Dell B3465dnf Embedded Web Server — Security Administrator's Guide User Manual Administrator Guide8 En Us
User Manual: Dell dell-b3465dnf - Embedded Web Server — Security Administrator's Guide
Open the PDF directly: View PDF .
Page Count: 52
- Contents
- Security devices covered in this guide
- Using security features in the Embedded Web Server
- Understanding the basics
- Configuring building blocks
- Creating a password for advanced security setup
- Creating a password through Web Page Password Protect
- Creating a PIN for advanced security setup
- Creating a PIN through Panel PIN Protect
- Setting up internal accounts
- Connecting your printer to an Active Directory domain
- Using LDAP
- Using LDAP+GSSAPI
- Configuring Kerberos 5 for use with LDAP+GSSAPI
- Setting up a CA certificate monitor
- Downloading the CA certificates immediately
- Securing access
- Managing certificates and other settings
- Installing a Certificate Authority certificate on the device
- Configuring the device for certificate information
- Creating a new certificate
- Viewing, downloading, and deleting a certificate
- Setting certificate defaults
- Configuring confidential printing
- Enabling and disabling USB devices
- Erasing temporary data files from the hard disk
- Configuring security audit log settings
- Connecting the printer to a wireless network using the Embedded Web Server
- Configuring 802.1X authentication
- Setting up SNMP
- Configuring the TCP/IP port access setting
- Configuring IPsec settings
- Enabling the security reset jumper
- Securing the hard disk and other installed memory
- Scenarios
- Appendix
- Notices
- Glossary of Security Terms
- Index

Contents
Security devices covered in this guide..........................................................4
Simple security devices.............................................................................................................................4
Advanced security devices........................................................................................................................4
Using security features in the Embedded Web Server..................................5
Understanding the basics..........................................................................................................................5
Authentication and Authorization ......................................................................................................................5
Groups ................................................................................................................................................................7
Access Controls ................................................................................................................................................... 7
Security Templates .............................................................................................................................................7
Limiting access with Basic Security Setup ........................................................................................................... 8
Configuring building blocks.......................................................................................................................8
Creating a password for advanced security setup ..............................................................................................8
Creating a password through Web Page Password Protect ...............................................................................9
Creating a PIN for advanced security setup........................................................................................................9
Creating a PIN through Panel PIN Protect ........................................................................................................10
Setting up internal accounts .............................................................................................................................10
Connecting your printer to an Active Directory domain...................................................................................11
Using LDAP........................................................................................................................................................13
Using LDAP+GSSAPI ..........................................................................................................................................15
Configuring Kerberos 5 for use with LDAP+GSSAPI ..........................................................................................17
Setting up a CA certificate monitor...................................................................................................................19
Downloading the CA certificates immediately..................................................................................................19
Securing access........................................................................................................................................19
Setting a backup password ...............................................................................................................................19
Setting login restrictions ...................................................................................................................................20
Using a security template to control function access .......................................................................................20
Managing certificates and other settings................................................................................................22
Installing a Certificate Authority certificate on the device ...............................................................................22
Configuring the device for certificate information ...........................................................................................23
Creating a new certificate.................................................................................................................................24
Viewing, downloading, and deleting a certificate.............................................................................................24
Setting certificate defaults................................................................................................................................25
Configuring confidential printing ......................................................................................................................25
Enabling and disabling USB devices..................................................................................................................26
Erasing temporary data files from the hard disk .............................................................................................. 27
Configuring security audit log settings .............................................................................................................27
Connecting the printer to a wireless network using the Embedded Web Server.............................................29
Configuring 802.1X authentication ...................................................................................................................29
Setting up SNMP ...............................................................................................................................................31
Contents 2

Configuring the TCP/IP port access setting.......................................................................................................32
Configuring IPsec settings.................................................................................................................................32
Enabling the security reset jumper...................................................................................................................33
Securing the hard disk and other installed memory...............................................................................33
Statement of Volatility......................................................................................................................................33
Erasing volatile memory ...................................................................................................................................34
Erasing non‑volatile memory............................................................................................................................34
Configuring Out of Service Erase ...................................................................................................................... 35
Completely erasing printer hard disk memory .................................................................................................36
Configuring printer hard disk encryption..........................................................................................................36
Scenarios.................................................................................................................................................38
Scenario: Printer in a public place ....................................................................................................................38
Scenario: Standalone or small office ................................................................................................................39
Scenario: Network running Active Directory ....................................................................................................39
Appendix....................................................................................................41
Notices.......................................................................................................46
Glossary of Security Terms.........................................................................50
Index..........................................................................................................51
Contents 3

Security devices covered in this guide
There are two levels of security supported based on the product definition. For a complete list of available functionality,
see “Authentication and Authorization” on page 5.
Simple security devices
B2360d/dn, B3460dn, B5460dn
Advanced security devices
B3465dn (without fax), B3465dnf (with fax), B5465dnf
Security devices covered in this guide 4

