Ricoh-engineered CAC authentication technology enables system administrators to control access to device functionality. For example, access to Scan-to functions can be limited to only authorized individuals, while the Copier function is unrestricted, i.e., available to all. With full control over device access – by function – the MFP and CAC Application (installed on the MFP) work in concert to address each department’s specific information security requirements.
This article contains steps to capture CAC logs off of Ricoh MFP devices.
Steps and Instructions
To access the CAC Web UI, which resides on the MFP, you must have the Java VM SD Card and CAC Application properly installed on the device (see MFP Installation & Configuration).
1. Open your Web browser.
2. Enter URL: http://MFP IP address:8080/cac/index
3. Enter default User name: admin.
4. Enter default Password: ”blank”.
Note: The user name and password is the same as
used for Web Image Monitor on the target MFP.
5. Click OK.
This section provides information on how to view or download CAC Logs, which are necessary when reporting an operational issue. Important: To download logs, DoD security policies require that you remove the MFP from the DoD network before attaching your laptop. In addition, a crossover cable will be required to obtain the logs.
The following logs are available:
• CAC Log (Display and Download)
• CAC Email/Folder Log (Display and Download)
• All Debug Logs and SDK RLog (obtained using the Ricoh RLog tool available for download from the TSRC website at: http://www.tsrc.ricoh-usa.com/ref/utilities.asp. Instructions for using the tool are included in the download.
Note: The Printer Logs can be obtained from the MFP via Web Image Monitor.
1. To view or download the CAC Log, open CAC Web UI, and then click CAC Log.
2. Select Display CAC Log to view, or click on Download CAC Log to save.
The following RSH command can also be used to capture CAC logs from the device
rsh Device_IP_Address mmesg 125>>c:\logs\125.log
The above command will quietly write a log to disk; you will not see anything on-screen. The path can be whereever you want to store the log. Ctrl+c will end the capture. It is best to start the capture as soon after device bootup as possible, although the RSH connection will depend on when the RSH service starts on the device.
<argument>-s 184.108.40.206</argument> (Server)
<argument>-p 8088</argument> (port)
<argument>-m 60</argument> (Update)
<argument>-a aaa</argument> (PIV/CAC)
<argument>-t true</argument> (Tracing)