informationRICOH MP 501SPF/ MP 601SPF
Multifunction B&W RICOH MP 501SPF/ MP 601SPF Printer Copier Facsimile Scanner MP 501SPF 52 ppm monochrome MP 601SPF 62 ppm monochrome Frequently Asked Questions Ricoh USA, Inc. 70 Valley Stream Parkway
More informationHP Device Connect - Software Lite Technical Quick Specs
HP Device Connect - Software Lite Software Release Version: 4.4 Document Version: 1.3 Document Release Date: January, 2016 Document Last Update Date: December, 2016 Software Release Date: December, 2016
More informationIDM Technical Overview
IDM Technical Overview Infinite Device Management Features Minimal software to install Infinite Device Management uses a small software program called the Information Collection Engine to perform periodic
More informationViewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418
This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help
More informationAutomated Meter Collection Software Powered by FMAudit
Overview The powered by FMAudit suite of products deliver an enterprise class managed print solution that is very easy to use and deploy. It is architected and designed to take advantage of the advanced
More informationSecurity Guide SAP Supplier InfoNet
SAP Supplier InfoNet Table of Contents 1 About this document....3 2 Network and communication security....4 2.1 Network security....4 2.2 Communication channel security....4 2.3 Network resource security....4
More informationSystem Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements
System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the
More informationIt is also available as part of the HP IS DVD and the Management DVD/HPSIM install.
Overview The HP is a web-based interface that consolidates and simplifies the management of individual ProLiant and Integrity servers running Microsoft Windows or Linux operating systems. By aggregating
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationUser s Guide: Applied Functions
User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1
More informationHPE Aruba Airwave Installation and Startup Service
Data sheet HPE Aruba Airwave Installation and Startup Service Support Services HPE Installation and Startup Service for select Aruba Airwave products coordinates installation, configuration, and verification
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationPageScope Enterprise Suite Ver. 3.1 Installation Guide
PageScope Enterprise Suite Ver. 3.1 Installation Guide Enterprise Suite Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic functions... 1-1 1.1. Add-on (extension) applications...1-1.1.3
More informationRevised September 2011 Broadband Access Agreement for BIT Communications
Revised September 2011 Broadband Access Agreement for BIT Communications 1 This Broadband Access Agreement for BIT Communications High Speed Internet serves as a confirmation and acknowledgment of the
More informationHP JetAdvantage Security Manager. User Guide
HP JetAdvantage Security Manager User Guide Copyright 2017 HP Development Company, L.P. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under
More informationUser's Guide Applied Functions
User's Guide Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-3 1.2.1
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationWireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A
Wireless USB 2.0 1-Port Multi-Functional Printer Server Model # AMPS240W User s Manual Ver. 1A Table of Contents 1 Introduction...3 1.1 Package Contents... 3 1.2 System Requirements... 3 2 Multi-Functional
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationXerox Audio Documents App
Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,
More informationBelarc Product Description
Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery
More informationMcAfee Network Security Platform
Revision B McAfee Network Security Platform (8.1.7.5-8.1.3.43 M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationManual Version: V1.00. Video Decoder User Manual
Manual Version: V1.00 Video Decoder User Manual Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. Copyright Copyright 2016 Zhejiang
More informationTable of contents. Security and privacy white paper. Technical white paper HP Partner Link Pay-per-use Portal 1. About this white paper
Technical white paper HP Partner Link Pay-per-use Portal 1 Security and privacy white paper Table of contents About this white paper White paper summary What is the HP Partner Link Pay-per-use Portal?
More informationInformation Security in Corporation
Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationKYOCERA Net Viewer User Guide
KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationSolarWinds Engineer s Toolset Fast Fixes to Network Issues
DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.
More informationA guide to CLARiSUITE TM network solutions
Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management
More informationSafe Place and Code Alert Customer Information Technology Requirements Series 10.x Software
Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part
More informationTP-LINK TD-W9970 Wireless ADSL2+ Modem Router
Welcome to ACN This guide is designed to help you connect your new ACN ADSL Broadband service. Your modem has been pre-configured to simply Plug n Play so you ll be up and running in no time. Once you
More informationR M S N e t w o r k :
RMS NETWORK WHITE PAPER AMX R M S N e t w o r k : T e c h n o l o g y W h i t e P a p e r Table of Contents Table of Contents 2 Overview: 3 Resource Management Suite (RMS) Requirements: 4 RMS Network Configuration:
More informationTracking and Reporting
Secure File Transfer Tracking and Reporting w w w. b i s c o m. c o m 321 Billerica Road, Chelmsford, MA phone: 978-250-1800 email: sales@biscom.com EXECUTIVE SUMMARY The Internet has made it easier than
More informationNMS300 Network Management System Application
NMS300 Network Management System Application Quick Start Guide October 2013 202-11288-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing
More informationWorldExtend Environment Preparation Guide
WorldExtend Environment Preparation Guide WorldExtend IronDoor Version 3.5 WorldExtend, LLC. Published: March 2008 Abstract This guide explains how to prepare your application environment for WorldExtend
More informationMIU-1000 v. Revised: 4/20/2009. Copyright 2008, Traf-SYS, Inc.