Using security features in the Embedded Web
Server
Embedded Web Server represents an evolution in keeping document outputs safe and confidential in today's busy
environments. With traditional components such as authentication and group permissions, administrators can use
Embedded Web Server Security Templates to control access to the devices that produce, store, and transmit sensitive
documents. Security templates are an innovative tool that administrators can use to build secure and flexible profiles,
restricting sensitive printer functions or outputs to only those users holding appropriate credentials. Using soft
configuration features alone or with physical security such as Common Access Cards, the printer is no longer a weak
link in the document security chain.
Understanding the basics
Securing a printer through the Embedded Web Server involves combining one or more components to define who is
allowed to use the printer, and which functions those users are allowed to access. Available components include
Authentication, Authorization, and Groups.
Create a plan that identifies who the users are and what they need to do before configuring printer security. Items to
consider might include:
•The location of the printer and whether authorized persons have access to that area
•Sensitive documents that are sent to or stored on the printer
•Information security policies of your organization.
Authentication and Authorization
Authentication is the method by which a system securely identifies a user.
Authorization specifies which functions are available to a user who has been authenticated by the system. This set of
authorized functions is also referred to as “permissions.”
There are two levels of security that are supported based on the product definition. The simplest level security only
supports internal device authentication and authorization methods. The more advanced level security permits internal
as well as external authentication and authorization as well as additional restriction capability for management,
function, and solution access. Advanced security is supported for those devices that permit the installation of additional
solutions to the device.
Simple security utilizes the “Panel PIN Protect” to restrict user access to the printer control panel and the “Web Page
Password Protect” to restrict admin access to the device. For more information, see “Creating a PIN through Panel PIN
Protect” on page 10 and “Creating a password through Web Page Password Protect” on page 9.
Advanced level security devices support PIN and password restrictions in addition to the other authentication and
authorization specified. Most of this document will describe advanced security devices.
Using security features in the Embedded Web Server 5

= Supported
X = Not supported
Function Simple security devices Advanced security devices
Panel PIN Protect X
PIN Protection X
Web Page Password Protect X
Password Protection X
Internal Accounts (Username and Username/Password) X
Groups (internal) X
LDAP X
LDAP+GSSAPI X
Kerberos 5 X
Active Directory X
Limited access controls X
Access controls (complete) X
Security Templates X
Basic Security Setup X
The Embedded Web Server handles authentication and authorization using one or more of the following, also referred
to as building blocks:
•PIN or Panel PIN Protect
•Password or Web Page Password Protect
•Internal accounts
•LDAP
•LDAP+GSSAPI
•Kerberos 5 (used only in conjunction with LDAP+GSSAPI)
•Active Directory
To provide low-level security, you can use either PIN and Password, or Panel PIN Protect and Web Page Password
Protect for some printer models, by simply limiting access to a printer—or specific functions of a printer—to anyone
who knows the correct code. This type of security might be appropriate if a printer is located in the lobby or other
public area of a business, so that only employees who know the password or PIN are able to use the printer. Because
anyone who enters the correct password or PIN receives the same privileges and users cannot be individually identified,
passwords and PINs are considered less secure than other building blocks that require a user to be identified, or both
identified and authorized.
Note: The default settings do not contain any authentication or authorization building blocks, which means that
everyone has unrestricted access to the Embedded Web Server.
Using security features in the Embedded Web Server 6

Groups
Administrators can designate up to 32 groups to be used in association with either the Internal accounts or LDAP/LDAP
+GSSAPI building blocks. For the purposes of Embedded Web Server security, groups are used to identify sets of users
needing access to similar functions. For example, in Company A, employees in the warehouse do not need to print in
color, but those in sales and marketing use color every day. In this scenario, it makes sense to create a “Warehouse”
group and a “Sales and Marketing” group.
Access Controls
By default, all device menus, settings, and functions come with no security enabled. Access controls (also referred to
in some devices as “Function Access Controls”) are used to manage access to specific menus and functions or to disable
them entirely. Access controls can be set using a password, PIN, or security template. The number of functions that
can be controlled varies depending on the type of device, but in some multifunction printers, over 40 individual menus
and functions can be protected.
Note: For a list of individual access controls and what they do, see “Appendix D: Access controls” on page 43.
Security Templates
Some scenarios call for only limited security, such as PIN‑protected access to common device functions, while others
require tighter security and role‑based restrictions. Individually, building blocks, groups, and access controls may not
meet the needs of a complex security environment. In order to accommodate users in different groups needing access
to a common set of functions such as printing, copying, and faxing, administrators must be able to combine these
components in ways that give all users the functions they need, while restricting other functions to only authorized
users.
A security template is a profile constructed using a building block, or certain building blocks paired with one or more
groups. How they are combined determines the type of security created:
Building block Type of security
Internal Accounts Authentication only
Internal Accounts with Groups Authentication and authorization
Kerberos 5 Authentication only
LDAP Authentication only
LDAP with Groups Authentication and authorization
LDAP+GSSAPI Authentication only
LDAP+GSSAPI with Groups Authentication and authorization
Password Authorization only
PIN Authorization only
Each device can support up to 140 security templates, allowing administrators to create very specific profiles for each
access control.
Using security features in the Embedded Web Server 7

Limiting access with Basic Security Setup
Use Basic Security Setup to limit access to the Embedded Web Server security settings and the configuration menus
on the printer control panel. This selection allows the definition of simple internal device security authentication
methods.
Notes:
•This feature is available only in select printer models.
•The default settings do not contain any authentication or authorization building blocks, which means that
everyone has unrestricted access to the Embedded Web Server.
Applying Basic Security Setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2From the Authentication Type drop‑down list, select one of the following:
•PIN—Enter a PIN number. Each PIN must be 4–16 digits in length.
•Password—Type a name for the password. Each password must have a unique name containing up to 128
UTF‑8 characters.
•User ID and Password—Type a unique user ID, and then type a name for the password. Each password must
have a unique name containing up to 128 UTF‑8 characters.
3Click Apply Basic Security Setup.
Note: Applying this setup may overwrite a previous configuration.
The new settings will be submitted. The next time you access Security Setup, you will be required to enter the
appropriate authentication information.
Modifying or removing Basic Security Setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Enter the appropriate authentication information to gain access to Security Setup.
3Under Modify or Remove Basic Security Setup, enter your new authentication information.
4Click Modify Basic Security Setup to enter your new authentication information to gain access to Security Setup,
or click Remove Basic Security Setup to remove all authentication requirements.
Configuring building blocks
Creating a password for advanced security setup
Notes:
•This is available only in select printer models.
•The Embedded Web Server can store a combined total of 250 user‑level and administrator‑level passwords on
each supported device.
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Password.
Using security features in the Embedded Web Server 8

