Xerox 8560DN System Administrator Guide - Page 36

About Access Control Lists, Root-Signed Certificates

Page 36 highlights

Basic Concepts If you want to use HTTPS, each printer must have a unique certificate that is accepted by each browser used to access the printer. This allows the printer web server to use HTTPS and encrypt data between the web browser and the printer. In addition, because each printer's certificate is unique, you must load a different certificate into the browser for each printer the browser will access. Root-Signed Certificates Root-signed certificates are from a trusted Certificate Authority (CA). Using a certificate signed by a CA enables you to load one certificate into each browser, allowing access to all printers. Certificates from a trusted third party are considered more secure than self-signed certificates. Unlike self-signed certificates, root-signed certificates are not susceptible to man-in-the-middle attacks. See also: Setting Up a Certificate on page 4-6 Configuring SSL on page 4-7 About Access Control Lists Access control lists enable you to limit access to devices, as well as device configuration and management features. By default, access control lists are unrestricted, which means all computers and host systems are allowed access. The printer has five access control lists that may be configured using CWIS: ■ Print Host Access List: The computers from which users can print. For information on setting up the Print Host Access List, see Configuring the Print Host Access List on page 4-9. ■ Color Access Control: A 4-digit numeric password is required in order for users to print in color. ■ Administrator Access List: The computers from which you can change printer settings. For information on setting up the Administrator Access List, see Configuring Administrator and Key User Settings on page 4-8. ■ Key User Access List: The computers from which key users can change printer settings. For information on setting up the Key User Access List, see Configuring Administrator and Key User Settings on page 4-8. ■ SNMP Access List: The host machines that are authorized to access the printer using SNMP. For information on setting up the SNMP Access List, see Configuring the SNMP Access Control List on page 4-22. System Administrator Guide 4-4

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117

Basic Concepts
System Administrator Guide
4-4
If you want to use HTTPS, each printer must have a unique certificate that is accepted by each
browser used to access the printer. This allows the printer web server to use HTTPS and
encrypt data between the web browser and the printer. In addition, because each printer’s
certificate is unique, you must load a different certificate into the browser for each printer the
browser will access.
Root-Signed Certificates
Root-signed certificates are from a trusted Certificate Authority (CA). Using a certificate
signed by a CA enables you to load one certificate into each browser, allowing access to all
printers. Certificates from a trusted third party are considered more secure than self-signed
certificates. Unlike self-signed certificates, root-signed certificates are not susceptible to
man-in-the-middle attacks.
See also:
Setting Up a Certificate
on page 4-6
Configuring SSL
on page 4-7
About Access Control Lists
Access control lists enable you to limit access to devices, as well as device configuration and
management features. By default, access control lists are unrestricted, which means all
computers and host systems are allowed access.
The printer has five access control lists that may be configured using CWIS:
Print Host Access List
: The computers from which users can print. For information on
setting up the Print Host Access List, see
Configuring the Print Host Access List
on
page 4-9.
Color Access Control
: A 4-digit numeric password is required in order for users to print
in color.
Administrator Access List
: The computers from which you can change printer settings.
For information on setting up the Administrator Access List, see
Configuring
Administrator and Key User Settings
on page 4-8.
Key User Access List
: The computers from which key users can change printer settings.
For information on setting up the Key User Access List, see
Configuring Administrator
and Key User Settings
on page 4-8.
SNMP Access List
: The host machines that are authorized to access the printer using
SNMP. For information on setting up the SNMP Access List, see
Configuring the SNMP
Access Control List
on page 4-22.