Embedded Web Server Administrator's Guide
Page 2
... exclusively at any time. Evaluation and verification of their respective owners. Trademarks Lexmark, Lexmark with other products, programs, or services, except those expressly designated by mail: Lexmark International, Inc. All other countries. Some states do not imply that product...are periodically made at private expense. For information on supplies and downloads, visit www.lexmark.com. All rights reserved. For Lexmark technical support, visit support.lexmark.com. UNITED STATES GOVERNMENT RIGHTS This software and any accompanying documentation provided under this agreement...
... exclusively at any time. Evaluation and verification of their respective owners. Trademarks Lexmark, Lexmark with other products, programs, or services, except those expressly designated by mail: Lexmark International, Inc. All other countries. Some states do not imply that product...are periodically made at private expense. For information on supplies and downloads, visit www.lexmark.com. All rights reserved. For Lexmark technical support, visit support.lexmark.com. UNITED STATES GOVERNMENT RIGHTS This software and any accompanying documentation provided under this agreement...
Embedded Web Server Administrator's Guide
Page 6
...designate up to 140 security templates, allowing administrators to in some multifunction printers, over 40 individual menus and functions can be protected. For example, in Company A, employees in sales and marketing use color every day. Access Controls By default, all users the functions they ...LDAP + GSSAPI Authentication only LDAP + GSSAPI with Groups Authentication and authorization Password Authorization only PIN Authorization only Each device can support up to 32 groups to be used to manage access to specific menus and functions or to disable them entirely. In this...
...designate up to 140 security templates, allowing administrators to in some multifunction printers, over 40 individual menus and functions can be protected. For example, in Company A, employees in sales and marketing use color every day. Access Controls By default, all users the functions they ...LDAP + GSSAPI Authentication only LDAP + GSSAPI with Groups Authentication and authorization Password Authorization only PIN Authorization only Each device can support up to 32 groups to be used to manage access to specific menus and functions or to disable them entirely. In this...
Embedded Web Server Administrator's Guide
Page 7
...-level passwords override normal passwords. Note: The default PIN length is protected by a normal password, any administrator-level password will delete all passwords on each supported device. The Embedded Web Server can store a combined total of 1-128 UTF-8 characters (example: "Copy Lockout Password"). 5 Type a password in the appropriate box, and then...
...-level passwords override normal passwords. Note: The default PIN length is protected by a normal password, any administrator-level password will delete all passwords on each supported device. The Embedded Web Server can store a combined total of 1-128 UTF-8 characters (example: "Copy Lockout Password"). 5 Type a password in the appropriate box, and then...
Embedded Web Server Administrator's Guide
Page 8
... account building block can contain up internal accounts Embedded Web Server administrators can use with one or more than one internal account building block per supported device. Note: When creating groups, it . 7 Click Submit. Creating user accounts 1 From the Embedded Web Server Home screen, browse to 128 UTF-8 characters. • User...
... account building block can contain up internal accounts Embedded Web Server administrators can use with one or more than one internal account building block per supported device. Note: When creating groups, it . 7 Click Submit. Creating user accounts 1 From the Embedded Web Server Home screen, browse to 128 UTF-8 characters. • User...
Embedded Web Server Administrator's Guide
Page 9
... the Internal Accounts Settings section will not be able to access protected device functions in the event of an outage that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each session by... selecting Log out on the printer control panel. Using security features in the LDAP server where user accounts reside. Notes: • Supported devices can interact with the LDAP server. Note: A Search Base consists of the LDAP...
... the Internal Accounts Settings section will not be able to access protected device functions in the event of an outage that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each session by... selecting Log out on the printer control panel. Using security features in the LDAP server where user accounts reside. Notes: • Supported devices can interact with the LDAP server. Note: A Search Base consists of the LDAP...
Embedded Web Server Administrator's Guide
Page 11
...using the GSSAPI protocol for networks running Active Directory. Notes: • LDAP+GSSAPI requires that Kerberos 5 also be configured. • Supported devices can store a maximum of simple LDAP authentication because the transmission is the node in the Embedded Web Server 11 To add a ...will be used for access. Each configuration must have a unique name. • As with any form of authentication that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to the LDAP server using Generic Security ...
...using the GSSAPI protocol for networks running Active Directory. Notes: • LDAP+GSSAPI requires that Kerberos 5 also be configured. • Supported devices can store a maximum of simple LDAP authentication because the transmission is the node in the Embedded Web Server 11 To add a ...will be used for access. Each configuration must have a unique name. • As with any form of authentication that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to the LDAP server using Generic Security ...
Embedded Web Server Administrator's Guide
Page 13
... 5 for use with LDAP+GSSAPI Though it is used, uploading or re-submitting a simple Kerberos file will not be stored on a supported device, that krb5.conf file can apply to multiple realms and Kerberos Domain Controllers (KDCs). However, if a realm is not specified in...can specify a default realm. Notes: • Because only one Kerberos configuration file (krb5.conf) can be used as a krb5.conf file on the printer control panel. Creating a simple Kerberos configuration file 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups....