3Under Manage Passwords, select Add a Password.
4Type a name for the password in the Setup Name box.
Note: Each password must have a unique name containing up to 128 UTF‑8 characters (example: “Copy Lockout
Password”).
5Type a password in the appropriate box, and then retype the password to confirm it.
6If the password will be used as the Administrator password, then select Admin Password.
Note: Administrator‑level passwords override normal passwords. If a function or setting is protected by a
normal password, then any administrator‑level password will also grant access.
7Click Submit.
Notes:
•To edit a password, select a password from the list, and then modify the settings.
•To delete a password, select a password from the list, and then click Delete Entry. Clicking Delete List will delete
all passwords on the list, whether they are selected or not.
Creating a password through Web Page Password Protect
Notes:
•This is available only in low‑level‑security printers.
•The Embedded Web Server can store a combined total of 250 user‑level and administrator‑level passwords on
each supported device.
1From the Embedded Web Server, click Settings > Security > Web Page Password Protect.
2Under “Basic Security Setup: Create User Password,” type a password in the appropriate box, and then retype the
password to confirm it.
3Under “Basic Security Setup: Create Admin Password,” type a password in the appropriate box, and then retype
the password to confirm it.
Note: Administrator‑level passwords override normal passwords. If a function or setting is protected by a
normal password, then any administrator‑level password will also grant access.
4Click Modify.
Note: To edit a password, change the password, and then click Modify. To delete the password, click Delete Entry.
Creating a PIN for advanced security setup
Note: This is available only in select printer models.
Typically, personal identification numbers (PINs) are used to control access to specific device menus or to a device itself.
PINs can also be used to control access to document outputs, by requiring a user to type a correct PIN to retrieve a
held print, copy, or fax job. The Embedded Web Server can store a combined total of 250 user‑level and
administrator‑level PINs.
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click PIN > Add a PIN.
Using security features in the Embedded Web Server 9

3Type the name of the PIN configuration in the Setup Name box.
Note: Each PIN must have a unique name containing up to 128 UTF‑8 characters (example: “Copy Lockout PIN”).
4Enter a PIN in the appropriate box, and then reenter the PIN to confirm it.
To change the default PIN length:
aClick Settings > Security > Miscellaneous Security Settings.
bEnter a number in the Minimum PIN Length field, and then click Submit.
5If the PIN will be used as the Administrator PIN, then click Admin PIN.
Note: If an activity is secured by a specific Administrator PIN, then only that PIN will grant access to it.
6Click Submit.
Creating a PIN through Panel PIN Protect
Note: This is available only in select printer models with low level security.
Typically, personal identification numbers (PINs) are used to control access to specific device menus or to a device itself.
PINs can also be used to control access to document outputs, by requiring a user to enter a correct PIN to retrieve a
held print, copy, or fax job. The Embedded Web Server can store a combined total of 250 user‑level and
administrator‑level PINs.
1From the Embedded Web Server, click Settings > Security > Panel PIN Protect.
2Under “Basic Security Setup: Create User PIN,” enter a PIN in the appropriate box, and then reenter the PIN to
confirm it.
3Under “Basic Security Setup: Create Admin PIN,” enter a PIN in the appropriate box, and then reenter the PIN to
confirm it.
Note: Each PIN must have a unique name containing up to 128 UTF‑8 characters (example: “Copy Lockout PIN”).
4Click Modify.
Notes:
•When an access control is set to User PIN, then any Admin PIN for your printer is valid for that access control.
•You can assign a user or administrator PIN to any printer function only after you complete this procedure.
Setting up internal accounts
Note: This is available only in select printer models.
Embedded Web Server administrators can configure one internal account building block per supported device. Each
internal account building block can include a maximum of 250 user accounts and 32 user groups.
The internal accounts building block can be used by itself in a security template to provide authentication‑level security,
or in conjunction with one or more groups to provide both authentication and authorization.
Defining user groups
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Internal Accounts > Setup groups for use with internal accounts.
Using security features in the Embedded Web Server 10

3Type the group name.
Note: Group names can contain up to 128 UTF‑8 characters.
4Click Add.
5Repeat steps 3 through 4 to add more user groups.
Note: When creating groups, make a list of all users first, and then determine which device functions are needed by
all users and which functions are needed only by certain users. Each group fulfills a role once combined into a
security template, and users can be assigned to more than one group (or role) in order to grant them access to all
needed functions.
Creating user accounts
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Internal Accounts > Add an Internal Account.
3Provide the information needed for each account:
•Account Name—Type the user's account name (example: “Jack Smith”). You can use up to 164 UTF‑8 characters.
•User ID—Type an ID for the account (example: “jsmith”). You can use up to 128 UTF‑8 characters.
•Password—Type a password of between 8 and 128 characters.
•Re‑enter Password—Type the password entered in the preceding field.
•E‑mail—Type the user's e-mail address (example: “jsmith@company.com”).
•Groups—Select the groups to which the account belongs. Hold down the Ctrl key to select multiple groups for
the account.
4Click Submit to save the new account, or Cancel to return to the Manage Internal Accounts menu without storing
the new account.
Specifying settings for internal accounts
Internal accounts settings determine the information an administrator submits when creating a new internal account
and the information a user submits when authenticating.
•Custom Building Block Name—Type a unique name for this building block.
•Require E‑mail Address—Select this box to make the e-mail address a required field when creating new internal
accounts.
•Required User Credentials—Select either User ID or User ID and password to specify the information a user must
submit when authenticating.
Connecting your printer to an Active Directory domain
Notes:
•This is available only in select printer models.
•Make sure to use HTTPS to protect the credentials that are used to join the printer to the domain.
Using security features in the Embedded Web Server 11

