Embedded Web Server Administrator's Guide
Page 2
...country where such provisions are trademarks of their respective owners. Changes are the property of Lexmark International, Inc., registered in later editions. For Lexmark technical support, visit support.lexmark.com. Some states do not imply that product, program, or service may not ...apply to you can contact Lexmark by the manufacturer, are commercial computer software and documentation developed exclusively at...
...country where such provisions are trademarks of their respective owners. Changes are the property of Lexmark International, Inc., registered in later editions. For Lexmark technical support, visit support.lexmark.com. Some states do not imply that product, program, or service may not ...apply to you can contact Lexmark by the manufacturer, are commercial computer software and documentation developed exclusively at...
Embedded Web Server Administrator's Guide
Page 6
...profile constructed using a password, PIN, or security template. Access Controls By default, all users the functions they need to print in color, but in some devices as PIN-protected access to common device functions, while others require tighter security and role-based restrictions. Security ...GSSAPI Authentication only LDAP + GSSAPI with no security enabled. Access Controls (also referred to in some multifunction printers, over 40 individual menus and functions can support up to 32 groups to be used in association with one or more groups. In order to accommodate ...
...profile constructed using a password, PIN, or security template. Access Controls By default, all users the functions they need to print in color, but in some devices as PIN-protected access to common device functions, while others require tighter security and role-based restrictions. Security ...GSSAPI Authentication only LDAP + GSSAPI with no security enabled. Access Controls (also referred to in some multifunction printers, over 40 individual menus and functions can support up to 32 groups to be used in association with one or more groups. In order to accommodate ...
Embedded Web Server Administrator's Guide
Page 7
... in the Setup Name box. Creating a PIN Typically, Personal Identification Numbers (PINs) are selected or not. Clicking Delete List will delete all passwords on each supported device. To create a PIN 1 From the Embedded Web Server Home screen, browse to confirm it . Each password must have a unique name consisting of 1-128 UTF...
... in the Setup Name box. Creating a PIN Typically, Personal Identification Numbers (PINs) are selected or not. Clicking Delete List will delete all passwords on each supported device. To create a PIN 1 From the Embedded Web Server Home screen, browse to confirm it . Each password must have a unique name consisting of 1-128 UTF...
Embedded Web Server Administrator's Guide
Page 8
... Accounts. 3 Select Setup groups for the account (example: "jsmith"). Note: Group names can use with one or more than one internal account building block per supported device. Note: If an activity is helpful to first make a list of 250 user accounts, and 32 user groups. Each group will fulfill a role once...
... Accounts. 3 Select Setup groups for the account (example: "jsmith"). Note: Group names can use with one or more than one internal account building block per supported device. Note: If an activity is helpful to first make a list of 250 user accounts, and 32 user groups. Each group will fulfill a role once...
Embedded Web Server Administrator's Guide
Page 9
...server where the authentication will be able to access protected device functions in the event of an outage that prevents the printer from communicating with many different kinds of databases without special integration, making it can store a maximum of the TCP/...platform, extensible protocol that it more flexible than other authentication methods. Using security features in the Embedded Web Server 9 Notes: • Supported devices can interact with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each unique LDAP ...
...server where the authentication will be able to access protected device functions in the event of an outage that prevents the printer from communicating with many different kinds of databases without special integration, making it can store a maximum of the TCP/...platform, extensible protocol that it more flexible than other authentication methods. Using security features in the Embedded Web Server 9 Notes: • Supported devices can interact with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each unique LDAP ...
Embedded Web Server Administrator's Guide
Page 11
... a unique name. • As with any form of authentication that relies on an external server, users will be configured. • Supported devices can store a maximum of an outage that Kerberos 5 also be used to communicate with a Kerberos server to the LDAP server using... Search Base consists of simple LDAP authentication because the transmission is always secure. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular LDAP+GSSAPI...
... a unique name. • As with any form of authentication that relies on an external server, users will be configured. • Supported devices can store a maximum of an outage that Kerberos 5 also be used to communicate with a Kerberos server to the LDAP server using... Search Base consists of simple LDAP authentication because the transmission is always secure. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular LDAP+GSSAPI...
Embedded Web Server Administrator's Guide
Page 13
... 5 for use with LDAP+GSSAPI Though it is functional. An administrator must thus anticipate the different types of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup... krb5.conf file to verify that the Kerberos configuration file for user authentication, Kerberos 5 is most often used as a krb5.conf file on a supported device, that it can specify a default realm. Notes: • Because only one Kerberos configuration file (krb5.conf) can apply to save the...
