Embedded Web Server Administrator's Guide
Page 2
... make these changes will be made to the information herein; All rights reserved. Trademarks Lexmark, Lexmark with diamond design, and MarkVision are the user's responsibility. © 2009 Lexmark International, Inc. therefore, this statement may be incorporated in the products or the programs...exclusively at any time. Some states do not imply that product, program, or service may be used instead. For Lexmark technical support, visit support.lexmark.com. Bldg 004-2/CSC 740 New Circle Road NW Lexington, KY 40550 References in certain transactions; Any functionally equivalent ...
... make these changes will be made to the information herein; All rights reserved. Trademarks Lexmark, Lexmark with diamond design, and MarkVision are the user's responsibility. © 2009 Lexmark International, Inc. therefore, this statement may be incorporated in the products or the programs...exclusively at any time. Some states do not imply that product, program, or service may be used instead. For Lexmark technical support, visit support.lexmark.com. Bldg 004-2/CSC 740 New Circle Road NW Lexington, KY 40550 References in certain transactions; Any functionally equivalent ...
Embedded Web Server Administrator's Guide
Page 6
...come with Groups Authentication and authorization Password Authorization only PIN Authorization only Each device can support up to 32 groups to be used to a common set using a building block,...it makes sense to in the Embedded Web Server 6 Using security features in some multifunction printers, over 40 individual menus and functions can be protected. Note: For a list of ... determines the type of security created: Building block Type of users needing access to print in color, but in association with one or more groups. How they need to similar functions. Access ...
...come with Groups Authentication and authorization Password Authorization only PIN Authorization only Each device can support up to 32 groups to be used to a common set using a building block,...it makes sense to in the Embedded Web Server 6 Using security features in some multifunction printers, over 40 individual menus and functions can be protected. Note: For a list of ... determines the type of security created: Building block Type of users needing access to print in color, but in association with one or more groups. How they need to similar functions. Access ...
Embedded Web Server Administrator's Guide
Page 7
... not. PINs can also be used to control access to document outputs, by a normal password, any administrator-level password will delete all passwords on each supported device. Each PIN must have a unique name consisting of 1-128 UTF-8 characters (example: "Copy Lockout PIN"). 5 Type a PIN in the Setup Name box. Configuring building...
... not. PINs can also be used to control access to document outputs, by a normal password, any administrator-level password will delete all passwords on each supported device. Each PIN must have a unique name consisting of 1-128 UTF-8 characters (example: "Copy Lockout PIN"). 5 Type a PIN in the Setup Name box. Configuring building...
Embedded Web Server Administrator's Guide
Page 8
... Accounts. 3 Select Setup groups for the account (example: "jsmith"). Note: Group names can use with one or more than one internal account building block per supported device. Defining user groups If using groups for the account. 4 Click Submit to save the new account, or Cancel to return to the Manage Internal...
... Accounts. 3 Select Setup groups for the account (example: "jsmith"). Note: Group names can use with one or more than one internal account building block per supported device. Defining user groups If using groups for the account. 4 Click Submit to save the new account, or Cancel to return to the Manage Internal...
Embedded Web Server Administrator's Guide
Page 9
...on an external server, users will not be able to access protected device functions in the event of an outage that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular LDAP ...on top of the TCP/IP layer, and is a standards-based, cross-platform, extensible protocol that runs directly on the printer control panel. Notes: • Supported devices can store a maximum of five unique LDAP configurations. Using security features in the LDAP server where user accounts reside. ...
...on an external server, users will not be able to access protected device functions in the event of an outage that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to securely end each particular LDAP ...on top of the TCP/IP layer, and is a standards-based, cross-platform, extensible protocol that runs directly on the printer control panel. Notes: • Supported devices can store a maximum of five unique LDAP configurations. Using security features in the LDAP server where user accounts reside. ...
Embedded Web Server Administrator's Guide
Page 11
...the IP Address or the Host Name of authenticating directly with the LDAP server, the user will not be configured. • Supported devices can store a maximum of simple LDAP authentication because the transmission is then presented to an LDAP server using the GSSAPI protocol ... always secure. Using security features in the LDAP server where user accounts reside. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to test. Multiple search bases may ...
...the IP Address or the Host Name of authenticating directly with the LDAP server, the user will not be configured. • Supported devices can store a maximum of simple LDAP authentication because the transmission is then presented to an LDAP server using the GSSAPI protocol ... always secure. Using security features in the LDAP server where user accounts reside. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with the authenticating server. • To help prevent unauthorized access, users are encouraged to test. Multiple search bases may ...