•If you do not select HTTPS, then you will not be able to set up Active Directory.
1Open a Web browser, and then type the IP address or host name of the printer.
Note: A warning with a message associated to your printer IP address or host name will appear. Click Continue
to this website (not recommended) to continue.
2From the Embedded Web Server, navigate to:
Settings > Security > Security Setup > Active Directory > Join an Active Directory Domain
3Provide the information needed for each account:
•Domain Name‑‑Type the name of the domain that you are trying to join. It is recommended that the domain
name be typed in capital letters.
•User ID‑‑Type the user name of the network administrator or any individual that has rights to add computers
to a network.
•Password‑‑Type the password of the network administrator or the individual that has rights to join the domain.
Note: Passwords are case‑sensitive, but these passwords are not cached by the device.
•Organizational Unit‑‑Type the name of your organizational unit, but only when necessary.
Note: You can skip this since this is not a required field.
4Click Submit.
Notes:
•After clicking the Submit button, the screen flashes and you may hear a clicking noise.
•A big red X mark will appear if the configuration is unsuccessful. A message will also appear telling you what
may have gone wrong with joining the domain.
5If there are no errors, then the setup is complete. You may click Manage Security Templates to use the Active
Directory information to complete your security setup.
Note: If you wish to review or make some small modifications to the LDAP+GSSAPI building block, click Return
to Security Setup and follow the process identified below.
To start reviewing and modifying the process:
aUnder Advanced Security Setup, click Kerberos 5.
bClick View File to open the Kerberos Config file that was created using the Active Directory setup.
cReview the file, and then click the browser’s back button to continue the review process.
Note: Do not edit or copy the Kerberos Config file to use with older devices. This can cause issues with KDC
Server Affinity Service. Older devices will not recognize the special mappings associated with the KDC Server
Affinity Service.
dClick Return to Security Setup, and then click LDAP+GSSAPI.
eUnder LDAP+GSSAPI Setups, look for the building block that was created by the Active Directory Setup process,
and then click it.
Note: By default, the building block name will be the realm name. In addition, the Server Address field was
filled out using the Domain Controller name.
Using security features in the Embedded Web Server 12

fChange some of the building block settings depending on your environment, including the following:
•Server Port‑‑The standard port for LDAP is 389. Another common port is 3268, but this is used only for
Global Catalog servers in Active Directory. When applicable, change the port to 3268 to speed up the
querying process.
•Search Base‑‑This tells the device where, in the directory “tree”, to start searching. Specified as a
Distinguished Name, it is recommended that you at least specify the root of the directory (e.g.
“dc=company,dc=com”).
•Use Kerberos Service Ticket‑‑This setting is an advanced setup otherwise known as SPNEGO. This uses the
session ticket that a user has when they are logged into their computer. It is recommended that you leave
this setting unchecked.
•Use Active Directory Device Credentials‑‑This box should normally be checked because you want to use
the Service Account that was created in Active Directory. If you do not want to use this setting, because you
want to utilize an existing Service Account or you want to use user credentials (advanced setup), then simply
uncheck this box.
gUsing the scroll bar on the right side of the page, scroll down to the following fields when necessary:
•Group Search Base‑‑This field tells the device where in the directory tree to start searching for a particular
group. This field does not need to be filled out if user‑ or group‑based authorization is not required by the
environment.
•Short name for group‑‑This is a user‑defined field that allows the user to create a name for a group and
associate that name with a group identifier.
•Group Identifier‑‑This field tells the device what container or organizational unit it needs to search and to
validate whether an authenticated user is a member of an authorized group.
hIf you have made any changes, using the scroll bar on the right side of the page, scroll down to the bottom of
the page, and then click Modify.
Using LDAP
Note: This is available only in select printer models.
Lightweight Directory Access Protocol (LDAP) is a standards‑based, cross‑platform, extensible protocol that runs directly
on top of the TCP/IP layer and is used to access information stored in a specially organized information directory. One
of the strengths of LDAP is that it can interact with many different kinds of databases without special integration, making
it more flexible than other authentication methods.
Notes:
•Supported devices can store a maximum of five unique LDAP configurations. Each configuration must have a
unique name.
•Administrators can create up to 32 user‑defined groups that apply to each unique LDAP configuration.
•As with any form of authentication that relies on an external server, users will not be able to access protected
device functions if an outage prevents the printer from communicating with the authenticating server.
•To help prevent unauthorized access, users are encouraged to securely end each session by selecting Log out on
the printer control panel.
To add a new LDAP setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP.
Using security features in the Embedded Web Server 13

