Xerox 8560DN System Administrator Guide - Page 37

Securing the Printer in a High Security Environment

Page 37 highlights

Securing the Printer in a High Security Environment Securing the Printer in a High Security Environment If you are concerned about the security of your printer in a high security environment, such as a college or printing kiosk, you can configure settings in CentreWare IS to "lockdown" or fully secure the printer. If you are not concerned about the security of your printer, you may only need to set up a certificate and then configure SSL to encrypt data including passwords. To fully secure a printer: 1. Set up a certificate. (See Setting Up a Certificate on page 4-6.) 2. Select when to use SSL. (See Configuring SSL on page 4-7.) Note: The following steps may be completed in any order. 3. Select the Administrator and Key User Settings. (See Configuring Administrator and Key User Settings on page 4-8.) Note: To prevent users from changing settings, clear the Modify Configuration Web Pages check box. To prevent users from viewing settings, clear the View Configuration Web Pages check box. 4. Set up the Print Host Access List. (See Configuring the Print Host Access List on page 4-9.) 5. Set up the removal of Unprinted Personal, Secure, and Proof Print Jobs. (See Selecting the Automatic Removal of Secure, Personal, and Proof Jobs Option on page 4-12.) 6. Select the Hard Drive Overwrite option. (See Securing the Hard Drive on page 4-11.) 7. Select the Jam Recovery option. (See Jam Recovery on page 5-3.) 8. Lock the control panel menus. (See Locking the Control Panel Menus on page 4-16.) 9. Configure SNMP. (See Configuring SNMP on page 4-17.) 10. Disable unused protocols. (See Protocol Control on page 3-6.) 11. Disable Job Accounting. (See To Enable or Disable Job Accounting on page 3-3.) Note: To secure protocols, disable any protocols you are not using. This prevents unauthorized access through applications that use these protocols. For example, if you want to use IPP for a secure printing channel, disable the other printing protocols, Port 9100 and LPR. Disabling some protocols also disables some printer functions, such as printer discovery and PrintingScout. System Administrator Guide 4-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117

Securing the Printer in a High Security Environment
System Administrator Guide
4-5
Securing the Printer in a High Security
Environment
If you are concerned about the security of your printer in a high security environment, such as
a college or printing kiosk, you can configure settings in CentreWare IS to “lockdown” or fully
secure the printer. If you are not concerned about the security of your printer, you may only
need to set up a certificate and then configure SSL to encrypt data including passwords.
To fully secure a printer:
1.
Set up a certificate. (See
Setting Up a Certificate
on page 4-6.)
2.
Select when to use SSL. (See
Configuring SSL
on page 4-7.)
Note:
The following steps may be completed in any order.
3.
Select the Administrator and Key User Settings. (See
Configuring Administrator and Key
User Settings
on page 4-8.)
Note:
To prevent users from changing settings, clear the
Modify Configuration Web
Pages
check box. To prevent users from viewing settings, clear the
View Configuration
Web Pages
check box.
4.
Set up the Print Host Access List. (See
Configuring the Print Host Access List
on
page 4-9.)
5.
Set up the removal of Unprinted Personal, Secure, and Proof Print Jobs. (See
Selecting the
Automatic Removal of Secure, Personal, and Proof Jobs Option
on page 4-12.)
6.
Select the
Hard Drive Overwrite
option. (See
Securing the Hard Drive
on page 4-11.)
7.
Select the
Jam Recovery
option. (See
Jam Recovery
on page 5-3.)
8.
Lock the control panel menus. (See
Locking the Control Panel Menus
on page 4-16.)
9.
Configure SNMP. (See
Configuring SNMP
on page 4-17.)
10.
Disable unused protocols. (See
Protocol Control
on page 3-6.)
11.
Disable
Job Accounting
. (See
To Enable or Disable Job Accounting
on page 3-3.)
Note:
To secure protocols, disable any protocols you are not using. This prevents
unauthorized access through applications that use these protocols. For example, if you
want to use IPP for a secure printing channel, disable the other printing protocols,
Port 9100 and LPR. Disabling some protocols also disables some printer functions, such
as printer discovery and PrintingScout.