HP LaserJet Enterprise P3015 HP LaserJet P3010 Series - User Guide - Page 129

Use security features, IP Security, Secure the embedded Web server, Secure Disk Erase

Page 129 highlights

Use security features The product supports security standards and recommended protocols that help you keep the product secure, protect critical information on your network, and simplify the way you monitor and maintain the product. For in-depth information about HP's secure imaging and printing solutions, visit www.hp.com/go/ secureprinting. The site provides links to white papers and FAQ documents about security features. IP Security IP Security (IPsec) is a set of protocols that control IP-based network traffic to and from the product. IPsec provides host-to-host authentication, data integrity, and encryption of network communications. For products that are connected to the network and have an HP Jetdirect print server, you can configure IPsec by using the Networking tab in the embedded Web server. Secure the embedded Web server 1. Open the embedded Web server. See Use the embedded Web server on page 113. 2. Click the Settings tab. 3. Click the Security link. 4. Click the Device Security Settings button. 5. Type the password in the New Password box, and type it again in the Verify password box. 6. Click the Apply button. Make note of the password and store it in a safe place. Secure Disk Erase To protect deleted data from unauthorized access on the product hard drive, use the Secure Disk Erase feature in the HP Web Jetadmin software. This feature can securely erase print jobs from the hard drive. Secure Disk Erase offers the following levels of disk security: ● Non-Secure Fast Erase. This is a simple file-table erase function. Access to the file is removed, but actual data is retained on the disk until it is overwritten by subsequent data-storage operations. This is the fastest mode. Non-Secure Fast Erase is the default erase mode. ● Secure Fast Erase. Access to the file is removed, and the data is overwritten with a fixed identical character pattern. This is slower than Non-Secure Fast Erase, but all data is overwritten. Secure Fast Erase meets the U.S. Department of Defense 5220-22.M requirements for the clearing of disk media. ● Secure Sanitizing Erase. This level is similar to the Secure Fast Erase mode. In addition, data is repetitively overwritten by using an algorithm that prevents any residual data persistence. This mode will impact performance. Secure Sanitizing Erase meets the U.S. Department of Defense 5220-22.M requirements for the sanitization of disk media. ENWW Use security features 117

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

Use security features
The product supports security standards and recommended protocols that help you keep the product
secure, protect critical information on your network, and simplify the way you monitor and maintain the
product.
For in-depth information about HP's secure imaging and printing solutions, visit
www.hp.com/
go/
secureprinting
. The site provides links to white papers and FAQ documents about security features.
IP Security
IP Security (IPsec) is a set of protocols that control IP-based network traffic to and from the product.
IPsec provides host-to-host authentication, data integrity, and encryption of network communications.
For products that are connected to the network and have an HP Jetdirect print server, you can configure
IPsec by using the
Networking
tab in the embedded Web server.
Secure the embedded Web server
1.
Open the embedded Web server. See
Use the embedded Web server
on page
113
.
2.
Click the
Settings
tab.
3.
Click the
Security
link.
4.
Click the
Device Security Settings
button.
5.
Type the password in the
New Password
box, and type it again in the
Verify password
box.
6.
Click the
Apply
button. Make note of the password and store it in a safe place.
Secure Disk Erase
To protect deleted data from unauthorized access on the product hard drive, use the Secure Disk Erase
feature in the HP Web Jetadmin software. This feature can securely erase print jobs from the hard
drive.
Secure Disk Erase offers the following levels of disk security:
Non-Secure Fast Erase
. This is a simple file-table erase function. Access to the file is removed,
but actual data is retained on the disk until it is overwritten by subsequent data-storage operations.
This is the fastest mode. Non-Secure Fast Erase is the default erase mode.
Secure Fast Erase
. Access to the file is removed, and the data is overwritten with a fixed identical
character pattern. This is slower than Non-Secure Fast Erase, but all data is overwritten. Secure
Fast Erase meets the U.S. Department of Defense 5220-22.M requirements for the clearing of disk
media.
Secure Sanitizing Erase
. This level is similar to the Secure Fast Erase mode. In addition, data is
repetitively overwritten by using an algorithm that prevents any residual data persistence. This
mode will impact performance. Secure Sanitizing Erase meets the U.S. Department of Defense
5220-22.M requirements for the sanitization of disk media.
ENWW
Use security features
117