3Click Add an LDAP Setup.
The LDAP Server Setup dialog is divided into four parts:
General Information
•Setup Name—This name is used to identify each particular LDAP Server Setup when creating security templates.
•Server Address—Type the IP address or the host name of the LDAP server where the authentication will be
performed.
•Server Port—The Embedded Web Server communicates with the LDAP server using this port. The default LDAP
port is 389.
•Use SSL/TLS—From the drop‑down menu, select None, SSL/TLS (Secure Sockets Layer/Transport Layer
Security), or TLS.
•Userid Attribute—Type either cn (common name), uid, userid, or user‑defined.
•Mail Attribute—Type a maximum of 48 characters to uniquely identify e‑mail addresses. The default value is
“mail.”
•Full Name Attribute—Type a maximum of 48 characters. The default value is “cn.”
•Search Base—This is the node in the LDAP server where user accounts reside. Multiple search bases may be
entered, separated by commas.
Note: A search base consists of multiple attributes separated by commas, such as cn (common name), ou
(organizational unit), o (organization), c (country), and dc (domain).
•Search Timeout—Enter a value from 5 to 30 seconds or 5 to 300 seconds depending on your printer model.
•Required User Input—Select either User ID and password or User ID to specify which credentials a user must
provide when attempting to access a function protected by the LDAP building block. User ID and password is
the default setting.
Device Credentials
•Use Active Directory Device Credentials—If selected, then user credentials and group designations can be pulled
from the existing network comparable to other network services.
•Anonymous LDAP Bind—If selected, then the Embedded Web Server binds with the LDAP server anonymously,
and the Distinguished Name and MFP Password fields are unavailable.
•Distinguished Name—Type the distinguished name of the print server or servers.
•MFP’s Password—Type the password for the print servers.
Search specific object classes
•Person—If selected, then the “person” object class will also be searched.
•Custom Object Class—If selected, then this custom search object class will also be searched. The administrator
can define up to three custom search object classes (optional).
LDAP Group Names
•Administrators can associate as many as 32 named groups stored on the LDAP server by entering identifiers for
those groups under the Group Search Base list. Both the Short name for group and Group Identifier must be
provided.
•When creating security templates, the administrator can pick groups from this setup for controlling access to
device functions.
4Click Submit to save the changes, or Cancel to return to previous values.
Using security features in the Embedded Web Server 14

To edit an existing LDAP setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP.
3Click a setup from the list.
4Make any needed changes in the LDAP Configuration dialog.
5Click Modify to save the changes, or click Cancel to return to previous values.
To delete an existing LDAP setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP.
3Select a setup from the list.
4Click Delete Entry to remove the profile, or Cancel to return to previous values.
Notes:
•Click Delete List to delete all LDAP setups in the list.
•An LDAP building block cannot be deleted if it is being used as part of a security template.
To validate an existing LDAP setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP.
3Click Test LDAP Authentication Setup next to the setup you want to test.
Using LDAP+GSSAPI
Note: This is available only in select printer models.
Some administrators prefer authenticating to an LDAP server using Generic Security Services Application Programming
Interface (GSSAPI) instead of simple LDAP authentication because the transmission is always secure. Instead of
authenticating directly with the LDAP server, the user will first authenticate with a Kerberos server to obtain a Kerberos
“ticket.” This ticket is then presented to the LDAP server using the GSSAPI protocol for access. LDAP+GSSAPI is typically
used for networks running Active Directory.
Notes:
•LDAP+GSSAPI requires that Kerberos 5 also be configured.
•Supported devices can store a maximum of five unique LDAP+GSSAPI configurations. Each configuration must
have a unique name.
•As with any form of authentication that relies on an external server, users will not be able to access protected
device functions if an outage prevents the printer from communicating with the authenticating server.
•To help prevent unauthorized access, users are encouraged to securely end each session by selecting Log out on
the printer control panel.
Using security features in the Embedded Web Server 15

To add a new LDAP+GSSAPI setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP+GSSAPI.
3Click Add an LDAP+GSSAPI Setup. The setup dialog is divided into four parts:
General Information
•Setup Name—This name will be used to identify each particular LDAP+GSSAPI Server Setup when creating
security templates.
•Server Address—Type the IP address or the host name of the LDAP server where the authentication will be
performed.
•Server Port—This is the port used by the Embedded Web Server to communicate with the LDAP server. The
default LDAP port is 389.
•Use SSL/TLS—From the drop‑down menu, select None, SSL/TLS (Secure Sockets Layer/Transport Layer
Security), or TLS.
•Userid Attribute—Type either cn (common name), uid, userid, or user‑defined.
•Mail Attribute—Type a maximum of 48 characters to uniquely identify e‑mail addresses. The default value is
“mail.”
•Full Name Attribute—Type a maximum of 48 characters.
•Search Base—This is the node in the LDAP server where user accounts reside. Multiple search bases may be
entered, separated by commas.
Note: A search base consists of multiple attributes separated by commas, such as cn (common name), ou
(organizational unit), o (organization), c (country), and dc (domain).
•Search Timeout—Enter a value from 5 to 30 seconds or 5 to 300 seconds depending on your printer model.
•Use Kerberos Service Ticket—If selected, then a Kerberos ticket is presented to the LDAP server using the GSSAPI
protocol to obtain access.
Device Credentials
•Use Active Directory Device Credentials—If selected, then user credentials and group designations can be pulled
from the existing network comparable to other network services.
•MFP Kerberos Username—Type the distinguished name of the print server or servers.
•MFP’s Password—Type the Kerberos password for the print server or servers.
Search specific object classes
•person—If selected, then the “person” object class will also be searched.
•Custom Object Class—If selected, then this custom search object class will also be searched. The administrator
can define up to three custom search object classes (optional).
LDAP Group Names
•Administrators can associate as many as 32 named groups stored on the LDAP server by entering identifiers for
those groups under the Group Search Base list. Both the Short name for group and Group Identifier must be
provided.
•When creating security templates, the administrator can pick groups from this setup for controlling access to
device functions.
4Click Submit to save the changes, or Cancel to return to previous values.
Using security features in the Embedded Web Server 16

