Embedded Web Server Administrator's Guide
Page 2
...countries. For Lexmark technical support, visit support.lexmark.com. Evaluation and verification of operation in conjunction with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the products or the programs described may be made to you can contact Lexmark by the... or implied warranties in which it operates. All other products, programs, or services, except those expressly designated by mail: Lexmark International, Inc. Some states do not imply that product, program, or service may be used instead. Any functionally equivalent product...
...countries. For Lexmark technical support, visit support.lexmark.com. Evaluation and verification of operation in conjunction with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the products or the programs described may be made to you can contact Lexmark by the... or implied warranties in which it operates. All other products, programs, or services, except those expressly designated by mail: Lexmark International, Inc. Some states do not imply that product, program, or service may be used instead. Any functionally equivalent product...
Embedded Web Server Administrator's Guide
Page 6
..., and functions come with Groups Authentication and authorization Password Authorization only PIN Authorization only Each device can support up to 32 groups to be used in some multifunction printers, over 40 individual menus and functions can be set of users needing access to similar functions. How...Access Controls" on page 29. Note: For a list of individual Access Controls and what they need to print in color, but in sales and marketing use color every day. Individually, building blocks, groups, and access controls may not meet the needs of Embedded Web Server security,...
..., and functions come with Groups Authentication and authorization Password Authorization only PIN Authorization only Each device can support up to 32 groups to be used in some multifunction printers, over 40 individual menus and functions can be set of users needing access to similar functions. How...Access Controls" on page 29. Note: For a list of individual Access Controls and what they need to print in color, but in sales and marketing use color every day. Individually, building blocks, groups, and access controls may not meet the needs of Embedded Web Server security,...
Embedded Web Server Administrator's Guide
Page 7
Clicking Delete List will delete all passwords on each supported device. Creating a PIN Typically, Personal Identification Numbers (PINs) are selected or not. Using security features in the Setup Name box. Note: Selecting the Admin Password ...
Clicking Delete List will delete all passwords on each supported device. Creating a PIN Typically, Personal Identification Numbers (PINs) are selected or not. Using security features in the Setup Name box. Note: Selecting the Admin Password ...
Embedded Web Server Administrator's Guide
Page 8
...-8 characters. 5 Click Add. 6 Repeat steps 4 through 5 to add additional user groups. You can use with one or more than one internal account building block per supported device. Using security features in the field above. • E-mail-Type the user's E-mail address (example: "[email protected]"). • Groups-Select the groups to...
...-8 characters. 5 Click Add. 6 Repeat steps 4 through 5 to add additional user groups. You can use with one or more than one internal account building block per supported device. Using security features in the field above. • E-mail-Type the user's E-mail address (example: "[email protected]"). • Groups-Select the groups to...
Embedded Web Server Administrator's Guide
Page 9
... LDAP Lightweight Directory Access Protocol (LDAP) is a standards-based, cross-platform, extensible protocol that prevents the printer from communicating with the LDAP server. Notes: • Supported devices can interact with many different kinds of an outage that runs directly on top of the TCP/IP ... configurations. Each configuration must have a unique name. • Administrators can create up to 32 user-defined groups that relies on the printer control panel. Multiple search bases may be performed. • Server Port-The port used to specify the information a user must submit ...
... LDAP Lightweight Directory Access Protocol (LDAP) is a standards-based, cross-platform, extensible protocol that prevents the printer from communicating with the LDAP server. Notes: • Supported devices can interact with many different kinds of an outage that runs directly on top of the TCP/IP ... configurations. Each configuration must have a unique name. • Administrators can create up to 32 user-defined groups that relies on the printer control panel. Multiple search bases may be performed. • Server Port-The port used to specify the information a user must submit ...
Embedded Web Server Administrator's Guide
Page 11
...by the Embedded Web Server to communicate with a Kerberos server to obtain a Kerberos "ticket." Multiple search bases may be configured. • Supported devices can store a maximum of authenticating directly with the LDAP server, the user will be performed. • Server Port-The port used ... an LDAP server using the GSSAPI protocol for networks running Active Directory. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular ...
...by the Embedded Web Server to communicate with a Kerberos server to obtain a Kerberos "ticket." Multiple search bases may be configured. • Supported devices can store a maximum of authenticating directly with the LDAP server, the user will be performed. • Server Port-The port used ... an LDAP server using the GSSAPI protocol for networks running Active Directory. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular ...
Embedded Web Server Administrator's Guide
Page 13
...that relies on an external server, users will not be able to access protected device functions in the event of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup ... device, or Reset Form to handle all such requests. Notes: • Because only one Kerberos configuration file (krb5.conf) can be stored on a supported device, that krb5.conf file can specify a default realm. While only one krb5.conf file is used, uploading or re-submitting a simple Kerberos file ...
