Contents
Change history
..............................................................................................
4
Overview
........................................................................................................
5
Supported printers
..............................................................................................................................................
5
Securing network connections
...................................................................
6
Accessing the Embedded Web Server
..........................................................................................................
6
Configuring TCP/IP port access settings
.......................................................................................................
6
Configuring IP Security (IPsec) settings
.........................................................................................................
6
Configuring 802.1x authentication
...................................................................................................................
7
Setting the restricted server list
.......................................................................................................................
8
Managing devices remotely
........................................................................
9
Using HTTPS for printer management
...........................................................................................................
9
Setting up SNMP
..................................................................................................................................................
9
Configuring security audit log settings
.........................................................................................................
10
Updating firmware
...............................................................................................................................................
11
Managing login methods
...........................................................................
12
Restricting public access to functions, applications, printer management, and security
options
..............................................................................................................................................................
12
Using local accounts
.........................................................................................................................................
12
Using LDAP or LDAP+GSSAPI
.........................................................................................................................
14
Using Kerberos
...................................................................................................................................................
16
Using Active Directory
......................................................................................................................................
18
Creating LDAP, LDAP+GSSAPI, or Active Directory groups
...................................................................
20
Editing or deleting LDAP, LDAP+GSSAPI, or Active Directory groups
................................................
20
Understanding access controls
......................................................................................................................
21
Managing certificates
.................................................................................
23
Configuring printer certificate defaults
........................................................................................................
23
Creating a printer certificate
...........................................................................................................................
23
Installing certificates manually
.......................................................................................................................
24
Installing certificates automatically
...............................................................................................................
24
Viewing, downloading, and deleting a certificate
....................................................................................
24
Contents
2