Lexmark MX718 Embedded Web Server--Security: Administrator s Guide - Page 2

Contents, Managing other access functions

Page 2 highlights

Contents 2 Contents Devices covered in this guide 4 Simple‑security devices...4 Advanced‑security devices...4 Managing authentication and authorization methods 5 Understanding the basics...5 Simple-security device access controls...8 Limiting access using Basic Security Setup 9 Advanced-security building blocks...10 Using a security template to control function access 20 Managing certificates and other settings 24 Installing a Certificate Authority certificate on the device 24 Configuring the device for certificate information 25 Setting up a Certificate Authority certificate monitor 27 Managing devices remotely 29 Using HTTPS for device management...29 Setting a backup password...29 Setting up SNMP...30 Configuring security audit log settings...31 Updating firmware...33 Managing other access functions 34 Configuring confidential printing...34 Setting login restrictions...35 Enabling and disabling USB host ports...35 Enabling the security reset jumper...36 Enabling holding faxes...37 Enabling Operator Panel Lock...37 Securing network connections 39 Configuring 802.1X authentication...39 Configuring IP security settings...40 Connecting to a wireless network...41

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

Contents
Devices covered in this guide
.....................................................................
4
Simple
security devices
.....................................................................................................................................
4
Advanced
security devices
...............................................................................................................................
4
Managing authentication and authorization methods
............................
5
Understanding the basics
..................................................................................................................................
5
Simple-security device access controls
.........................................................................................................
8
Limiting access using Basic Security Setup
..................................................................................................
9
Advanced-security building blocks
...............................................................................................................
10
Using a security template to control function access
.............................................................................
20
Managing certificates and other settings
...............................................
24
Installing a Certificate Authority certificate on the device
......................................................................
24
Configuring the device for certificate information
....................................................................................
25
Setting up a Certificate Authority certificate monitor
...............................................................................
27
Managing devices remotely
......................................................................
29
Using HTTPS for device management
........................................................................................................
29
Setting a backup password
............................................................................................................................
29
Setting up SNMP
...............................................................................................................................................
30
Configuring security audit log settings
.........................................................................................................
31
Updating firmware
.............................................................................................................................................
33
Managing other access functions
............................................................
34
Configuring confidential printing
...................................................................................................................
34
Setting login restrictions
..................................................................................................................................
35
Enabling and disabling USB host ports
.......................................................................................................
35
Enabling the security reset jumper
...............................................................................................................
36
Enabling holding faxes
.....................................................................................................................................
37
Enabling Operator Panel Lock
.......................................................................................................................
37
Securing network connections
.................................................................
39
Configuring 802.1X authentication
...............................................................................................................
39
Configuring IP security settings
.....................................................................................................................
40
Connecting to a wireless network
.................................................................................................................
41
Contents
2