Embedded Web Server Administrator's Guide
Page 13
... specify a default realm. While only one krb5.conf file is functional. Notes: • Because only one Kerberos configuration file (krb5.conf) can be stored on a supported device, that the Kerberos configuration file for the selected device. • Click Test Setup to verify that krb5.conf file can be used by itself... Setups. 2 Under Edit Building Blocks, select Kerberos 5. 3 Type the KDC (Key Distribution Center) address or hostname in the event of an outage that prevents the printer from the selected device. • Click View File to verify that relies on the...
... specify a default realm. While only one krb5.conf file is functional. Notes: • Because only one Kerberos configuration file (krb5.conf) can be stored on a supported device, that the Kerberos configuration file for the selected device. • Click Test Setup to verify that krb5.conf file can be used by itself... Setups. 2 Under Edit Building Blocks, select Kerberos 5. 3 Type the KDC (Key Distribution Center) address or hostname in the event of an outage that prevents the printer from the selected device. • Click View File to verify that relies on the...
Embedded Web Server Administrator's Guide
Page 14
... security template only after a supported device has registered with the KDC system clock. Using NTLM authentication NTLM (Windows NT LAN Manager) is Microsoft's solution for enabling authentication without requiring the transmission of an outage that prevents the printer from communicating with the authenticating server... check box. 4 If you are encouraged to automatically sync with a trusted clock-typically the same one NTLM configuration on a supported device because each session by the Kerberos server. 1 From the Embedded Web Server Home screen, browse to restore default values. ...
... security template only after a supported device has registered with the KDC system clock. Using NTLM authentication NTLM (Windows NT LAN Manager) is Microsoft's solution for enabling authentication without requiring the transmission of an outage that prevents the printer from communicating with the authenticating server... check box. 4 If you are encouraged to automatically sync with a trusted clock-typically the same one NTLM configuration on a supported device because each session by the Kerberos server. 1 From the Embedded Web Server Home screen, browse to restore default values. ...
Embedded Web Server Administrator's Guide
Page 17
...Under Edit Security Templates, select Security Templates. 3 Select a security template from one or more groups to cancel all changes. It can support up to retain previously configured values. This list will now be populated with the authentication building blocks that function. 4 Click Submit to ...characters. Users will be required to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use authorization, click Add authorization, and then select a ...
...Under Edit Security Templates, select Security Templates. 3 Select a security template from one or more groups to cancel all changes. It can support up to retain previously configured values. This list will now be populated with the authentication building blocks that function. 4 Click Submit to ...characters. Users will be required to any function controlled by selecting Log out on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use authorization, click Add authorization, and then select a ...
Embedded Web Server Administrator's Guide
Page 19
...in the security template. User credentials and group designations can be pulled from the existing network, making access to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to know the ... the name of the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer Using security features in order to gain access to select multiple groups. 8 Click Save Template. Step 2: Create a security template 1 From the...
...in the security template. User credentials and group designations can be pulled from the existing network, making access to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use groups, click Modify Groups, and then select one or more groups to know the ... the name of the Realm (or domain) where the KDC is located • The Kerberos username (distinguished name) and password assigned to the printer Using security features in order to gain access to select multiple groups. 8 Click Save Template. Step 2: Create a security template 1 From the...
Embedded Web Server Administrator's Guide
Page 21
...in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. 3 For each function you want to protect, select the newly created security ...Web Server Home screen, browse to and from the list. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the hostname for the device. • Organization Name-Type the name of the company or organization issuing the ...
...in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. 3 For each function you want to protect, select the newly created security ...Web Server Home screen, browse to and from the list. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the hostname for the device. • Organization Name-Type the name of the company or organization issuing the ...
Embedded Web Server Administrator's Guide
Page 22
... is located. • Subject Alternate Name-Type the alternate name and prefix that they remain in the appropriate fields: • Common Name-Type a name for a supported device. Leave this field blank to use the confidential print option, which allows print jobs to be present in all new certificates generated in the...
... is located. • Subject Alternate Name-Type the alternate name and prefix that they remain in the appropriate fields: • Common Name-Type a name for a supported device. Leave this field blank to use the confidential print option, which allows print jobs to be present in all new certificates generated in the...
Embedded Web Server Administrator's Guide
Page 23
... patterns to reset both fields. Setting up memory space. Note: If you do not see Disk Wiping in the main Security menu, it is not supported on the hard drive that an unprinted confidential print job will return you to the main Security menu, where you must again select Disk Wiping...
... patterns to reset both fields. Setting up memory space. Note: If you do not see Disk Wiping in the main Security menu, it is not supported on the hard drive that an unprinted confidential print job will return you to the main Security menu, where you must again select Disk Wiping...
Embedded Web Server Administrator's Guide
Page 34
... IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of this License. 5 Submission of support, warranty, indemnity, or other commercial damages or losses), even if such Contributor has been advised of the possibility of your accepting any other recipients of...
... IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of this License. 5 Submission of support, warranty, indemnity, or other commercial damages or losses), even if such Contributor has been advised of the possibility of your accepting any other recipients of...
Embedded Web Server Administrator's Guide
Page 38
... to be used for any Lexmark policies or programs for herein, these terms and conditions supersede all prior or contemporaneous oral or written communications, proposals, and representations with respect to restrictions as otherwise provided for support services conflict with RESTRICTED RIGHTS.... the Software Program or any direct product therefrom, in relation to support services performed with respect to provide such services. 16 EXPORT RESTRICTIONS. Lexmark agrees not to use information you and Lexmark relating to the Software Program. You may collect and use this information...
... to be used for any Lexmark policies or programs for herein, these terms and conditions supersede all prior or contemporaneous oral or written communications, proposals, and representations with respect to restrictions as otherwise provided for support services conflict with RESTRICTED RIGHTS.... the Software Program or any direct product therefrom, in relation to support services performed with respect to provide such services. 16 EXPORT RESTRICTIONS. Lexmark agrees not to use information you and Lexmark relating to the Software Program. You may collect and use this information...
Wireless Setup Guide
Page 6
Squeeze the width guide tabs together, and then slide the guide to the correct position for the size of the tray to help position the width and length guides. Grasp the paper tray handle, and then pull the tray completely out. Note: Use the size indicators on the bottom of paper being loaded. Setting up the printer 6 Raise the support bin. Unpack the printer, cables, and CD.
Squeeze the width guide tabs together, and then slide the guide to the correct position for the size of the tray to help position the width and length guides. Grasp the paper tray handle, and then pull the tray completely out. Note: Use the size indicators on the bottom of paper being loaded. Setting up the printer 6 Raise the support bin. Unpack the printer, cables, and CD.
Wireless Setup Guide
Page 12
.... When installing the printer on a network that uses MAC address filtering, be set on a wireless router so that only those devices with your network uses more information on configuring 802.1X security, see the Networking Guide on the network. - WEP key If your system support person if you will... not have any type of security. or - If you are installing the printer on a wireless network Note: Do not connect the installation or network cables until prompted to do...
.... When installing the printer on a network that uses MAC address filtering, be set on a wireless router so that only those devices with your network uses more information on configuring 802.1X security, see the Networking Guide on the network. - WEP key If your system support person if you will... not have any type of security. or - If you are installing the printer on a wireless network Note: Do not connect the installation or network cables until prompted to do...
Wireless Setup Guide
Page 21
..., security system cameras, other electronic devices that : • The printer is secure). If you are performing a task. • The correct printer port is selected. • The computer and printer are not separated by poles, walls, or support columns containing metal or concrete. • The printer is located away from other wireless networks, and some Bluetooth...
..., security system cameras, other electronic devices that : • The printer is secure). If you are performing a task. • The correct printer port is selected. • The computer and printer are not separated by poles, walls, or support columns containing metal or concrete. • The printer is located away from other wireless networks, and some Bluetooth...
Wireless Setup Guide
Page 25
...Private Network (VPN) You will not allow users to communicate with only the VPN and no other network at the same time, the system support person for the VPN must change this so that came with the cable. Wireless configuration does not continue after the USB cable is not ...time. Hubs, switch boxes, and docking stations can be on your computer. Try one . • Attach the cable directly to the computer and the printer. If there is correctly attached. 1 Attach the large, rectangular connector to any visible damage to the USB cable, try using MAC address filtering to limit...
...Private Network (VPN) You will not allow users to communicate with only the VPN and no other network at the same time, the system support person for the VPN must change this so that came with the cable. Wireless configuration does not continue after the USB cable is not ...time. Hubs, switch boxes, and docking stations can be on your computer. Try one . • Attach the cable directly to the computer and the printer. If there is correctly attached. 1 Attach the large, rectangular connector to any visible damage to the USB cable, try using MAC address filtering to limit...
Wireless Setup Guide
Page 27
... wireless setup 27 To avoid viewing this screen, use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Contact your system support person, or refer to your access point documentation for the remote network. Note: If you are unable to communicate with devices on ...equipment is functioning properly: • Attempt to connect to other resources on the network. • Try pinging or logging on the last screen, but the printer will join the remote network when it is moved within proximity of the computer or the wireless network. THE...
... wireless setup 27 To avoid viewing this screen, use the Advanced installation method and select Do not verify the printer can help resolve interference issues. Contact your system support person, or refer to your access point documentation for the remote network. Note: If you are unable to communicate with devices on ...equipment is functioning properly: • Attempt to connect to other resources on the network. • Try pinging or logging on the last screen, but the printer will join the remote network when it is moved within proximity of the computer or the wireless network. THE...