HP 630n HP Jetdirect Print Servers - Administrator's Guide - Page 98

Con certificates, Certificates, Jetdirect Certificate, Con Cancel, Operation Failed

Page 98 highlights

NOTE: While self-signed certificates are permitted and allow data encryption, they do not ensure valid authentication. A self-signed certificate is similar to validating your own identity. The Certificates page provides the status of the certificates installed on the HP Jetdirect print server: ● Jetdirect Certificate Used to validate the identity of the HP Jetdirect device to clients and to network authentication servers. By factory default, a self-signed HP Jetdirect certificate is pre-installed, which allows the embedded Web server to use HTTPS and appear as a secure site when accessed by a Web browser. Click View to view the contents of an installed HP Jetdirect certificate, or click Configure to update or install a new one. For more information, see Configure certificates on page 88. When installed, an HP Jetdirect certificate is saved after a cold-reset, which is used to restore the print server to factory-default values. ● CA Certificate. (Full-featured print servers only) A certificate from a trusted third party, or certificate authority (CA), is used to validate the identity of a network authentication server during 802.1X authentication methods that use EAP. The authentication server's identity is validated when information on the CA certificate matches the information on a certificate received from the authentication server. A CA certificate for the print server is used to sign the authentication server's certificate. Therefore, the certificate authority for the authentication server's certificate must also be used for the CA certificate. Click View to view the contents of an installed HP Jetdirect certificate, or click Configure to update or install a new one. For more information, see Configure certificates on page 88. A CA certificate is not saved when the print server is reset to factory-default values. Configure certificates To update or install a certificate, click Configure to start the certificate management wizard. The screens displayed depend on the type of certificate (HP Jetdirect or CA) and your selections. Table 4-17 Certificate configuration screens on page 88 provides a description of the screens and configuration parameters that are displayed. NOTE: If you improperly exit Certificates configuration by failing to use the Cancel button, for example, an Operation Failed screen appears. If this occurs, wait approximately two minutes and restart the wizard. Table 4-17 Certificate configuration screens Certificate Options screen. The options displayed depend on your print server model. ● Update Pre-Installed Certificate Update the pre-installed, self-signed certificate. The certificate is overwritten. You can update the following item: Certificate Validity Period The browser identifies the certificate as self-signed for each new Web session, which can cause a security alert message. You can bypass this message by adding the certificate to the browser's certificate store or by disabling browser alerts (not recommended). Self-signed certificates are not necessarily secure because the certificate owner is merely confirming his own identity instead of verification by a trusted third party. Certificates from a trusted third party are considered more secure. 88 Chapter 4 Embedded Web server (V.38.xx) ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

NOTE:
While self-signed certificates are permitted and allow data encryption, they do not ensure valid
authentication. A self-signed certificate is similar to validating your own identity.
The
Certificates
page provides the status of the certificates installed on the HP Jetdirect print server:
Jetdirect Certificate
Used to validate the identity of the HP Jetdirect device to clients and to
network authentication servers.
By factory default, a self-signed HP Jetdirect certificate is pre-installed, which allows the embedded
Web server to use HTTPS and appear as a secure site when accessed by a Web browser.
Click
View
to view the contents of an installed HP Jetdirect certificate, or click
Configure
to update
or install a new one. For more information, see
Configure certificates
on page
88
.
When installed, an HP Jetdirect certificate is saved after a cold-reset, which is used to restore the
print server to factory-default values.
CA Certificate
.
(Full-featured print servers only) A certificate from a trusted third party, or
certificate authority (CA), is used to validate the identity of a network authentication server during
802.1X authentication methods that use EAP. The authentication server's identity is validated when
information on the CA certificate matches the information on a certificate received from the
authentication server.
A CA certificate for the print server is used to sign the authentication server's certificate. Therefore,
the certificate authority for the authentication server's certificate must also be used for the CA
certificate.
Click
View
to view the contents of an installed HP Jetdirect certificate, or click
Configure
to update
or install a new one. For more information, see
Configure certificates
on page
88
.
A CA certificate is not saved when the print server is reset to factory-default values.
Configure certificates
To update or install a certificate, click
Configure
to start the certificate management wizard. The screens
displayed depend on the type of certificate (HP Jetdirect or CA) and your selections.
Table
4
-
17
Certificate configuration screens
on page
88
provides a description of the screens and configuration
parameters that are displayed.
NOTE:
If you improperly exit Certificates configuration by failing to use the
Cancel
button, for example,
an
Operation Failed
screen appears. If this occurs, wait approximately two minutes and restart the
wizard.
Table 4-17
Certificate configuration screens
Certificate Options
screen. The options displayed depend on your print server model.
Update Pre-Installed Certificate
Update the pre-installed, self-signed certificate. The certificate is
overwritten. You can update the following item:
Certificate Validity Period
The browser identifies the certificate as self-signed for each new Web session, which can cause a security
alert message. You can bypass this message by adding the certificate to the browser's certificate store or by
disabling browser alerts (not recommended).
Self-signed certificates are not necessarily secure because the certificate owner is merely confirming his own
identity instead of verification by a trusted third party. Certificates from a trusted third party are considered
more secure.
88
Chapter 4
Embedded Web server (V.38.xx)
ENWW