HP 3600dn HP Jetdirect Print Server Administrator's Guide - Page 71

Table 5-2, Settings, Level of Access Control, CAUTION

Page 71 highlights

Table 5-2 Settings for Access Control Settings ■ Accessible through HTTP (embedded Web server), SNMP v1/v2c applications, or Telnet ■ Administrator password not set ■ Default SNMP v1/v2c community names used ■ No authentication or encryption ■ Access control list empty Level of Access Control Low Best suited for trusted environments. Any system can access the HP Jetdirect configuration parameters through the embedded Web server, Telnet, or SNMP management software. Passwords are not required. ■ Administrator password set ■ User-specified SNMP v1/v2 Set Community Name set ■ The Access Control List contains host entries and checks HTTP connections ■ Telnet and other non-secure protocols disabled. Medium limited security for non-trusted environment. If the Administrator password and SNMP v1/v2c Set Community Name are known, access is limited to: ■ systems listed in the Access Control List, and ■ SNMP v1/v2c management applications ■ Unused protocols disabled ■ SNMP v1/v2c disabled ■ Telnet disabled ■ Passwords set ■ The Access Control List contains specified entries and HTTP connections are checked ■ Printer control panel locked Medium-High Additional security for non-trusted, professionally managed environments, but security is limited by lack of authentication and encryption. Access is limited to hosts that are specified in the Access Control List. CAUTION Power-on settings (for example, configurations from a BootP/TFTP or DHCP/TFTP server) may change the print server's settings when it is power-cycled. Be sure to confirm your intended power-on settings. ENWW Using Security Features 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Table 5-2
Settings for Access Control
Settings
Level of Access Control
Accessible through HTTP (embedded Web server),
SNMP v1/v2c applications, or Telnet
Administrator password not set
Default SNMP v1/v2c community names used
No authentication or encryption
Access control list empty
Low
Best suited for trusted environments.
Any system can access the HP Jetdirect configuration
parameters through the embedded Web server, Telnet, or
SNMP management software. Passwords are not required.
Administrator password set
User-specified SNMP v1/v2 Set Community Name set
The Access Control List contains host entries and
checks HTTP connections
Telnet and other non-secure protocols disabled.
Medium
limited security for non-trusted environment.
If the Administrator password and SNMP v1/v2c Set
Community Name are known, access is limited to:
systems listed in the Access Control List, and
SNMP v1/v2c management applications
Unused protocols disabled
SNMP v1/v2c disabled
Telnet disabled
Passwords set
The Access Control List contains specified entries and
HTTP connections are checked
Printer control panel locked
Medium-High
Additional security for non-trusted, professionally managed
environments, but security is limited by lack of authentication
and encryption.
Access is limited to hosts that are specified in the Access
Control List.
CAUTION
Power-on settings (for example,
configurations from a BootP/TFTP or DHCP/TFTP
server) may change the print server's settings when
it is power-cycled. Be sure to confirm your intended
power-on settings.
ENWW
Using Security Features
63