KYOCERA Fleet Services KFS Connection Method Guide

Introduction

KFS can connect to devices in a variety of ways. This document will help you find the best connection method for customer requirements.

Revision history

VersionRelease DateRevision
1.00June 19, 2024First release

Connection method

List of Connection Methods

The following outlines a list of device connection methods.

Connection MethodManageable DeviceNumber of connectionsCommunicationProtocolOperation (Functionality)
KFS Direct (With Manage mode)-IndividuallyBi-directionalHTTPS, XMPP/MQ TTAll operations available
KFS Direct (With Monitor mode)-IndividuallySingle way communication, device to serverHTTPSOnly monitor the device
NetGatewayUp to 2000UnifiedSingle way communication, device to serverHTTPSMonitor the device Support part of operation
NetGateway connected USB devicesUp to 2000UnifiedSingle way communication, device to serverHTTPSMonitor the device Support part of operation

Diagram Description: A network diagram illustrates the connection architecture. It shows a central KFS Manager connected to a NetGateway, which then connects to devices via a Customer Intranet. Devices can be KFS Direct (via Proxy Server in NetGateway), USB-connected Devices, or Legacy & Competitor Devices. The diagram also depicts a Firewall and a Proxy Server.

Recommended Connection Method

The recommended connection method for customer requirements is as follows:

Customer requirementsRecommended connection methodDescription
Communication Path Requirements
No restriction.
(Allow individual communication with devices.)
KFS DirectSimplest connection method to communicate directly with the device to KFS.
Communication direction requirements
Restrict access from outside.
With Monitor modeWhen Connection mode is set to Monitor mode, only device data collection is performed.
Perform remote maintenance.With Manage modeWhen Connection mode is set to Manage mode, remote maintenance can be performed in addition to device data collection.
Connecting competitor devices or legacy devices.NetGatewayIf a NetGateway has many managed devices, polling of device data may fail depending on the polling timing. For example, if a customer prints daily, the device information is updated daily, so those devices fall into the high priority category. If a customer manages these devices and the device is only turned on during normal work hours (8 hours per day), the number of connections to a single NetGateway must be kept under 600 devices (polling interval: 6 hours). If customers print infrequently and their devices fall into the low priority category, the number of connections to a single NetGateway must be kept under 200 devices (polling interval: 2*4=8 hours). If you set up to have multiple NetGateways to separate managed devices so that the polling interval is longer than the device turned ON interval it will be faster.
Do not allow the device to connect to the network.NetGateway connected USB devicesConnect the USB cable between the NetGateway PC (Local Agent PC) and the device.

NetGateway connected USB Device Settings

Add a device connected to the NetGateway PC (Local Agent PC) with a USB cable.

NetGateway Settings

Install the local agent (KyoceraAgent.msi) on the PC that will be USB connected to the device.

Screenshot Description: A screenshot shows the NetGateway interface with options for Monitoring, Settings, and Admin. Under Settings, a dropdown menu includes 'Proxy settings', 'KFS device connection mode', 'Task execution setting', 'Download local agent', 'Copy local agent URL', 'Automatic upgrade', 'Update interval', and 'Logs'.

NetGateway - Add devices

Screenshot Description: A dialog box for adding devices shows 'Discovery Settings' with 'Discovery method' set to 'By local network'. Target options include IPv4 and IPv6. A checkbox for 'USB devices' is present, with an option to 'Discover USB-connected devices'.

