HP Jetdirect 610n HP Jetdirect Security Guidelines - Page 18

Recommended Security Deployments: SET 3, the Security Wizard configuration has been completed

Page 18 highlights

Configuration Review Configuration review. Click "Finish" to set the configuration. Recommended Security Deployments: SET 3 First and foremost, SET 3 configuration needs to have the Security Wizard for SET 2 executed. Once the Security Wizard configuration has been completed, then we can begin the Firewall configuration. A sample Firewall configuration is shown where the management protocols are restricted to a specific IP subnet range: 18

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

Configuration
Review
Configuration
review.
Click
“Finish” to set
the
configuration.
Recommended Security Deployments: SET 3
First and foremost, SET 3 configuration needs to have the Security Wizard for SET 2 executed.
Once
the Security Wizard configuration has been completed, then we can begin the Firewall configuration.
A sample Firewall configuration is shown where the management protocols are restricted to a specific
IP subnet range:
18