Lexmark MX718 Embedded Web Server--Security: Administrator s Guide - Page 3

Securing data, Security solutions, Security scenarios, Troubleshooting, Appendix, Notices

Page 3 highlights

Contents 3 Configuring the TCP/IP port access setting 42 Setting the restricted server list...42 Securing data 43 Physical lock...43 Disk encryption...44 Checking disk encryption status...45 Erasing settings (non‑volatile memory)...45 Disk file wiping...48 Erasing hard disk data...49 Out‑of‑service wiping...50 Statement of volatility...51 Security solutions 53 Print Release...53 Secure Held Print Jobs...53 Card Authentication...53 Smart Card authentication...54 Security scenarios 55 Scenario: Printer in a public place...55 Scenario: Standalone or small office...56 Scenario: Network running Active Directory 57 Scenario: More security‑aware environment (802.1X) and SNMPv3 58 Scenario: Network‑based usage restrictions using access card 58 Troubleshooting 60 Login troubleshooting...60 LDAP troubleshooting...63 Held Jobs / Print Release Lite troubleshooting 64 Appendix...66 Notices...84 Glossary of Security Terms 89 Index...90

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93

Configuring the TCP/IP port access setting
...............................................................................................
42
Setting the restricted server list
.....................................................................................................................
42
Securing data
..............................................................................................
43
Physical lock
.......................................................................................................................................................
43
Disk encryption
..................................................................................................................................................
44
Checking disk encryption status
...................................................................................................................
45
Erasing settings (non
volatile memory)
.......................................................................................................
45
Disk file wiping
...................................................................................................................................................
48
Erasing hard disk data
......................................................................................................................................
49
Out
of
service wiping
.......................................................................................................................................
50
Statement of volatility
........................................................................................................................................
51
Security solutions
.......................................................................................
53
Print Release
.......................................................................................................................................................
53
Secure Held Print Jobs
....................................................................................................................................
53
Card Authentication
..........................................................................................................................................
53
Smart Card authentication
..............................................................................................................................
54
Security scenarios
......................................................................................
55
Scenario: Printer in a public place
................................................................................................................
55
Scenario: Standalone or small office
............................................................................................................
56
Scenario: Network running Active Directory
..............................................................................................
57
Scenario: More security
aware environment (802.1X) and SNMPv3
...................................................
58
Scenario: Network
based usage restrictions using access card
..........................................................
58
Troubleshooting
..........................................................................................
60
Login troubleshooting
......................................................................................................................................
60
LDAP troubleshooting
......................................................................................................................................
63
Held Jobs / Print Release Lite troubleshooting
.........................................................................................
64
Appendix
......................................................................................................
66
Notices
.........................................................................................................
84
Glossary of Security Terms
........................................................................
89
Index
.............................................................................................................
90
Contents
3