Trouble shooting flow:

Check (Things to Check) details one by one:

Location to checkThings to checkDiscover USB devices
Server/PC where NetGateway is installedMinimum hardware requirements are met
Supported OSs are met
Supported browsers are met
Supported .Net Framework is installed (other settings are default)
Default ports are available (9696/9797/8081)
Server/PC where Local Agent is installedSupported .Net Framework is installed
Local Agent is installed
KX Driver is installed (Test print works)
NetGateway settingsDiscovery settings Discover USB-connected devices are enabled
DeviceDevice is on
Device is awake (Device is not in sleep mode)
EnvironmentTemporary disable some firewall or it's rules, antivirus software, etc.(if possible)

Connection setting

Checklist Overview for Device Discovery/Registration/Online

Settings/ConfigurationsAll models RequiredSpecific Models RequiredNote: Remote Panel case Required
Device - Security Settings
Certificate VerificationHASH: SHA2 Enabled-
Server-side SettingsTLS Version: TLS1.2 Enabled-
HASH: SHA2 Enabled--
Client-side SettingsTLS Version: TLS1.2 Enabled-
HASH: SHA2 Enabled--
Device - Device Settings
Date/TimeWithin valid date/time range of certificate in KFS Server--
Device - Network Settings
Proxy SettingsCompatible with customer's network environment-
ProtocolEnhanced WSD: or Enhanced WSD over SSL: - At least one, Enabled-
Not existed these settings but SSL needed case, Secure Protocols: SSL Enabled-
HTTP/HTTPS: Enabled-
Device - Management Settings
Remote ServicesCorrect information e.g. Access Code, Server URL etc. (Removed insufficient characters like "blank space")-
Settings/ConfigurationsAll models RequiredSpecific Models RequiredNote: Remote Panel case Required
SNMP
SNMPv1/v2c: Enabled--
Read Community: Compatible with NetGateway Discovery and Communication Settings--
Write Community: Compatible with NetGateway Discovery and Communication Settings--
When SNMP v3 is Enabled, then Compatible with NetGateway Discovery and Communication Settings--
Settings/ConfigurationsRequired
NetGateway - Discovery Settings
Communication SettingsSNMP Type: Compatible with Device Settings Secure protocol (SSL): Compatible with Device Settings Device login: Compatible with Device Settings, valid User/PW info
PC computer - for Single Point Connection (SPC) Enabled case
Network environmentConfirm that Name resolution works fine in network environment (Register devices with proxy settings "NetGateway installed computer name" as Hostname) Or, Set actual IP address without hostname
Firewall Inbound Rule:Permit specified Port (8081 as default - Possible to change it when NetGateway is first installation)

Model Compatibility

The following tables list models compatible with different settings. √1 indicates models requiring specific settings, √2 indicates legacy models, and a checkmark indicates compatibility with all models.

Color ModelsB&W Models
ECOSYS M5021cdnECOSYS M2135dn, ECOSYS M2635dn, ECOSYS M2635dw, ECOSYS M2040dn, ECOSYS M2540dn, ECOSYS M2540dw, ECOSYS M2640idw, ECOSYS M2735dw
ECOSYS M5520cdw, ECOSYS M5520cdn,
ECOSYS M5521cdn, ECOSYS M5521cdw,
ECOSYS M5525cdn, ECOSYS M5526cdn,
ECOSYS M5526cdw
ECOSYS M2235dn, ECOSYS M2735dn, ECOSYS M2835dw
ECOSYS M6030cdn, ECOSYS M6530cdnECOSYS M3040dn, ECOSYS M3540dn
ECOSYS M3040idn ECOSYS M3540idn, ECOSYS M3550idn, ECOSYS M3560idn
ECOSYS M6035cidn, ECOSYS M6535cidnECOSYS M3145idn, ECOSYS M3645idn
ECOSYS M3660idn ECOSYS M3655idn, ECOSYS M3145dn, ECOSYS M3645dn
ECOSYS M6230cidn, ECOSYS M6630cidn,
ECOSYS M6235cidn, ECOSYS M6635cidn
ECOSYS M4132idn, ECOSYS M4125idn
ECOSYS M8130cidn, ECOSYS M8124cidn
ECOSYS P5020cdw, ECOSYS P5020cdn,
ECOSYS P5021cdn, ECOSYS P5021cdw,
ECOSYS P5025cdn, ECOSYS P5026cdn,
ECOSYS P5026cdw
ECOSYS P2235dn, ECOSYS P2235dw,
ECOSYS P2040dn, ECOSYS P2040dw,
ECOSYS P2235d, ECOSYS P2230dn
ECOSYS P6130cdn, ECOSYS P6035cdn,
ECOSYS P7040cdn
ECOSYS P2335d, ECOSYS P2335dn,
ECOSYS P2335dw
ECOSYS P6230cdn, ECOSYS P6235cdn,
ECOSYS P7240cdn
ECOSYS P3060dn, ECOSYS P3055dn,
ECOSYS P3050dn, ECOSYS P3045dn
ECOSYS P8060cdnECOSYS P4060dn
ECOCYS MA2100cwfx, ECOCYS MA2100cfx,
ECOSYS MA2100cx
TASKalfa 3511i, TASKalfa 3011i
Color ModelsB&W Models
ECOCYS PA2100cwx, ECOCYS PA2100cxTASKalfa 3511i, TASKalfa 3011i
TASKalfa 3060ciTASKalfa 4012i, TASKalfa 3212i
TASKalfa 306ci, TASKalfa 356ci, TASKalfa 406ciTASKalfa 4020i
TASKalfa 307ciTASKalfa 6002i, TASKalfa 5002i, TASKalfa 4002i
TASKalfa 6052ci, TASKalfa 5052ci, TASKalfa 4052ci, TASKalfa 3552ci, TASKalfa 3252ci, TASKalfa 2552ciTASKalfa 8002i, TASKalfa 7002i
TASKalfa 8052ci, TASKalfa 7052ciTASKalfa 9002i

