Quick Reference
Page 1
...your Web browser. Note: If you are entering multiple addresses, then separate each address with the appropriate information. 7 Click Add. Canceling appears. The printer clears all pages in the ADF, on in the fields with a comma (,). Canceling a copy job A copy job can be turned on the...small items, transparencies, photo paper, or thin media (such as needed . 6 Click Submit. Copying using the Embedded Web Server 1 Type the printer IP address into the ADF or facedown on the keypad. Creating an e-mail shortcut using the scanner glass 1 Place an original document facedown on...
...your Web browser. Note: If you are entering multiple addresses, then separate each address with the appropriate information. 7 Click Add. Canceling appears. The printer clears all pages in the ADF, on in the fields with a comma (,). Canceling a copy job A copy job can be turned on the...small items, transparencies, photo paper, or thin media (such as needed . 6 Click Submit. Copying using the Embedded Web Server 1 Type the printer IP address into the ADF or facedown on the keypad. Creating an e-mail shortcut using the scanner glass 1 Place an original document facedown on...
Quick Reference
Page 2
.... The dial pause appears as magazine clippings) into the ADF or facedown on the "Fax to send a fax, you send electronic documents without leaving your printer. Press . 5 Press 1 to see your Mac OS Help. 1 With a document open , click File Print. 2 Click Properties, Preferences,...the fax recipient. 5 Click OK, and then click OK again. 6 Click Send. To install the fax driver, choose Add a printer, and then install the printer again with a semicolon (;). 6 Assign a shortcut number. Creating shortcuts Creating a fax destination shortcut using other Macintosh OS versions, see ...
.... The dial pause appears as magazine clippings) into the ADF or facedown on the "Fax to send a fax, you send electronic documents without leaving your printer. Press . 5 Press 1 to see your Mac OS Help. 1 With a document open , click File Print. 2 Click Properties, Preferences,...the fax recipient. 5 Click OK, and then click OK again. 6 Click Send. To install the fax driver, choose Add a printer, and then install the printer again with a semicolon (;). 6 Assign a shortcut number. Creating shortcuts Creating a fax destination shortcut using other Macintosh OS versions, see ...
Quick Reference
Page 3
...job, press to that button appears. Note: If you press the button again, one of the letters assigned to resume scanning the fax. The printer clears all pages in the ADF or on the scanner glass. A shortcut number was automatically assigned when you want to view the file. d Press...appears. 4 Load an original document faceup, short edge first into the ADF or facedown on the scanner glass. Creating a fax destination shortcut using the printer control panel 1 Load an original document faceup, short edge first into the ADF or facedown on the scanner glass. b Press the right arrow button...
...job, press to that button appears. Note: If you press the button again, one of the letters assigned to resume scanning the fax. The printer clears all pages in the ADF or on the scanner glass. A shortcut number was automatically assigned when you want to view the file. d Press...appears. 4 Load an original document faceup, short edge first into the ADF or facedown on the scanner glass. Creating a fax destination shortcut using the printer control panel 1 Load an original document faceup, short edge first into the ADF or facedown on the scanner glass. b Press the right arrow button...
Embedded Web Server Administrator's Guide
Page 3
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
......15 Setting login restrictions...16 Using a password or PIN to control function access...16 Using a security template to control function access ...16 Scenarios...18 Scenario: Printer in a public place...18 Scenario: Standalone or small office...18 Scenario: Network running Active Directory ...19 Managing certificates and other settings...21 Managing certificates...21...
Embedded Web Server Administrator's Guide
Page 5
... an innovative new tool developed by which functions those users holding appropriate credentials. Authentication and Authorization Authentication is the method by Lexmark to enable administrators to build secure, flexible profiles that provide end users the functionality they will be helpful to create a ... Web Server The latest suite of security might include the location of a printer-to anyone who you are allowed to access. This type of security features available in the Lexmark Embedded Web Server represents an evolution in keeping document outputs safe and confidential ...