To edit an existing LDAP+GSSAPI setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP+GSSAPI.
3Select a setup from the list.
4Make any needed changes in the LDAP Configuration dialog.
5Click Modify to save the changes, or Cancel to return to previous values.
To delete an existing LDAP+GSSAPI setup
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click LDAP+GSSAPI.
3Select a setup from the list.
4Click Delete Entry to remove the profile, or Cancel to return to previous values.
Notes:
•Click Delete List to delete all LDAP+GSSAPI setups in the list.
•An LDAP+GSSAPI building block cannot be deleted if it is being used as part of a security template.
Configuring Kerberos 5 for use with LDAP+GSSAPI
Note: This is available only in select printer models.
Though it can be used by itself for user authentication, Kerberos 5 is most often used in conjunction with the LDAP
+GSSAPI building block. While only one Kerberos configuration file (krb5.conf) can be stored on a supported device,
that krb5.conf file can apply to multiple realms and Kerberos Domain Controllers (KDCs). An administrator must
anticipate the different types of authentication requests the Kerberos server might receive, and configure the krb5.conf
file to handle all such requests.
Notes:
•Because only one krb5.conf file is used, uploading or resubmitting a simple Kerberos file will overwrite the
configuration file.
•The krb5.conf file can specify a default realm. However, if a realm is not specified in the configuration file, then
the first realm specified will be used as the default realm for authentication.
•As with any form of authentication that relies on an external server, users will not be able to access protected
device functions if an outage prevents the printer from communicating with the authenticating server.
•To help prevent unauthorized access, users are encouraged to securely end each session by selecting Log out on
the printer control panel.
Creating a simple Kerberos configuration file
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Kerberos 5.
3Type the KDC (Key Distribution Center) address or host name in the KDC Address field.
4Enter the number of the port (between 1 and 88) used by the Kerberos server in the KDC Port field.
Using security features in the Embedded Web Server 17

5Type the realm (or domain) used by the Kerberos server in the Realm field.
6Click Submit to save the information as a krb5.conf file on the selected device, or Reset Form to reset the fields
and start again.
Uploading a Kerberos configuration file
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Kerberos 5.
3Click Browse, and then select the krb5.conf file.
4Click Submit to upload the krb5.conf file to the selected device.
The Embedded Web Server automatically tests the krb5.conf file to verify that it is functional.
Notes:
•Click Reset Form to reset the field and search for a new configuration file.
•Click Delete File to remove the Kerberos configuration file from the selected device.
•Click View File to view the Kerberos configuration file for the selected device.
•Click Test Setup to verify that the Kerberos configuration file for the selected device is functional.
Setting date and time
Because Kerberos servers require that key requests bear a recent time stamp (usually within 300 seconds), the printer
clock must be in sync or closely aligned with the KDC system clock. Printer clock settings can be updated manually, or
set to use Network Time Protocol (NTP), to automatically sync with a trusted clock—typically the same one used by the
Kerberos server.
1From the Embedded Web Server, click Settings > Security > Set Date and Time.
2To manage the settings manually, type the correct date and time in YYYY-MM-DD HH:MM format, and then select
a time zone from the drop‑down menu.
Notes:
•Entering manual settings automatically disables the use of NTP.
•If you select (UTC+user) Custom from the Time Zone list, then you will need to configure additional settings
under Custom Time Zone Setup.
3If daylight saving time (DST) is observed in your area, then select the Automatically Observe DST check box.
4If you are located in a nonstandard time zone or an area that observes an alternate DST calendar, then adjust the
Custom Time Zone Setup settings if necessary.
5To sync to an NTP server rather than manage date and time settings manually, select the Enable NTP check box,
and then type the IP address or host name of the NTP server.
6If the NTP server requires authentication, then select the preferred method from the “Authentication” menu, and
then click the Install MD5 key link or the Install Autokey IFF params link to browse to the file containing the matching
NTP authentication.
7Click Submit to save the changes, or click Reset Form to restore the default settings.
Using security features in the Embedded Web Server 18

Setting up a CA certificate monitor
Note: This is available only in select printer models.
When joined to an Active Directory environment, automatic updates of CA (Certificate Authority) certificates is
necessary. The certificate monitor, when enabled, performs this function.
1From the Embedded Web Server, click Settings > Security > Certificate Management > CA Cert Monitor Setup.
2Click the “Enable CA Monitor” check box.
3Select a scheduled time for the device to check for new CA certificates, and then select the repetition interval.
4Click Submit to save the changes.
Downloading the CA certificates immediately
Note: This is available only in select printer models.
Part of the Active Directory enrollment process is to automatically download the Domain Controller’s Certificate
Authority (CA) certificate chain. However, this is not done immediately. The default setting for the automatic download
of the CA certificates is 12:00 AM in the device‑designated time zone.
Downloading the CA certificates immediately:
1From the Embedded Web Server, click Settings > Security > Certificate Management > CA Cert Monitor Setup.
2Click the “Enable CA Monitor” check box.
3Click the “Fetch immediately” check box to allow the device administrator to over‑ride the scheduled time frame
and immediately install the CA certificate chain.
4Click Submit.
Note: The Web page will refresh and bring you back to the Certificate Management page.
5Click Certificate Authority Management to validate that the CA certificate chain was properly downloaded.
Note: if you would like to do a more extensive review of the CA certificates, simply click the CA certificate name
you see under the ”Certificate Authority Common Name” section.
Securing access
Setting a backup password
Note: This is available only in select printer models.
A backup password allows the Embedded Web Server administrator to access security menus regardless of the type of
security assigned. It can also be helpful if other security measures become unavailable, such as when there is a network
communication problem or an authentication server fails.
Note: In some organizations, security policies prohibit the use of “back door” measures such as a backup password.
Consult your organization's policies before deploying any security method that might compromise those policies.
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Additional Security Setup Options, click Backup Password.
Using security features in the Embedded Web Server 19