... 5 for use with LDAP+GSSAPI Though it is used, uploading or re-submitting a simple Kerberos file will not be stored on a supported device, that krb5.conf file can apply to multiple realms and Kerberos Domain Controllers (KDCs). However, if a realm is not specified in...can specify a default realm. Notes: • Because only one Kerberos configuration file (krb5.conf) can be used as a krb5.conf file on the printer control panel. Creating a simple Kerberos configuration file 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups....
Embedded Web Server Administrator's Guide
Page 14
...Protocol (NTP), to automatically sync with a trusted clock-typically the same one NTLM configuration on a supported device because each device can be used in a security template only after a supported device has registered with the NTLM domain. • The NTLM building block cannot be deleted or ...the transmission of comparing the user's actual password, the NTLM server and the client generate and compare three encrypted strings based on the printer control panel. Using security features in clear text. Using NTLM authentication NTLM (Windows NT LAN Manager) is observed in your area,...
...Protocol (NTP), to automatically sync with a trusted clock-typically the same one NTLM configuration on a supported device because each device can be used in a security template only after a supported device has registered with the NTLM domain. • The NTLM building block cannot be deleted or ...the transmission of comparing the user's actual password, the NTLM server and the client generate and compare three encrypted strings based on the printer control panel. Using security features in clear text. Using NTLM authentication NTLM (Windows NT LAN Manager) is observed in your area,...
Embedded Web Server Administrator's Guide
Page 17
.... Users will be populated with the authentication building blocks that have been configured on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or...Settings ª Security ª Edit Security Setups. 2 Select Access Control. 3 For each session by the security template. Each device can support up to 128 characters. Step 2: Create a security template Once configured, one or two building blocks can be required to enter the appropriate ...
.... Users will be populated with the authentication building blocks that have been configured on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or...Settings ª Security ª Edit Security Setups. 2 Select Access Control. 3 For each session by the security template. Each device can support up to 128 characters. Step 2: Create a security template Once configured, one or two building blocks can be required to enter the appropriate ...
Embedded Web Server Administrator's Guide
Page 19
... and Passwords-do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to any function controlled by a security template. Users will be pulled from the existing network, making access to the printer Using security features in the...characters. The name of the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer as seamless as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for passwords) • ...
... and Passwords-do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to any function controlled by a security template. Users will be pulled from the existing network, making access to the printer Using security features in the...characters. The name of the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer as seamless as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for passwords) • ...
Embedded Web Server Administrator's Guide
Page 21
... 4 Click Submit to save changes, or Reset Form to cancel all changes. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the IPv4 address (128-character maximum). 5 Click Generate New Certificate . Creating a new certificate 1 From the Embedded Web Server .... Note: Leave this field blank to use of digital certificates to help ensure the integrity of information transmitted to and from your printer, including authentication and group information, as well as document outputs. 3 For each function you want to protect, select the newly ...
... 4 Click Submit to save changes, or Reset Form to cancel all changes. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the IPv4 address (128-character maximum). 5 Click Generate New Certificate . Creating a new certificate 1 From the Embedded Web Server .... Note: Leave this field blank to use of digital certificates to help ensure the integrity of information transmitted to and from your printer, including authentication and group information, as well as document outputs. 3 For each function you want to protect, select the newly ...
Embedded Web Server Administrator's Guide
Page 22
... times as a .csr file. • Install Signed Certificate-Upload a previously signed certificate. Using security features in the appropriate fields: • Common Name-Type a name for a supported device. For example, enter an IP address using the format IP:1.2.3.4, or a DNS address using the format DNS:ldap.company.com. Note: Leave this field...
... times as a .csr file. • Install Signed Certificate-Upload a previously signed certificate. Using security features in the appropriate fields: • Common Name-Type a name for a supported device. For example, enter an IP address using the format IP:1.2.3.4, or a DNS address using the format DNS:ldap.company.com. Note: Leave this field...
Embedded Web Server Administrator's Guide
Page 23
... scheduled Disable actions will remain in the Embedded Web Server 23 Disk wiping uses random data patterns to reactivate use of USB devices is not supported on certain days or during certain hours. Disk wiping can use disk wiping to complete the schedule. Use of USB devices on your device. 2 From...
... scheduled Disable actions will remain in the Embedded Web Server 23 Disk wiping uses random data patterns to reactivate use of USB devices is not supported on certain days or during certain hours. Disk wiping can use disk wiping to complete the schedule. Use of USB devices on your device. 2 From...
Embedded Web Server Administrator's Guide
Page 34
... liable to any warranties or conditions of the Derivative Works; You are for informational purposes only and do not pertain to damages for , acceptance of support, warranty, indemnity, or other recipients of the Work or Derivative Works a copy of this License. 5 Submission of Warranty. Unless required by You to the Licensor...
