Lexmark MS818 Embedded Web Server Administrator s Guide - Page 56

Securing data

Page 56 highlights

Securing printers 56 Configuring the TCP/IP port access setting You can control your network device activities by configuring your device to filter out traffic on specific network ports. Protocols (such as FTP, HTTP, and Telnet) can be disabled. Port filtering on devices disables network ports individually. When a port is closed, a device does not respond to traffic on the specified port whether or not the corresponding network application is enabled. We recommend closing any ports that you do not plan to use under standard operation by clearing them. This feature lets you set access settings on the different TCP/IP ports of the device. 1 From the Embedded Web Server, click Settings > Security > TCP/IP Port Access. 2 Click the check box of the TCP/IP port to change its access setting. 3 Click Submit. Setting the restricted server list Devices can be configured to allow connection only from a list of specified TCP/IP addresses. This action blocks all TCP connections from other addresses, protecting the device against unauthorized printing and configuring. 1 From the Embedded Web Server, click Settings > Network/Ports > TCP/IP. 2 In the Restricted Server List field, type up to 50 IP addresses, separated by commas, that are allowed to make TCP connections. 3 From the Restricted Server List Options menu, set the blocking option. 4 Click Submit. Securing data Physical lock Most Lexmark printers support cabled computer locks used to secure the critical and sensitive components of the device, such as the controller board and hard disk. These locks let you identify whether the physical components containing sensitive data on the devices have been tampered with. The following shows the most common security slot locations:

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Configuring the TCP/IP port access setting
You can control your network device activities by configuring your device to filter out traffic on specific network
ports. Protocols (such as FTP, HTTP, and Telnet) can be disabled.
Port filtering on devices disables network ports individually. When a port is closed, a device does not respond
to traffic on the specified port whether or not the corresponding network application is enabled. We recommend
closing any ports that you do not plan to use under standard operation by clearing them.
This feature lets you set access settings on the different TCP/IP ports of the device.
1
From the Embedded Web Server, click
Settings
>
Security
>
TCP/IP Port Access
.
2
Click the check box of the TCP/IP port to change its access setting.
3
Click
Submit
.
Setting the restricted server list
Devices can be configured to allow connection only from a list of specified TCP/IP addresses. This action blocks
all TCP connections from other addresses, protecting the device against unauthorized printing and configuring.
1
From the Embedded Web Server, click
Settings
>
Network/Ports
>
TCP/IP
.
2
In the Restricted Server List field, type up to 50 IP addresses, separated by commas, that are allowed to
make TCP connections.
3
From the Restricted Server List Options menu, set the blocking option.
4
Click
Submit
.
Securing data
Physical lock
Most Lexmark printers support cabled computer locks used to secure the critical and sensitive components of
the device, such as the controller board and hard disk. These locks let you identify whether the physical
components containing sensitive data on the devices have been tampered with.
The following shows the most common security slot locations:
Securing printers
56