Security and Management Function Specifications

Firewall Settings

When specifying IP addresses in firewall settings, up to 16 IP addresses (or ranges of IP addresses) can be specified for both IPv4 and IPv6.
When specifying MAC addresses in firewall settings, up to 32 MAC addresses can be specified.

Registration of Certificates (User Signature Keys/Certificates, CA Certificates, S/MIME Certificates)

The algorithms and formats of keys and certificates that can be registered are as follows.
RSA signature algorithm:
SHA-256/SHA-384*1/SHA-512*1
RSA public-key algorithm (key length):
RSA (512 bits/1024 bits/2048 bits/4096 bits)
ECDSA signature algorithm:
SHA-256/SHA-384/SHA-512
ECDSA public-key algorithm (key length):
ECDSA (P256/P384/P521)
Certificate format:
User Signature Keys/Certificates: PKCS#12*2
CA Certificates, S/MIME Certificates: X.509 DER/PEM
File extension:
User Signature Keys/Certificates: p12/pfx
CA Certificates, S/MIME Certificates: cer/pem
Maximum number of registerable certificates:
Keys, Certificates: 5
CA Certificates: 88
*1 Available only when the key algorithm is 1024 bits or more.
*2 Available only when installed by using the Remote UI. A certificate contained in a key must comply with the operating conditions for a CA certificate. A certificate cannot be registered if the file size exceeds 2 MB.

Definition of "Weak Encryption"

When [Prohibit Use of Weak Encryption] in [Encryption Settings] is set to [On], the use of the following algorithms is prohibited. [Encryption Settings]
Hash:
MD4, MD5, SHA-1
HMAC:
HMAC-MD5
Common key cryptosystem:
RC2, RC4, DES
Public key cryptosystem:
RSA encryption (512 bits/1024 bits), RSA signature (512 bits/1024 bits), DSA (512 bits/1024 bits), DH (512 bits/1024 bits)
Even when [Prohibit Key/Cert. with Weak Encryption] in [Encryption Settings] is set to [On], the hash algorithm SHA-1, which is used for signing a root certificate, can be used.

Log Management

The following types of logs can be managed on the machine. Collected logs can be exported in the CSV file format.
Log Type
Log Type
Number Indicated as "Log Type" in the CSV File
Description
Job Log
Job Log
128
Scan logs are not supported. There are three types of logs: Copy Job History, Print History, and Communication History.
Transmission Log
Transmission Log
128
The log contains information related to transmissions.

Import/Export of the Setting Data

See Settings that Can Be Imported and Exported .

Max. Destinations Registered to Address Book

See Address Book Function.

TLS

The following combinations of the TLS version and algorithm are usable:
: Usable     : Not usable
Algorithm
TLS Version
TLS 1.3
TLS 1.2
TLS 1.1
TLS 1.0
Encryption Algorithm
AES-CBC (256bit)
AES-CBC (128bit)
AES-GCM (256bit)
AES-GCM (128bit)
3DES-CBC
CHACHA20-POLY1305
Key Exchange Algorithm
RSA
ECDHE
X25519
Signature Algorithm
RSA
ECDSA
HMAC Algorithm
SHA1
SHA256
SHA384
929S-011