3Select the Use Backup Password check box, and then type and retype the password.
4Click Submit.
Setting login restrictions
Note: This is available only in select printer models.
Many organizations establish login restrictions for information assets such as workstations and servers. Embedded Web
Server administrators should verify that printer login restrictions also comply with organizational security policies.
1From the Embedded Web Server, click Settings > Security > Miscellaneous Security Settings > Login Restrictions.
2Enter the appropriate login restrictions:
•Login failures—Specify the number of times a user can attempt login before being locked out.
•Failure time frame—Specify the amount of time before lockout takes place.
•Lockout time—Specify the duration of lockout.
•Panel Login Timeout—Specify how long a user may be logged in before being automatically logged off.
•Remote Login Timeout—Specify how long a user may be logged in remotely before being automatically logged
off.
3Click Submit to save the changes, or Reset Form to restore the default settings.
Using a security template to control function access
Note: This is available only in select printer models.
Each access control, or function access control, can be set to require no security (the default) or to use any of the
building block selections available in the drop‑down menu for that function. Only one method of security can be assigned
to each access control.
Step 1: Create a building block
1From the Embedded Web Server, click Settings > Security > Security Setup.
2From Step 1 under Advanced Security Setup, click the building block (or blocks) appropriate for your environment,
and then configure it.
For more information on configuring a specific type of building block, see the relevant section or sections under
“Configuring building blocks” on page 8.
Step 2: Create a security template
One or two building blocks can be combined with a unique name of up to 128 characters to create a security template.
Each device can support up to 140 security templates. Though the names of security templates must be different from
one another, building blocks and security templates can share a name.
1From the Embedded Web Server, click Settings > Security > Security Setup.
2From Step 2 under Advanced Security Setup, click Security Template.
3Under Manage Security Templates, click Add a Security Template.
4In the Security Template Name field, type a unique name containing up to 128 characters. It can be helpful to use
a descriptive name, such as ”Administrator_Only” or “Common_Functions_Template.”
Using security features in the Embedded Web Server 20

5From the Authentication Setup list, select a method for authenticating users.
Note: The Authentication Setup list is populated with the authentication building blocks that have been
configured on the device.
6To use authorization, click Add authorization, and then select a building block from the Authorization Setup list.
Note: The Authorization Setup list is populated with the authorization building blocks available on the device.
7To use groups, click Modify Groups, and then select one or more groups to include in the security template.
Note: Hold down the Ctrl key to select multiple groups.
8Click Save Template.
Notes:
•Certain building blocks (such as passwords and PINs) do not support separate authorization.
•For simple authorization‑level security, in which individual users are not authenticated, administrators can
control access to specific device functions by assigning only a password or PIN to a security template. Users are
required to enter the correct code in order to gain access to any function controlled by the password or PIN.
Step 3: Assign security templates to access controls
1From the Embedded Web Server, click Settings > Security > Security Setup.
2From Step 3 under Advanced Security Setup, click Access Controls.
3For each function you want to protect, select a security template from the drop‑down menu next to the name of
that function.
4Click Submit to save the changes, or Reset Form to cancel all changes.
Users will now be required to enter the appropriate credentials in order to gain access to any function controlled
by the security template.
Notes:
•To help prevent unauthorized access, users are encouraged to securely end each session by selecting Log
out on the printer control panel.
•For a list of individual access controls and what they do, see “Appendix D: Access controls” on page 43.
Editing or deleting an existing security template
1From the Embedded Web Server, click Settings > Security > Security Setup.
2From Step 2 under Advanced Security Setup, click Security Template.
3Select a security template from the list.
4Edit the fields if necessary.
5Click Modify to save the changes.
Notes:
•Click Cancel to retain previously configured values.
•Click Delete Entry to delete the selected security template.
•Click Delete List in the Manage Security Templates screen to delete all security templates on the device.
Using security features in the Embedded Web Server 21

•You can delete a security template only if it is not in use; however, security templates currently in use can be
edited.
Managing certificates and other settings
Note: This is available only in select printer models.
The Certificate Management menu allows users to configure printers to use certificates for establishing SSL, PSec, and
802.1X connections. Additionally, MFPs use certificates for LDA over SSL authentication and address book look‑ups.
The process for configuring devices consists of the following activities:
•Loading of the CA (Certificate Authority) certificate for a certificate authority into the device
•Creating a device certificate or using of the device default certificate
•Creating a CA‑signed certificate using the device certificate data
•Loading of the CA‑signed certificate into the device
Note: This process can be greatly simplified by using a new Automatic Certificate Enrollment Application, which is
available when an Active Directory environment is being used. For details on the usage of this application, see
“Appendix C: Automatic Certificate Enrollment Application” on page 41.
Installing a Certificate Authority certificate on the device
Note: This feature is available only in network printers or printers connected to print servers.
The Certificate Authority (CA) is needed so that the printer can trust and validate the credentials of another system on
the network. Without a CA certificate, the printer has no other means to determine whether to trust the certificate
that has been presented by the system that would like to create the secure connection.
Start with the certificate file (.pem format) for the CA that is to be utilized. An example of how to create this file is
provided in “Appendix A: CA file creation” on page 41.
1Open a Web browser, and then type the IP address or host name of the printer.
2From the Embedded Web Server, click Settings > Security > Certificate Management > Certificate Authority
Management.
Notes:
•This window allows the device administrator the ability to initiate a request for a new CA certificate, delete
all CA certificates, and view previously installed CA certificates. To view more details of an installed CA
certificate or delete a particular CA certificate, simply click on the certificate common name link listed under
the Certificate Authority Common Name heading.
•There is no installed CA certificates to view on this page if this a new, out‑of‑the‑box device.
3Click New to display the Certificate Authority Installation screen.
4Click Browse to select the .pem format certificate authority file, and then select Submit. This completed the process
of installing a CA certificate.
Using security features in the Embedded Web Server 22