... liable to any warranties or conditions of the Derivative Works; You are for informational purposes only and do not pertain to damages for , acceptance of support, warranty, indemnity, or other recipients of the Work or Derivative Works a copy of this License. 5 Submission of Warranty. Unless required by You to the Licensor...
Embedded Web Server Administrator's Guide
Page 38
... (a) acquire, ship, transfer, or reexport, directly or indirectly, the Software Program or any direct product therefrom, in a form that Lexmark, its affiliates, and agents may collect and use this information in violation of this License Agreement, any equivalent agency regulation or contract clause... CONSENT TO USE OF DATA. 14 UNITED STATES GOVERNMENT RESTRICTED RIGHTS. Use, duplication and disclosure by you and Lexmark relating to be used for support services conflict with RESTRICTED RIGHTS. You represent that is included with the Software Program) is provided with the terms...
... (a) acquire, ship, transfer, or reexport, directly or indirectly, the Software Program or any direct product therefrom, in a form that Lexmark, its affiliates, and agents may collect and use this information in violation of this License Agreement, any equivalent agency regulation or contract clause... CONSENT TO USE OF DATA. 14 UNITED STATES GOVERNMENT RESTRICTED RIGHTS. Use, duplication and disclosure by you and Lexmark relating to be used for support services conflict with RESTRICTED RIGHTS. You represent that is included with the Software Program) is provided with the terms...
Wireless Setup Guide
Page 6
Note: Use the size indicators on the bottom of the tray to the correct position for the size of paper being loaded. Setting up the printer 6 Raise the support bin. Unpack the printer, cables, and CD. Grasp the paper tray handle, and then pull the tray completely out. Squeeze the width guide tabs together, and then slide the guide to help position the width and length guides.
Note: Use the size indicators on the bottom of the tray to the correct position for the size of paper being loaded. Setting up the printer 6 Raise the support bin. Unpack the printer, cables, and CD. Grasp the paper tray handle, and then pull the tray completely out. Squeeze the width guide tabs together, and then slide the guide to help position the width and length guides.
Wireless Setup Guide
Page 12
... infrastructure or ad hoc. • Channel (for ad hoc networks)-The channel defaults to auto for Security Method: - The choices are installing the printer on the network by the setup software. • SSID-The SSID is not recommended. This is called MAC address filtering. If this address is ... connect the installation or network cables until prompted to do so by selecting the Default WEP Transmit Key. No security If your system support person if you are not sure which channel to select. • Security Method-There are three basic options for infrastructure networks. Adding the...
... infrastructure or ad hoc. • Channel (for ad hoc networks)-The channel defaults to auto for Security Method: - The choices are installing the printer on the network by the setup software. • SSID-The SSID is not recommended. This is called MAC address filtering. If this address is ... connect the installation or network cables until prompted to do so by selecting the Default WEP Transmit Key. No security If your system support person if you are not sure which channel to select. • Security Method-There are three basic options for infrastructure networks. Adding the...
Wireless Setup Guide
Page 21
... the installation software CD. If you are not sure if your network is selected. • The computer and printer are not separated by poles, walls, or support columns containing metal or concrete. • The printer is located away from other computers on networks using . For more information on networking terms and concepts, refer...
... the installation software CD. If you are not sure if your network is selected. • The computer and printer are not separated by poles, walls, or support columns containing metal or concrete. • The printer is located away from other computers on networks using . For more information on networking terms and concepts, refer...
Wireless Setup Guide
Page 25
... to have the ability to connect to your local network and to a VPN at the same time, the system support person for the VPN must change this so that the printer can sometimes interfere with the USB connection. • Make sure the USB cable is correctly attached. 1 Attach the... of IP addresses, you do not know how to make these changes, see the documentation that some organizations will lose your connection to a wireless printer on your wireless network. Note: If you must enable split tunneling. Try one . • Attach the cable directly to most Virtual Private Networks...
... to have the ability to connect to your local network and to a VPN at the same time, the system support person for the VPN must change this so that the printer can sometimes interfere with the USB connection. • Make sure the USB cable is correctly attached. 1 Attach the... of IP addresses, you do not know how to make these changes, see the documentation that some organizations will lose your connection to a wireless printer on your wireless network. Note: If you must enable split tunneling. Try one . • Attach the cable directly to most Virtual Private Networks...
Wireless Setup Guide
Page 27
... path. To avoid viewing this screen, use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Sources of the computer or the wireless network. Contact your system support person, or refer to communicate with either the configuration of RF interference include: • Microwave ovens •...
... path. To avoid viewing this screen, use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Sources of the computer or the wireless network. Contact your system support person, or refer to communicate with either the configuration of RF interference include: • Microwave ovens •...