Examples with Screenshots

Device - Security Settings

Certificate Verification: HASH: SHA2 Enabled

Screenshot Description: Security Settings: Network Security interface showing 'Certificate Verification' with 'Validity Period' set to 'On' and 'Hash' set to 'SHA2(256/384)'.

Server-side Settings

TLS Version: TLS1.2 Enabled HASH: SHA2 Enabled

Screenshot Description: Security Settings: Network Security interface showing 'Secure Protocol Settings'. 'TLS Version' is set to 'TLS1.2', and 'Hash' is set to 'SHA2(256/384)'. 'Effective Encryption' options like AES and AES-GCM are visible.

Client-side Settings

TLS Version: TLS1.2 Enabled HASH: SHA2 Enabled

Screenshot Description: Security Settings: Network Security interface showing 'Client-side Settings' with 'TLS Version' set to 'TLS1.2'. 'REST Security' is set to 'Secure Only (REST over SSL)'. 'Effective Encryption' options are listed.

Device - Device Settings

Date/Time: Within valid date/time range of certificate in KFS Server

Screenshot Description: Device Settings: Date/Time interface showing fields for Year, Month, Day, and Time. It displays 'Current Local Time' and 'Current Universal Time (UTC/GMT)'. A certificate information pop-up shows it is valid from 3/25/2020 to 6/24/2022.

Device - Network Settings

Protocol: Enhanced WSD and Enhanced WSD over SSL should be enabled.

HTTP/HTTPS: Enabled

Screenshot Description: Network Settings: Protocol interface showing 'Universal Print', 'SOAP', 'Enhanced WSD', and 'Enhanced WSD over SSL' settings, all enabled. It also shows 'Enhanced WSD over SSL Certificate' and 'LDAP' settings.

Device - Management Settings

Remote Services: Correct information e.g. Access Code, Server URL etc. (Insufficient characters like a “blank-space” were removed)

Screenshot Description: Management Settings: Remote Services interface showing 'Server Settings'. Fields include 'Registration By' (dropdown 'Use Access Code'), 'URL' (input field), 'Proxy' (input field with 'Settings' button), 'Proxy Authentication' (User Name, Password), 'Access Code', and 'Description'.

SNMP

SNMPv1/v2c: Enabled. Read Community: Compatible with NetGateway Discovery and Communication Settings. Write Community: Compatible with NetGateway Discovery and Communication Settings.

When SNMP v3: Enabled. Compatible with NetGateway Discovery and Communication Settings.