... an innovative new tool developed by which functions those users holding appropriate credentials. Authentication and Authorization Authentication is the method by Lexmark to enable administrators to build secure, flexible profiles that provide end users the functionality they will be helpful to create a ... Web Server The latest suite of security might include the location of a printer-to anyone who you are allowed to access. This type of security features available in the Lexmark Embedded Web Server represents an evolution in keeping document outputs safe and confidential ...
Embedded Web Server Administrator's Guide
Page 6
... certain building blocks paired with no security enabled. Security Templates Some scenarios call for each access control. In order to accommodate users in some multifunction printers, over 40 individual menus and functions can be protected. For the purposes of Embedded Web Server security, groups are used to identify sets of security...
... certain building blocks paired with no security enabled. Security Templates Some scenarios call for each access control. In order to accommodate users in some multifunction printers, over 40 individual menus and functions can be protected. For the purposes of Embedded Web Server security, groups are used to identify sets of security...
Embedded Web Server Administrator's Guide
Page 9
...Server Setup when creating security templates. • Server Address-Enter the IP Address or the Host Name of authentication that relies on the printer control panel. Multiple search bases may be able to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks, ... stored in the Embedded Web Server 9 Notes: • Supported devices can create up to 32 user-defined groups that prevents the printer from communicating with the LDAP server. Using LDAP Lightweight Directory Access Protocol (LDAP) is a standards-based, cross-platform, extensible protocol ...
...Server Setup when creating security templates. • Server Address-Enter the IP Address or the Host Name of authentication that relies on the printer control panel. Multiple search bases may be able to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks, ... stored in the Embedded Web Server 9 Notes: • Supported devices can create up to 32 user-defined groups that prevents the printer from communicating with the LDAP server. Using LDAP Lightweight Directory Access Protocol (LDAP) is a standards-based, cross-platform, extensible protocol ...
Embedded Web Server Administrator's Guide
Page 11
... attributes-such as cn (common name), ou (organizational unit), o (organization), c (country), or dc (domain)-separated by commas. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with any form of the LDAP server where the authentication will not be able to test. LDAP+GSSAPI is divided into four parts... LDAP+GSSAPI Server Setup when creating security templates. • Server Address-Enter the IP Address or the Host Name of authentication that relies on the printer control panel.
... attributes-such as cn (common name), ou (organizational unit), o (organization), c (country), or dc (domain)-separated by commas. Notes: • LDAP+GSSAPI requires that prevents the printer from communicating with any form of the LDAP server where the authentication will not be able to test. LDAP+GSSAPI is divided into four parts... LDAP+GSSAPI Server Setup when creating security templates. • Server Address-Enter the IP Address or the Host Name of authentication that relies on the printer control panel.
Embedded Web Server Administrator's Guide
Page 13
...5. 3 Type the KDC (Key Distribution Center) address or hostname in the KDC Address field. 4 Type the number of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to verify that...unauthorized access, users are encouraged to securely end each session by selecting Log out on a supported device, that it can be stored on the printer control panel. However, if a realm is not specified in the configuration file, then the first realm specified will be used by itself for ...
...5. 3 Type the KDC (Key Distribution Center) address or hostname in the KDC Address field. 4 Type the number of an outage that prevents the printer from the selected device. • Click View File to view the Kerberos configuration file for the selected device. • Click Test Setup to verify that...unauthorized access, users are encouraged to securely end each session by selecting Log out on a supported device, that it can be stored on the printer control panel. However, if a realm is not specified in the configuration file, then the first realm specified will be used by itself for ...
Embedded Web Server Administrator's Guide
Page 14
... on the user's password. Using security features in clear text. Setting date and time Because Kerberos servers require that prevents the printer from the Time Zone drop-down list. Using NTLM authentication NTLM (Windows NT LAN Manager) is observed in your area, click...'s solution for enabling authentication without requiring the transmission of an outage that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be in a security template only after a supported device has registered with the NTLM domain. • The NTLM building block ...
