Dell E515dn Dell Multifunction Printer Users Guide - Page 251

Supported Security Protocols and Features, Security Protocols

Page 251 highlights

Supported Security Protocols and Features • Security Protocols • Security Methods for Sending and Receiving Email • Manage Your Network Machine Securely Using Web Based Management (Web Browser) To manage your network machine securely, you must use the management utilities with security protocols. Security Protocols SNMPv3 The Simple Network Management Protocol version 3 (SNMPv3) provides user authentication and data encryption to manage network devices securely. Security Methods for Sending and Receiving Email NOTE: Configure the settings for these security methods using Web Based Management. SMTP Authentication (SMTP-AUTH) SMTP-AUTH expands SMTP (the Internet email sending protocol) to include an authentication method that ensures that the true identity of the sender is known. Authenticated Post Office Protocol (APOP) APOP expands POP3 (the Internet receiving protocol) to include an authentication method that encrypts the password when the client receives email. IMAP4 over SSL IMAP4 over SSL enables receiving encrypted email using SSL. Manage Your Network Machine Securely Using Web Based Management (Web Browser) To manage your network machine securely, you must use the management utilities with security protocols. 1. Start your web browser. 2. Type "http://machine's IP address" in your browser's address bar (where "machine's IP address" is the machine's IP address). 3. No password is required by default. Type a password if you have set one, and then click . NOTE: If you use the SNMPv3 protocol, follow the steps below. 4. Click the Network tab. 5. Click Protocol. 6. Make sure the SNMP setting is enabled, and then click Advanced Setting of SNMP. 7. You can configure the SNMP settings. We have three selections for SNMP Mode of Operation. • SNMP v1/v2c read-write access In this mode, the print server uses version 1 and version 2c of the SNMP protocol. You can use all Dell applications under this mode. However, it is not secure since it will not authenticate the user and the data will Security 251

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386

251
Security
Supported Security Protocols and Features
• Security Protocols
• Security Methods for Sending and Receiving Email
• Manage Your Network Machine Securely Using Web Based Management (Web Browser)
To manage your network machine securely, you must use the management utilities with security protocols.
Security Protocols
SNMPv3
The Simple Network Management Protocol version 3 (SNMPv3) provides user authentication and data encryption to
manage network devices securely.
Security Methods for Sending and Receiving Email
NOTE:
Configure the settings for these security methods using Web Based Management°
SMTP Authentication (SMTP-AUTH)
SMTP-AUTH expands SMTP (the Internet email sending protocol) to include an authentication method that
ensures that the true identity of the sender is known.
Authenticated Post Office Protocol (APOP)
APOP expands POP3 (the Internet receiving protocol) to include an authentication method that encrypts the
password when the client receives email.
IMAP4 over SSL
IMAP4 over SSL enables receiving encrypted email using SSL.
Manage Your Network Machine Securely Using Web Based Management (Web
Browser)
To manage your network machine securely, you must use the management utilities with security protocols.
1.
Start your web browser.
2.
Type "http://machine's IP address" in your browser's address bar (where "machine's IP address" is the machine's
IP address).
3.
No password is required by default. Type a password if you have set one, and then click
.
NOTE:
If you use the SNMPv3 protocol, follow the steps below°
4.
Click the
Network
tab.
5.
Click
Protocol
.
6.
Make sure the
SNMP
setting is enabled, and then click
Advanced Setting
of
SNMP
.
7.
You can configure the SNMP settings.
We have three selections for
SNMP Mode of Operation
.
SNMP v1/v2c read-write access
In this mode, the print server uses version 1 and version 2c of the SNMP protocol. You can use all Dell
applications under this mode. However, it is not secure since it will not authenticate the user and the data will