Specify ARFU settings as required.

Operating Conditions:

  • ARFU requires connection to the Internet. Be sure to get permission from the customer before setting ARFU up. Otherwise, it may cause an incident.
  • ARFU is available only for machines that contain a HDD. If the machine does not have a HDD, an option HDD must be installed.

  • The connection is one-way, so the user’s data cannot be accessed from the firmware server.

Procedure:
  1. ARFU enable setting
  2. Server connection check
  3. Prohibited date and time setting
(1) Enable ARFU
  1.  Set SP5-886-111 (Auto Update Setting) to "1 (ON)".
     1: ON / 0: OFF (Default)

    To download the firmware only using SFU (Smart Firmware Update), and not by ARFU, specify the settings as follows:
    - SP5-886-111(Auto Update Setting) to "0 (OFF)"
    - SP5-886-115 (SFU Auto Download Setting) to "1 (ON)"

(2) Server connection check
  1.  Enter the SP mode.
  2. Press [Firmware update] > [Update] > [Execute update].
  3. Check if one of the following messages appears: "Will you download the latest package Ver *** and update?" or "The installed package is the latest version.".

    If the message appears, it is possible to execute ARFU. Press “No” and close SP mode to complete the configuration.

    The update will run immediately if you press “Yes” at the message "Will you download the latest package Ver *** and update?"  The update cannot be canceled if it is run by SFU. (The update can be canceled if ARFU is used.)

    SP5-886-116 (Auto Update Prohibit Term Setting) displays the scheduled date and time of the next ARFU.

    If error code 71: [Network connection error] appears when you click “Execute update”, see troubleshooting below.

(3) Prohibited date and time setting

Ask the customer for the prohibited times and days of the week for ARFU execution and set the following as needed. The default prohibited time is from 9 a.m. to 5 p.m. and there is no prohibited day.

  • SP5-886-112 (Auto Update Prohibit Term Setting) Default: 1 (ON)
  • SP5-886-113 (Auto Update Prohibit Start hour) Default: 9
  • SP5-886-114 (Auto Update Prohibit End hour) Default: 17
  • SP5-886-120 (Auto Update Prohibit Day Of Week Setting) Default: 00000000 [00H]
    Set the bits for the days of the week to prohibit updating.
    Prohibited (Monday - Sunday): bit 7, Monday: bit 6, Tuesday: bit 5
    Wednesday: bit 4, Thursday: bit 3, Friday: bit 2, Saturday: bit 1, Sunday: bit 0
    e.g.) Prohibited on Mon., Fri., Sat., and Sun.: 01000111 [47H]

They can be specified also via Web Image Monitor if logged in as the machine administrator from the device if SP5-886-111(Auto Update Setting) is set to "1 (ON)". For details, see Specifying the Time and Day of the Week to Prohibit Updating via Web Image Monitor.

Troubleshooting: If error code 71: [Network connection error] appears

If error code 71: [Network connection error] appears when you click [Firmware update] > [Update] > [Execute update] in SP mode, check the following.

  • 4-1. IPv4 address, Subnet mask of the machine and Gateway IPv4 address
  • 4-2. IPv4 address of the DNS server
  • 4-3. Proxy server settings
  • 4-4. Encryption level setting SP

4-1. IPv4 address, Subnet mask of the machine and Gateway IPv4 address

Check the machine’s IPv4 address, subnet mask, and gateway IPv4 address.

(In User Tools > Machine Features > System Settings > Interface Settings)

4-2. IPv4 address of the DNS server

Check the DNS IPv4 address and check the connection.

(In User Tools > Machine Features > System Settings > Interface Settings > DNS configuration)

How to find the IP address:

Ask the customer to tell you the IP address of the DNS server. If the customer does not know it, ask the customer to check the IP address by one of the following ways:

1. Run "ipconfig / all" at the command prompt on the computer, then check the IP address of the DNS server.

2. Open the IPv4 properties dialog box on the computer, then check whether the IP address setting of the DNS server is manual or automatic.

  • If the setting of the DNS IP address is automatic, select [Auto-Obtain (DHCP)] at the MFP machine's DNS settings.
  • If the setting of the DNS IP address is manual, select [Specify] and specify the DNS server 1 to 3.
  • Press [Connection Test] to check the connection with the input address. Make sure that it is connected successfully.

 

4-3. Proxy server settings

Check the user’s network environment and, as required, specify the proxy server settings in the following SPs:

  • SP5-816-062 (Use Proxy)
    1: Used / 0: Not used
  • SP5-816-063 (Proxy Host)
  • SP5-816-064 (Proxy PortNumber)
  • SP5-816-065 (Proxy User Name)
  • SP5-816-066 (Proxy Password)

If access to the external server is restricted, request the network administrator (customer) to permit the following FQDN name for communication.- FQDN: p-rfu-ds2.support.ricoh.com

They can be specified also via Web Image Monitor if logged in as the machine administrator from the device if SP5-886-111(Auto Update Setting) is set to "1(ON)". For details, see Specifying the Time and Day of the Week to Prohibit Updating via Web Image Monitor.

4-4. Encryption level setting SP

Check SP5-816-087 (Remote Service: CERT:Macro Ver) and make sure the encryption level is [2]: 2048 bit.

If SP5-816-087 is [1]: 512 bit, specify the settings as follows:

1. Initialize the encryption level by executing SP5-870-003 (Common Key Info Writing: Initialize)

2. Rewrite as 2048 bit in SP5-870-004 (Common Key Info Writing: Writing 2048 bit).

3. Turn the main switch off and on.

Make sure to check the conditions before changing the encryption level and do the corresponding workaround. ARFU uses the same certificate as @Remote to communicate with the Global Server. This may cause failure in connecting with the Center Server, if the device is to be installed in the following conditions.

Conditions

1) Customer uses RC Gate Type BN1.

RC Gate Type BN1 does not support 2048 bit encryption level communication with Ricoh devices (HTTPS Managed device). Therefore, the device cannot be registered under RC Gate Type BN 1.

2) Ricoh device (HTTPS Managed) that supports only 512 bit encryption level is registered as an external appliance.

Only one encryption level can be set for an external appliance for its communication with imaging devices. If a 512 bit encryption level Ricoh device (HTTPS Managed) is registered, the external appliance as well as other devices must also use 512 bit encryption even if 2048 bit encryption is supported on those devices.

Workaround

For Condition 1:

Advise your customer to change to the latest appliance that supports 2048 bit encryption level communication.

For Condition 2:

1. Manage the device with embedded RC Gate (2048 bit)

2. Exclude non-supported devices (i.e., those devices that cannot be changed from 512-bit to 2048-bit) from the external appliances, then change the encryption level of external appliances and all managed devices (from 512 bit to 2048 bit).