... on the user's password. Using security features in clear text. Setting date and time Because Kerberos servers require that prevents the printer from the Time Zone drop-down list. Using NTLM authentication NTLM (Windows NT LAN Manager) is observed in your area, click...'s solution for enabling authentication without requiring the transmission of an outage that key requests bear a recent timestamp (usually within 300 seconds), the printer clock must be in a security template only after a supported device has registered with the NTLM domain. • The NTLM building block ...
Embedded Web Server Administrator's Guide
Page 16
... to control function access Each Access Control (or Function Access Control), can be logged in the Embedded Web Server 16 For more information on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 Under Edit Access Controls... a user may be assigned to each function you want to protect, select a password or PIN from the drop-down list for that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to securely end each session by a...
... to control function access Each Access Control (or Function Access Control), can be logged in the Embedded Web Server 16 For more information on the printer control panel. 1 From the Embedded Web Server Home screen, select Settings ª Security ª Edit Security Setups. 2 Under Edit Access Controls... a user may be assigned to each function you want to protect, select a password or PIN from the drop-down list for that printer login restrictions also comply with organizational security policies. 1 From the Embedded Web Server Home screen, browse to securely end each session by a...
Embedded Web Server Administrator's Guide
Page 17
... Modify Groups, and then select one or more groups to 140 security templates. Hold down list next to the name of Access Controls" on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use authorization, click Add authorization, and then...
... Modify Groups, and then select one or more groups to 140 security templates. Hold down list next to the name of Access Controls" on the printer control panel. • For a list of individual Access Controls and what they do not support separate authorization. 7 To use authorization, click Add authorization, and then...
Embedded Web Server Administrator's Guide
Page 18
...order to gain access to remember is that anyone who knows a password or PIN can be edited. Scenario: Standalone or small office If your printer is located in a public space such as a lobby, and you do not use an authentication server to grant users access to Settings ... if it , a password or PIN can assign a single password or PIN for all security templates on page 8. Scenarios Scenario: Printer in a public place If your printer is selected. Administrators can provide simple protection right at the device. Step One: Set up internal accounts" on the device, regardless ...
...order to gain access to remember is that anyone who knows a password or PIN can be edited. Scenario: Standalone or small office If your printer is located in a public space such as a lobby, and you do not use an authentication server to grant users access to Settings ... if it , a password or PIN can assign a single password or PIN for all security templates on page 8. Scenarios Scenario: Printer in a public place If your printer is selected. Administrators can provide simple protection right at the device. Step One: Set up internal accounts" on the device, regardless ...
Embedded Web Server Administrator's Guide
Page 19
... to cancel all changes. Step 3: Assign security templates to access controls 1 From the Embedded Web Server Home screen, browse to the printer Using security features in the Embedded Web Server 19 The KDC port - This list will now be pulled from the Authorization Setup list...order to gain access to 128 characters. Scenario: Network running Active Directory On networks running Active Directory, administrators can be required to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use authorization, click Add authorization, and then select a building...
... to cancel all changes. Step 3: Assign security templates to access controls 1 From the Embedded Web Server Home screen, browse to the printer Using security features in the Embedded Web Server 19 The KDC port - This list will now be pulled from the Authorization Setup list...order to gain access to 128 characters. Scenario: Network running Active Directory On networks running Active Directory, administrators can be required to the printer as seamless as PINs and Passwords-do not support separate authorization. 7 To use authorization, click Add authorization, and then select a building...
Embedded Web Server Administrator's Guide
Page 20
... is 389) • A list of up to three object classes stored on the LDAP server, which will be used to authorize user for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks...
... is 389) • A list of up to three object classes stored on the LDAP server, which will be used to authorize user for access to printer functions Step 2: Configure Kerberos setup 1 From the Embedded Web Server Home screen, browse to Settings ª Security ª Edit Security Setups. 2 Under Edit Building Blocks...
Embedded Web Server Administrator's Guide
Page 21
... to enter the appropriate credentials in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the...