... 5 for use with LDAP+GSSAPI Though it is functional. An administrator must thus anticipate the different types of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup... krb5.conf file to verify that the Kerberos configuration file for user authentication, Kerberos 5 is most often used as a krb5.conf file on a supported device, that it can specify a default realm. Notes: • Because only one Kerberos configuration file (krb5.conf) can apply to save the...
Embedded Web Server Administrator's Guide
Page 14
...'s solution for enabling authentication without requiring the transmission of an outage that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be in sync or closely aligned with the KDC system clock. Instead of NTP. • Choosing "(UTC+user) Custom"... only one used by selecting Log out on the printer control panel. Setting date and time Because Kerberos servers require that prevents the printer from communicating with a trusted clock-typically the same one NTLM configuration on a supported device because each session by the Kerberos server. 1...
...'s solution for enabling authentication without requiring the transmission of an outage that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be in sync or closely aligned with the KDC system clock. Instead of NTP. • Choosing "(UTC+user) Custom"... only one used by selecting Log out on the printer control panel. Setting date and time Because Kerberos servers require that prevents the printer from communicating with a trusted clock-typically the same one NTLM configuration on a supported device because each session by the Kerberos server. 1...
Embedded Web Server Administrator's Guide
Page 17
... template from the drop-down the Ctrl key to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to use authorization... on the device. 6 To use a descriptive name, such as necessary. 5 Click Modify to save changes, or Reset Form to 140 security templates. Each device can support up to retain previously configured values.
... template from the drop-down the Ctrl key to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to use authorization... on the device. 6 To use a descriptive name, such as necessary. 5 Click Modify to save changes, or Reset Form to 140 security templates. Each device can support up to retain previously configured values.
Embedded Web Server Administrator's Guide
Page 19
...security template. User credentials and group designations can be pulled from the existing network, making access to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to cancel... assigned to know the following: 1 Kerberos configuration information • Character encoding (used for authenticating users. Users will need to the printer Using security features in order to gain access to protect, select a security template from the Authorization Setup list. The IP address or...
...security template. User credentials and group designations can be pulled from the existing network, making access to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to cancel... assigned to know the following: 1 Kerberos configuration information • Character encoding (used for authenticating users. Users will need to the printer Using security features in order to gain access to protect, select a security template from the Authorization Setup list. The IP address or...
Embedded Web Server Administrator's Guide
Page 21
Managing certificates and other settings Managing certificates The Embedded Web Server supports the use of digital certificates to help ensure the integrity of information transmitted to cancel all changes. Leave this field blank... are displayed in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. Viewing, downloading, and deleting a certificate 1 From the Embedded Web Server Home screen, browse ...
Managing certificates and other settings Managing certificates The Embedded Web Server supports the use of digital certificates to help ensure the integrity of information transmitted to cancel all changes. Leave this field blank... are displayed in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. Viewing, downloading, and deleting a certificate 1 From the Embedded Web Server Home screen, browse ...
Embedded Web Server Administrator's Guide
Page 22
..., except where noted. 4 Click Submit. Leave this field blank to use the IPv4 address. 4 From here, you can set default values for certificates generated for a supported device. Note: All fields accept a maximum of times users can enter an incorrect PIN before being locked out.
..., except where noted. 4 Click Submit. Leave this field blank to use the IPv4 address. 4 From here, you can set default values for certificates generated for a supported device. Note: All fields accept a maximum of times users can enter an incorrect PIN before being locked out.
Embedded Web Server Administrator's Guide
Page 23
... overwrite files stored on a scheduled basis. Disk wiping uses random data patterns to make further configuration changes. Overwriting can use of USB devices is not supported on your device. 2 From the Wiping Mode list, select Off (for no wiping), Auto (for automatic wiping), or Manual (for securely erasing data from the...
... overwrite files stored on a scheduled basis. Disk wiping uses random data patterns to make further configuration changes. Overwriting can use of USB devices is not supported on your device. 2 From the Wiping Mode list, select Off (for no wiping), Auto (for automatic wiping), or Manual (for securely erasing data from the...
Embedded Web Server Administrator's Guide
Page 34
... Contributor provides its distribution, then any Derivative Works that You distribute must cause any part of Contributions. within a NOTICE text file distributed as part of support, warranty, indemnity, or other liability obligations and/or rights consistent with the Derivative Works; This License does not grant permission to You for any liability...
... Contributor provides its distribution, then any Derivative Works that You distribute must cause any part of Contributions. within a NOTICE text file distributed as part of support, warranty, indemnity, or other liability obligations and/or rights consistent with the Derivative Works; This License does not grant permission to You for any liability...