...that relies on an external server, users will not be able to access protected device functions in the event of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup ... device, or Reset Form to handle all such requests. Notes: • Because only one Kerberos configuration file (krb5.conf) can be stored on a supported device, that krb5.conf file can specify a default realm. While only one krb5.conf file is used, uploading or re-submitting a simple Kerberos file ...
Embedded Web Server Administrator's Guide
Page 14
...of an outage that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be deleted or unregistered if it is being used in a security template only after a supported device has registered with the NTLM domain. • The NTLM building block cannot be in... check box, and then use Network Time Protocol (NTP), to automatically sync with a trusted clock-typically the same one NTLM configuration on a supported device because each session by the Kerberos server. 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Set...
...of an outage that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be deleted or unregistered if it is being used in a security template only after a supported device has registered with the NTLM domain. • The NTLM building block cannot be in... check box, and then use Network Time Protocol (NTP), to automatically sync with a trusted clock-typically the same one NTLM configuration on a supported device because each session by the Kerberos server. 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Set...
Embedded Web Server Administrator's Guide
Page 17
...list will now be required to enter the appropriate credentials in order to gain access to any function controlled by selecting Log out on the printer control panel. • For a list of Access Controls" on page 29. Hold down list next to the name of up to ... created security template from the list. 4 Edit the fields as Passwords and Pins-do , see "Menu of individual Access Controls and what they do not support separate authorization. 7 To use a descriptive name, such as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for ...
...list will now be required to enter the appropriate credentials in order to gain access to any function controlled by selecting Log out on the printer control panel. • For a list of Access Controls" on page 29. Hold down list next to the name of up to ... created security template from the list. 4 Edit the fields as Passwords and Pins-do , see "Menu of individual Access Controls and what they do not support separate authorization. 7 To use a descriptive name, such as "Administrator _ Only", or "Common _ Functions _ Template." 5 From the Authentication list, select a method for ...
Embedded Web Server Administrator's Guide
Page 19
... of the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer Using security features in order to gain access to use authorization, click Add authorization, and then select a building block from the drop-down... populated with the authorization building blocks available on the device. 6 To use a descriptive name, such as PINs and Passwords-do not support separate authorization. 7 To use the LDAP+GSSAPI capabilities of the Embedded Web Server to include in the security template. Scenario: Network running...
... of the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer Using security features in order to gain access to use authorization, click Add authorization, and then select a building block from the drop-down... populated with the authorization building blocks available on the device. 6 To use a descriptive name, such as PINs and Passwords-do not support separate authorization. 7 To use the LDAP+GSSAPI capabilities of the Embedded Web Server to include in the security template. Scenario: Network running...
Embedded Web Server Administrator's Guide
Page 21
...Server Home screen, browse to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. Creating a new certificate 1 From the Embedded Web Server Home screen, browse ... DNS address using the format DNS:ldap.company.com. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the hostname for the device. • Organization Name-Type the name of the company or organization issuing ...
...Server Home screen, browse to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. Creating a new certificate 1 From the Embedded Web Server Home screen, browse ... DNS address using the format DNS:ldap.company.com. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the hostname for the device. • Organization Name-Type the name of the company or organization issuing ...
Embedded Web Server Administrator's Guide
Page 22
... certificate. Note: All fields accept a maximum of the unit within the company or organization issuing the certificate. • Country Name-Type the country location for a supported device. Using security features in the appropriate fields: • Common Name-Type a name for Max Invalid PIN: • Select 0 to allow users to RFC 2459...
... certificate. Note: All fields accept a maximum of the unit within the company or organization issuing the certificate. • Country Name-Type the country location for a supported device. Using security features in the appropriate fields: • Common Name-Type a name for Max Invalid PIN: • Select 0 to allow users to RFC 2459...
Embedded Web Server Administrator's Guide
Page 23
... ª Security ª Schedule USB Devices. 2 Under Schedule USB Devices, choose whether to securely overwrite files stored on a scheduled basis. Multi-pass wiping is not supported on certain days or during certain hours. 3 Select an option for Job Expiration: • Select Off to allow unprinted confidential print jobs to remain in...
... ª Security ª Schedule USB Devices. 2 Under Schedule USB Devices, choose whether to securely overwrite files stored on a scheduled basis. Multi-pass wiping is not supported on certain days or during certain hours. 3 Select an option for Job Expiration: • Select Off to allow unprinted confidential print jobs to remain in...
Embedded Web Server Administrator's Guide
Page 34
..., and only if You agree to any additional terms or conditions. This License does not grant permission to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other commercial damages or losses), even if such Contributor has been advised of the possibility of the Work otherwise complies with this...
..., and only if You agree to any additional terms or conditions. This License does not grant permission to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other commercial damages or losses), even if such Contributor has been advised of the possibility of the Work otherwise complies with this...