Screenshot Description: Two screenshots of Management Settings: SNMP. The first shows SNMPv1/v2c settings with 'Read Community' and 'Write Community' fields. The second shows SNMPv3 settings with options for 'Authentication' (MD5, SHA1), 'Privacy' (DES, AES), 'Read Only User', and 'Read/Write User'.

NetGateway - Discovery Settings

Communication Settings

SNMP Type: Compatible with Device Settings. Secure protocol (SSL): Compatible with Device Settings. Device login: Compatible with Device Settings, valid User/PW info.

Screenshot Description: Two screenshots of 'Communication settings'. The first shows 'SNMP type', 'Read community name', 'Write community name', 'SNMP authentication', 'SNMP privacy', and 'Context name'. The second shows 'Secure protocol (SSL)' enabled and 'Device login' with 'Authentication type' as 'Local authentication' and fields for 'User name' and 'Password'.

PC computer - for Single Point Connection (SPC) Enabled case.

Proxy settings

Screenshot Description: Screenshot of 'Proxy settings' dialog. Options include 'Direct connection' and 'Use HTTP Proxy'. If 'Use HTTP Proxy' is selected, fields for 'Host name', 'Port', and 'Enable authentication' (User name, Password) are shown. A checkbox for 'Use Gateway as a single point of communication' is present.

Network environment

Confirm that Name resolution works fine in network environment. (Register devices with proxy settings "NetGateway installed computer name" as Hostname) or Set actual IP address without hostname.

Screenshot Description: Screenshot of 'Register your devices' section. Fields for 'Access code', 'KFS Manager authentication' (Host name, User name, Password, Description), and 'Do not use proxy settings for the following domains' are shown. A warning about proxy settings overwriting Remote Services firmware is displayed.

Firewall Inbound Rule:

Permit specified Port (8081 as default - Possible to change it when NetGateway is first installed).

Screenshot Description: Screenshot of Windows Defender Firewall with Advanced Security, showing 'Inbound Rules' and 'Outbound Rules'.

Notes for success of Device Discovery/Registration/Online

Additional information on NetGateway

Device information polling

NetGateway periodically polls Alert data, Counter data and Consumable data from each device. This is because NetGateway to Device communication is uni-directional which means there is no Device to NetGateway communication. The polling interval for each device can be changed depending on the number of managed devices (displayed devices) on the NetGateway device list. The more devices you have on KFS, the longer the interval will be between polling. If your NetGateway has a lot of devices, the polling interval can be longer. Also, if the device data (toner level or counter value) is not frequently updated, the priority category will be lower. As a result, the polling interval will be longer and your device will be put into the category depending on the devices registered.

AlertCounter/Consumables
2,000~
1,001
1,000~
301
300~
101
100~
26
25~12,000~
1,001
1,000~
601
600~
201
200~
101
100~2625~1
High Priority Category120 (min)60 (min)15 (min)5 (min)1 (min)24 (hrs.)12 (hrs.)6 (hrs.)2 (hrs.)60 (min)60 (min)
Middle Priority Categoryx2x2x2x21 (min)(Note) Polling must be executed once a day.
Low Priority Categoryx4x4x4x41 (min)(Note) Polling must be executed once a day.

If the target device is turning ON only for a specific time period, normal work hours and the polling interval by NetGateway is longer for the device, the device information polling can fail. In this case, you can solve the problem in two ways:

Authentication type/Authentication information

Authentication type/Authentication information is used for Enhanced WSD communication with the device. Enhanced WSD communication is TCP based communication and can have more stable communication with the device, unlike SNMP (UDP based communication).

To use Enhanced WSD communication, you need to enable Enhanced WSD and/or Enhanced WSD over SSL on the device as shown below (under Network Settings in Command Center).

Screenshot Description: Network Settings: Protocol interface showing 'Universal Print', 'SOAP', 'Enhanced WSD', and 'Enhanced WSD over SSL' settings, all enabled. It also shows 'Enhanced WSD over SSL Certificate' and 'LDAP' settings.

When using Enhanced WSD over SSL, “Secure Only” should be selected as Enhanced WSD Security. You can see the setting on the device shown below (under Security Settings on Command Center).