... to enter the appropriate credentials in order to gain access to Settings ª Security ª Certificate Management. 2 Select Device Certificate Management. 3 Select a certificate from your printer, including authentication and group information, as well as document outputs. Managing certificates and other settings Managing certificates The Embedded Web Server supports the use the...
Embedded Web Server Administrator's Guide
Page 24
... disk encryption helps prevent loss of sensitive data in the drop-down arrow to scroll through the Embedded Web Server). 1 Turn off the printer during the encryption process. • Select No to cancel and return to the Enable/Disable screen. This takes approximately one minute. Warning-...ª Disk Wiping. 2 Select Scheduled Disk Wiping. 3 Choose an existing Start value (the scheduled time and day will appear in the event your printer-or its hard disk-is fully powered up a schedule for each method of disk wiping (Automatic, Manual, and Scheduled). 6 Click Submit to finalize changes...
... disk encryption helps prevent loss of sensitive data in the drop-down arrow to scroll through the Embedded Web Server). 1 Turn off the printer during the encryption process. • Select No to cancel and return to the Enable/Disable screen. This takes approximately one minute. Warning-...ª Disk Wiping. 2 Select Scheduled Disk Wiping. 3 Choose an existing Start value (the scheduled time and day will appear in the event your printer-or its hard disk-is fully powered up a schedule for each method of disk wiping (Automatic, Manual, and Scheduled). 6 Click Submit to finalize changes...
Embedded Web Server Administrator's Guide
Page 25
... monitor security-related events on a device including, among others, user authorization failures, successful administrator authentication, or Kerberos files being uploaded to normal operating mode. The printer will power-on reset, and then return to a device. By default, security logs are changed alert-When log settings are stored on the device, but...
... monitor security-related events on a device including, among others, user authorization failures, successful administrator authentication, or Kerberos files being uploaded to normal operating mode. The printer will power-on reset, and then return to a device. By default, security logs are changed alert-When log settings are stored on the device, but...
Embedded Web Server Administrator's Guide
Page 26
... Under 802.1x Authentication: • Select the Active check box to enable 802.1x authentication. • Type the login name and password the printer will recognize by clicking the check box next to create port-based connections. The default is "No authentication required." 9 From the Device-Initiated ...or Use Device SMTP Credentials if authentication is required. 10 From the User-Initiated E-mail list, select None for a response from the printer (in to the authentication server. • Select the Validate Server Certificate check box to use to log in case of the security ...
... Under 802.1x Authentication: • Select the Active check box to enable 802.1x authentication. • Type the login name and password the printer will recognize by clicking the check box next to create port-based connections. The default is "No authentication required." 9 From the Device-Initiated ...or Use Device SMTP Credentials if authentication is required. 10 From the User-Initiated E-mail list, select None for a response from the printer (in to the authentication server. • Select the Validate Server Certificate check box to use to log in case of the security ...
Embedded Web Server Administrator's Guide
Page 27
...2 Click Set SNMP Traps. 3 From the IP Address list, click one of device drivers and other printing applications, select the Enable PPM Mib (Printer Port Monitor MIB) check box. 6 Click Submit to finalize changes, or Reset Form to restore default values. Note: Changes made to settings marked...used in network management systems to monitor network-attached devices for SNMP versions 1 through the secure tunnel created between the authentication server and the printer. 5 Click Submit to save changes, or Reset Form to restore default values. SNMP Version 1, 2c 1 From the Embedded Web Server Home...
...2 Click Set SNMP Traps. 3 From the IP Address list, click one of device drivers and other printing applications, select the Enable PPM Mib (Printer Port Monitor MIB) check box. 6 Click Submit to finalize changes, or Reset Form to restore default values. Note: Changes made to settings marked...used in network management systems to monitor network-attached devices for SNMP versions 1 through the secure tunnel created between the authentication server and the printer. 5 Click Submit to save changes, or Reset Form to restore default values. SNMP Version 1, 2c 1 From the Embedded Web Server Home...