Embedded Web Server Administrator's Guide
Page 38
...extent such extraneous terms do not conflict with the terms of this information in relation to support services performed with respect to the Software Program and requested by you and Lexmark relating to be used for herein, these terms and conditions supersede all prior or contemporaneous...that is included with RESTRICTED RIGHTS. Notices 38 You may collect and use this License Agreement, the terms of any Lexmark policies or programs for support services conflict with the terms of this License Agreement shall control. 14 UNITED STATES GOVERNMENT RESTRICTED RIGHTS. Except as set...
...extent such extraneous terms do not conflict with the terms of this information in relation to support services performed with respect to the Software Program and requested by you and Lexmark relating to be used for herein, these terms and conditions supersede all prior or contemporaneous...that is included with RESTRICTED RIGHTS. Notices 38 You may collect and use this License Agreement, the terms of any Lexmark policies or programs for support services conflict with the terms of this License Agreement shall control. 14 UNITED STATES GOVERNMENT RESTRICTED RIGHTS. Except as set...
Wireless Setup Guide
Page 6
Squeeze the width guide tabs together, and then slide the guide to the correct position for the size of the tray to help position the width and length guides. Unpack the printer, cables, and CD. Grasp the paper tray handle, and then pull the tray completely out. Setting up the printer 6 Raise the support bin. Note: Use the size indicators on the bottom of paper being loaded.
Squeeze the width guide tabs together, and then slide the guide to the correct position for the size of the tray to help position the width and length guides. Unpack the printer, cables, and CD. Grasp the paper tray handle, and then pull the tray completely out. Setting up the printer 6 Raise the support bin. Note: Use the size indicators on the bottom of paper being loaded.
Wireless Setup Guide
Page 12
..., then you may need to set up to four in use any security information. This is not recommended. WEP key If your system support person if you are not sure which channel to select. • Security Method-There are three basic options for the same type on ... hardware identification number to connect wirelessly 12 Select the key currently in the provided spaces. Encryption must be set on the wireless network, the printer will not work wirelessly. Check with matching MAC addresses can be set for Security Method: - WPA or WPA2 passphrase WPA includes encryption as ...
..., then you may need to set up to four in use any security information. This is not recommended. WEP key If your system support person if you are not sure which channel to select. • Security Method-There are three basic options for the same type on ... hardware identification number to connect wirelessly 12 Select the key currently in the provided spaces. Encryption must be set on the wireless network, the printer will not work wirelessly. Check with matching MAC addresses can be set for Security Method: - WPA or WPA2 passphrase WPA includes encryption as ...
Wireless Setup Guide
Page 21
... outlet. • The SSID is selected. • The computer and printer are not separated by poles, walls, or support columns containing metal or concrete. • The printer is located away from obstacles that : • The printer is within 100 feet (30 meters) of the printer. Remove any large metal objects between the access point and...
... outlet. • The SSID is selected. • The computer and printer are not separated by poles, walls, or support columns containing metal or concrete. • The printer is located away from obstacles that : • The printer is within 100 feet (30 meters) of the printer. Remove any large metal objects between the access point and...
Wireless Setup Guide
Page 25
...continue configuring your local network when connected to most Virtual Private Networks (VPNs). Try one . • Attach the cable directly to the computer and the printer. CHECK YOUR ADVANCED SECURITY SETTINGS • If you are using a new one or more of the computer, and may be a problem with the ...is not damaged. Note: If you do not know how to make these changes, see the documentation that the printer can sometimes interfere with only the VPN and no other network at the same time, the system support person for the VPN must change this so that came with the cable.
...continue configuring your local network when connected to most Virtual Private Networks (VPNs). Try one . • Attach the cable directly to the computer and the printer. CHECK YOUR ADVANCED SECURITY SETTINGS • If you are using a new one or more of the computer, and may be a problem with the ...is not damaged. Note: If you do not know how to make these changes, see the documentation that the printer can sometimes interfere with only the VPN and no other network at the same time, the system support person for the VPN must change this so that came with the cable.
Wireless Setup Guide
Page 27
...signal path. To avoid viewing this screen, use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Contact your system support person, or refer to your access point documentation for remote installations). Note: If you are unable to... • Garage door openers • Security cameras Note: Changing the wireless channel that network is correct. • Continue setting up the printer. Sources of that the network equipment is functioning properly: • Attempt to connect to other resources on the network. • Try pinging...
...signal path. To avoid viewing this screen, use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Contact your system support person, or refer to your access point documentation for remote installations). Note: If you are unable to... • Garage door openers • Security cameras Note: Changing the wireless channel that network is correct. • Continue setting up the printer. Sources of that the network equipment is functioning properly: • Attempt to connect to other resources on the network. • Try pinging...