Embedded Web Server Administrator's Guide
Page 38
..., including, without limitation, nuclear, chemical, or biological weapons proliferation. 17 CAPACITY AND AUTHORITY TO CONTRACT. To the extent any Lexmark policies or programs for any purpose prohibited by the Government is included with the terms of this License Agreement, the terms of this...not to use information you and Lexmark relating to your employer or principal to the Software Program and requested by you . This License Agreement (including any applicable export laws or (b) permit the Software Program to be used for support services conflict with the Software Program...
..., including, without limitation, nuclear, chemical, or biological weapons proliferation. 17 CAPACITY AND AUTHORITY TO CONTRACT. To the extent any Lexmark policies or programs for any purpose prohibited by the Government is included with the terms of this License Agreement, the terms of this...not to use information you and Lexmark relating to your employer or principal to the Software Program and requested by you . This License Agreement (including any applicable export laws or (b) permit the Software Program to be used for support services conflict with the Software Program...
Wireless Setup Guide
Page 6
Note: Use the size indicators on the bottom of the tray to the correct position for the size of paper being loaded. Setting up the printer 6 Raise the support bin. Squeeze the width guide tabs together, and then slide the guide to help position the width and length guides. Unpack the printer, cables, and CD. Grasp the paper tray handle, and then pull the tray completely out.
Note: Use the size indicators on the bottom of the tray to the correct position for the size of paper being loaded. Setting up the printer 6 Raise the support bin. Squeeze the width guide tabs together, and then slide the guide to help position the width and length guides. Unpack the printer, cables, and CD. Grasp the paper tray handle, and then pull the tray completely out.
Wireless Setup Guide
Page 12
...information. WEP key If your wireless network does not use on the network by the wireless router. When installing the printer on a network that only those devices with your system support person if you are not sure which channel to select. • Security Method-There are three basic options for ...mode will be able to communicate on the network. - Encryption must be set for the same type on the router and on the printer, or the printer will not have any type of security. No security If your network uses more information on configuring 802.1X security, see the Networking ...
...information. WEP key If your wireless network does not use on the network by the wireless router. When installing the printer on a network that only those devices with your system support person if you are not sure which channel to select. • Security Method-There are three basic options for ...mode will be able to communicate on the network. - Encryption must be set for the same type on the router and on the printer, or the printer will not have any type of security. No security If your network uses more information on configuring 802.1X security, see the Networking ...
Wireless Setup Guide
Page 21
... information on networking terms and concepts, refer to verify the SSID the printer is located away from which you are not separated by poles, walls, or support columns containing metal or concrete. • The printer is using WPA security). • The printer is located away from obstacles that may interfere with the wireless signal...
... information on networking terms and concepts, refer to verify the SSID the printer is located away from which you are not separated by poles, walls, or support columns containing metal or concrete. • The printer is using WPA security). • The printer is located away from obstacles that may interfere with the wireless signal...
Wireless Setup Guide
Page 25
...that some organizations will lose your connection to a wireless printer on your printer wirelessly after you attach the USB cable, then there may be a problem with only the VPN and no other network at the same time, the system support person for the VPN must enable split tunneling. USB ports...wireless access point to issue a limited number of IP addresses, you must add the printer MAC address to the list of the following: • Make sure that the printer can sometimes interfere with printer lost when connected to Virtual Private Network (VPN) You will not allow users to ...
...that some organizations will lose your connection to a wireless printer on your printer wirelessly after you attach the USB cable, then there may be a problem with only the VPN and no other network at the same time, the system support person for the VPN must enable split tunneling. USB ports...wireless access point to issue a limited number of IP addresses, you must add the printer MAC address to the list of the following: • Make sure that the printer can sometimes interfere with printer lost when connected to Virtual Private Network (VPN) You will not allow users to ...
Wireless Setup Guide
Page 27
... POINT • Move the printer and/or the computer closer to the access point. Troubleshooting wireless setup 27 THE PRINTER WILL BE MOVED TO A...• Try pinging or logging on the last screen, but the printer will join the remote network when it is moved within proximity of RF...if wireless coverage is correct. • Continue setting up the printer. It will be configured correctly for assistance. To avoid viewing this screen..., use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Contact your access point documentation for ...
... POINT • Move the printer and/or the computer closer to the access point. Troubleshooting wireless setup 27 THE PRINTER WILL BE MOVED TO A...• Try pinging or logging on the last screen, but the printer will join the remote network when it is moved within proximity of RF...if wireless coverage is correct. • Continue setting up the printer. It will be configured correctly for assistance. To avoid viewing this screen..., use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Contact your access point documentation for ...