HP 4200n HP Jetdirect Print Servers - Administrator Guide - Page 184

Security Features 184, IP Access Control List, Telnet Control, Authentication and Encryption

Page 184 highlights

Table 7.1 Summary of HP Jetdirect Security Features (2 of 3) IP Access Control List G Specifies up to 10 host systems, or networks of host systems, that are allowed access to the HP Jetdirect print server and the attached network device. G Access is generally limited to host systems specified in the list. G By factory default, host systems that use HTTP (for example, using the embedded Web server or IPP) are not checked against entries in the Access List and are allowed access. However, HTTP host access can be disabled through the embedded Web server. G If the list is empty, then all hosts are allowed access. G Configured on the HP Jetdirect print server using TFTP (Chapter 3), Telnet (Chapter 3), embedded Web server (Chapter 4), or management software. Telnet Control G Telnet may be disabled through the Embedded Web Server (see Chapter 4). Telnet access is not secure. Authentication and Encryption (For full-featured print servers only) G Certificate management for X.509 digital certificates is provided through the embedded Web server, for both client-based and server-based authentication. (Installed certificates are limited to 3KB. A single Certificate Authority (CA) certificate may be installed.) G For wireless print servers, enhanced authentication and wireless encryption methods are supported. For example, support for 802.1x Extensible Authentication Protocol (EAP) and dynamic encryption protocols, including Wi-Fi Protected Access (WPA) protocol, are supported. ENWW Security Features 184

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

ENWW
Security Features 184
IP Access Control List
Specifies up to 10 host systems, or networks of host systems, that are allowed
access to the HP Jetdirect print server and the attached network device.
Access is generally limited to host systems specified in the list.
By factory default, host systems that use HTTP (for example, using the
embedded Web server or IPP) are not checked against entries in the Access
List and are allowed access. However, HTTP host access can be disabled
through the embedded Web server.
If the list is empty, then all hosts are allowed access.
Configured on the HP Jetdirect print server using TFTP (
Chapter 3
), Telnet
(
Chapter 3
), embedded Web server (
Chapter 4
), or management software.
Telnet Control
Telnet may be disabled through the Embedded Web Server (see
Chapter 4
).
Telnet access is not secure.
Authentication and Encryption
(For full-featured print servers only)
Certificate management for X.509 digital certificates is provided through the
embedded Web server, for both client-based and server-based authentication.
(Installed certificates are limited to 3KB. A single Certificate Authority (CA)
certificate may be installed.)
For wireless print servers, enhanced authentication and wireless encryption
methods are supported. For example, support for 802.1x Extensible
Authentication Protocol (EAP) and dynamic encryption protocols, including
Wi-Fi Protected Access (WPA) protocol, are supported.
Table 7.1
Summary of HP Jetdirect Security Features
(2 of 3)