MIU-1000 v 2.6g Revised: 4/20/2009 Copyright 2008, Traf-SYS, Inc. Contents Introduction... 3 Setting up your MIU-1000 for the first time... 3 Connections... 3 Connecting with a Serial Cable... 3 Connecting
More informationCLIQ Remote - System description and requirements
CLIQ Remote - System description and requirements 1. Introduction CLIQ Remote - Access at a distance CLIQ Remote is an electromechanical lock system with an additional level of security and flexibility,
More informationEquitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation
Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012
More informationCourse overview CompTIA A Official Study Guide
Course overview CompTIA A+ 220-801 Official Study Guide (G183eng ver092) Overview CompTIA A+ courses are intended for students wishing to qualify with CompTIA A+ Certification. A+ certification is designed
More informationThe SafeNet Security System Version 3 Overview
The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products
More informationKMnet Viewer. User Guide
KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be
More informationGFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationCODE ALERT Enterprise Software Customer Information Technology Requirements
CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More informationQuickSpecs Insight Manager 7 Service Pack 2
Overview Product Description Insight Manager 7, the core of the ProLiant Essentials Foundation Pack, maximizes system uptime, reduces total cost of ownership, and provides powerful monitoring and control
More informationQuick Start Guide. W-118 Access Point. Arista Networks. DOC
Quick Start Guide W-118 Access Point Arista Networks www.arista.com DOC-03485-01 Headquarters 5453 Great America Parkway Santa Clara, CA 95054 USA + 1 408 547-5500 www.arista.com Support +1408547-5502+
More informationHP Web Jetadmin Report Generation Plug-in
HP Web Jetadmin Report Generation Plug-in HP Web Jetadmin Report Generation Plug-in Reference Manual Copyright notice 2006 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation
More informationGoverlan Remote Administration Suite
manage IT complexity simply REMOTE ADMINISTRATION SUITE Goverlan Remote Administration Suite IT Governance made easy Get broad-scope, enterprise-level administration of your users & machines along with
More informationQuickSpecs HP Insight Rapid Deployment software 6.0
Overview HP Insight Rapid Deployment software is a complete deployment solution for ProLiant and Integrity servers. HP Insight Rapid Deployment software automates the process of deploying and provisioning
More informationSecuring Access to Network Devices
Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard
More informationA Guide to Closing All Potential VDI Security Gaps
Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse
More informationUser Guide Supplement Measurement Systems International
MSI-9850 Ethernet Option User Guide Supplement Measurement Systems International Integrated System Solutions for Industrial Weighing and Process Control Table of Contents Introduction...4 Quick Start...4
More informationHP PageWide Managed Color P75250dn Firmware Readme
HP PageWide Managed Color P75250dn Firmware Readme Product Name(s): HP PageWide Managed Color P75250dn Model Number(s): Y3Z49A This document contains information for the firmware revision number: Firmware
More informationDesigning Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS)
Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS) January 2009 1 January 2009 Polycom White Paper: Complying with PCI-DSS Page 2 1.
More informationPrint Server Appliance
Print Server Appliance Easily manage your organization s network printing with Canon s Print Server Appliance. Canon s Print Server Appliance (PSA) is a Windows 2000 turnkey server appliance designed to
More informationAW-HE40 / HE65 Firmware Update Procedure
AW-HE40 / HE65 Firmware Update Procedure Please be sure to read this first. The update of AW-HE40/ HE65 camera is performed via a network from Web setting screen on PC. There might be accidents in the
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationConnectware Manager Getting Started Guide
Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi
More informationEquitrac Integrated for Konica Minolta
Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac
More informationProtect enterprise data, achieve long-term data retention
Technical white paper Protect enterprise data, achieve long-term data retention HP StoreOnce Catalyst and Symantec NetBackup OpenStorage Table of contents Introduction 2 Technology overview 3 HP StoreOnce
More informationAW-HE50 Firmware Upgrade Procedure
AW-HE50 Firmware Upgrade Procedure Please be sure to read this first. AW-HE50 Upgrade Procedure July 2013 The update of AW-HE50 camera is performed via a network from Web setting screen on PC. There might
More informationCisco Unified Serviceability
Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified
More informationVMware View Upgrade Guide
View 4.0 View Manager 4.0 View Composer 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for
More informationXerox Mobile Print Solution
Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright
More informationQuickSpecs HP Insight with Microsoft System Center Essentials 2010
Overview HP Insight with Microsoft System Center Essentials 2010 integrates management of your physical and virtual IT environmentsincluding servers, PCs, storage, networking devices and software-using
More informationSNMP: Simplified. White Paper by F5
The Simple Network Management Protocol defines a method for managing devices that connect to IP networks. The "simple" in SNMP refers to the requirements for a managed device, not the protocol. This white
More informationGoogle Cloud Platform: Customer Responsibility Matrix. December 2018
Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
More informationHP Designjets and HP Security Features
HP Designjets and HP Security Features Overview and solutions for managing Security features in HP Designjets using the printers Embedded Web Server technology, Front Panel and Web Jetadmin Table of contents
More informationHP SmartTracker. Installation guide
HP SmartTracker Installation guide Edition 1 Copyright 2017 HP Development Company, L.P. Legal notices The information contained herein is subject to change without notice. The only warranties for HP products
More informationPageScope Net Care Device Manager Ver. 2.0 User s Guide
PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration
More informationNetwork Management Card. User Manual
User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1
More informationStruxureWare TM. Data Center Expert. Data Center Infrastructure Management (DCIM) Software
StruxureWare TM Data Center Expert Data Center Infrastructure Management (DCIM) Software End to end data center infrastructure management software for monitoring and control of power, cooling, security
More information