Screenshot Description: Security Settings: Network Security interface showing 'TLS Version', 'Effective Encryption', 'Hash', 'HTTP Security', 'IPP Security', 'Enhanced WSD Security' (set to 'Secure Only (Enhanced WSD over SSL)'), 'eSCL Security', and 'REST Security'.

If you want to use Enhanced WSD communication for communication with the device, you need to use the same Username and Password with it on the device.

Screenshot Description: Screenshot showing 'Authentication type' options: 'Local authentication' and 'Device settings'. 'Authentication information' fields for 'User name' and 'Password' are displayed.

You can view Authentication type and related Username and Password under Management Settings on Command Center.

Screenshot Description: Management Settings: Authentication interface showing 'Settings' and 'Local User List' with columns for 'Select', 'User Name', and 'Login User Name'. An 'Add User' button is visible.

Also, if Enhanced WSD communication with the device is NOT available, you can check if there is a "Warning” WSD status on NetGateway device list page.

Registration typeWSD statusConnection type
Device (Managed)OKNetwork
Device (Managed)⚠ WarningNetwork
Device (Managed)OKNetwork

If there is an “OK” WSD status, you can enter correct information on Communication settings for target device, and then click “Refresh” button on NetGateway UI. This "Refresh" feature checks NetGateway to see if Enhanced WSD communication is available, based on the configured Communication settings.

Screenshot Description: NetGateway UI showing navigation buttons: 'Add devices', 'Excluded devices', 'Register devices', 'Communication settings', 'Device home', 'Refresh', 'View tasks', 'Manage Device settings', 'Computers'.

Models: Fleet Services, Services

PDF preview unavailable. Download the PDF instead.

KFSConnectionMethodGuideENOG Microsoft Word for Microsoft 365

Related Documents

Preview KYOCERA Device Manager Ver.2.0-2.2 Software Information
Detailed information on KYOCERA Device Manager (KDM) versions 2.0 to 2.2, covering new features, system requirements, supported models, and software updates for efficient device management.
Preview Kyocera ECOSYS P8060cdn Printer Driver User Guide
Comprehensive user guide for the Kyocera ECOSYS P8060cdn printer driver, covering installation, configuration, and advanced features for optimal printing.
Preview Kyocera TASKalfa and ECOSYS Printers: Product Quick Reference Guide
A comprehensive quick reference guide detailing specifications for Kyocera's TASKalfa and ECOSYS series of multifunctional printers and color printers, including print speed, resolution, paper handling, memory, and more.
Preview Kyocera Document Solutions: NASPO ValuePoint Catalog and Offerings
Comprehensive catalog of Kyocera multi-functional devices, printers, software, and cloud solutions available through the NASPO ValuePoint contract, featuring ECOSYS and TASKalfa series products for government and businesses.
Preview KYOCERA Printer Driver User Guide
A comprehensive user guide for the KYOCERA printer driver, covering installation, configuration, and advanced printing features for various ECOSYS and TASKalfa models.
Preview How to Configure Kyocera TWAIN Driver for USB and Network Connections
A step-by-step guide on configuring the Kyocera TWAIN driver for scanner setup via USB and network connections, including setting scanner names, models, and network addresses for models like the ECOSYS M5526cdw.
Preview Kyocera TASKalfa 4012i & 3212i Printer Driver User Guide
Comprehensive user guide for installing and configuring the Kyocera TASKalfa 4012i and 3212i printer drivers. Covers installation methods, driver overview, device settings, quick print options, basic print settings, layout customization, finishing options, imaging, publishing, job management, and advanced settings.
Preview KYOCERA TASKalfa 6053ci/6003i: Potencia, Versatilidad e Integración Directa
Descubra la serie KYOCERA TASKalfa 6053ci/6003i, multifuncionales de alta productividad diseñados para la eficiencia, la versatilidad y la integración directa en entornos empresariales. Conozca sus especificaciones, opciones y capacidades para optimizar su flujo de trabajo.