Configuring the device for certificate information
Note: This is available only in select printer models.
The printer has a self‑generated certificate. For some operations (e.g. 802.1x, IPSec, etc.), the printer certificate needs
to be upgraded to a certificate that has been signed by a certificate authority.
The printer includes a certificate signing request that can be viewed or downloaded, which greatly facilitates the process
of obtaining the signed certificate for the printer.
1Open a Web browser, and then type the IP address or host name of the printer.
2From the Embedded Web Server, click Settings > Security > Certificate Management > Set Certificate Defaults.
Note: The Set Certificates Defaults menu allows you to update the out‑of‑the‑box information on the device
with information including those that fit your organization’s certificate requirements.
3After updating all the fields that fit your organization, click Submit. For more information, see “Setting certificate
defaults” on page 25.
Note: The Web page refreshes and returns to the Certificate Management page.
4Click the Device Certificate Management link.
Notes:
•This window allows the device administrator the ability to initiate a request for a new device certificate,
delete all device certificates, and view previously installed device certificates. To view more details of an
installed device certificate or delete a particular device certificate, simply click on the certificate common
name link listed under the Friendly Name heading.
•If this is for a new, out‑of‑the‑box device, then there will be a default self‑signed certificate to view on this
page.
5Select the link for the preferred device certificate to obtain the certificate signing request information.
Notes:
•You may use the default certificate link to use the default certificate created in step 2 or another named
certificate. The certificate information is displayed.
•Other certificates are created by selecting New, which will open a Certificate Generation Parameters page.
For more information, see “Creating a new certificate” on page 24.
6Click Download Signing Request, and then save and open the .csr file with a notepad or any other text editor.
Note: The file data is displayed in a standard format that includes the base‑64 representation in the application
window. Highlight and copy that information for later usage by a paste operation.
7Leave your current Embedded Web Server page open while you open a new Web browser to the Certificate Authority
Web site.
8Follow the CA certificate request process as defined for the Certificate Authority. A sample request is shown in
“Appendix B: CA‑Signed Device Certificate creation” on page 41.
Note: The result of this process will be a new CA Signed Device Certificate file (in .pem format). Save this file on
your computer since it will be required for the next steps.
9From the Embedded Web Server, return to the “default” Device Certificate Management page, and then click Install
Signed Certificate.
Using security features in the Embedded Web Server 23

10 Click Browse, and then select the CA Signed Device Certificate file that was created in step 8.
11 Click Submit.
Note: This completes the process of creating and installing a signed printer certificate. The printer can now
present a valid certificate to systems to which it attempts to negotiate an SSL or IPSec connection.
Creating a new certificate
1From the Embedded Web Server, click Settings > Security > Certificate Management.
2Click Device Certificate Management > New.
3Enter values in the appropriate fields:
•Friendly Name—Type a name for the certificate (64‑character maximum).
•Common Name—Type a name for the device (128‑character maximum).
Note: Leave this field blank to use the host name for the device.
•Organization Name—Type the name of the company or organization issuing the certificate (128‑character
maximum).
•Unit Name—Type the name of the unit within the company or organization issuing the certificate (128‑character
maximum).
•Country/Region—Type the country or region where the company or organization issuing the certificate is
located (2‑character maximum).
•Province Name—Type the name of the province or state where the company or organization issuing the
certificate is located (128‑character maximum).
•City Name—Type the name of the city where the company or organization issuing the certificate is located
(128‑character maximum).
•Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, type
an IP address using the format IP:1.2.3.4, or a DNS address using the format
DNS:ldap.company.com. Leave this field blank to use the IPv4 address (128‑character maximum).
4Click Generate New Certificate.
Viewing, downloading, and deleting a certificate
1From the Embedded Web Server, click Settings > Security > Certificate Management > Device Certificate
Management.
2Select a certificate from the list.
The details of the certificate appear in the Device Certificate Management window.
3Click any of the following:
•Delete—Remove a previously stored certificate.
•Download To File—Download or save the certificate as a .pem file.
•Download Signing Request—Download or save the signing request as a .csr file.
•Install Signed Certificate—Upload a previously signed certificate.
Using security features in the Embedded Web Server 24

Setting certificate defaults
Administrators can set default values for certificates generated for a supported device. The values entered here will
be present in all new certificates generated in the Certificate Management task, even though those fields will remain
blank on the screen.
1From the Embedded Web Server, click Settings > Security > Certificate Management > Set Certificate Defaults.
2Enter values in the appropriate fields:
•Common Name—Type a name for the device (128‑character maximum).
Note: Leave this field blank to use the domain name for the device.
•Organization Name—Type the name of the company or organization issuing the certificate.
•Unit Name—Type the name of the unit within the company or organization issuing the certificate.
•Country/Region—Type the country or region where the company or organization issuing the certificate is
located (2‑character maximum).
•Province Name—Type the name of the province or state where the company or organization issuing the
certificate is located.
•City Name—Type the name of the city where the company or organization issuing the certificate is located.
•Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, type
an IP address using the format IP:1.2.3.4, or a DNS address using the format
DNS:ldap.company.com. Leave this field blank to use the IPv4 address.
Note: All fields accept a maximum of 128 characters, except where noted.
3Click Submit.
Configuring confidential printing
Users printing confidential or sensitive information may opt to use the confidential print option, which allows print jobs
to be PIN‑protected so that they remain in the print queue until the user enters a PIN on the printer control panel.
1From the Embedded Web Server, click Settings > Security > Confidential Print Setup.
2Enter an option for the following:
Use To
Max Invalid PIN
Off
2–10
Set a limit on the number of times an invalid PIN can be entered.
Notes:
•This menu item appears only when a formatted, working printer hard disk is
installed.
•Enter 0 to allow users to enter an incorrect PIN as many times as they choose.
•Enter a value between 2 and 10 to specify the number of times users can enter an
incorrect PIN before being locked out.
•When the limit is reached, the print jobs for that user name and PIN is deleted.
Note: Off is the factory default setting.
Using security features in the Embedded Web Server 25

Use To
Confidential Job Expiration
Off
1 hour
4 hours
24 hours
1 week
Set a limit on how long the printer stores confidential print jobs.
Notes:
•If the “Confidential Job Expiration” setting is changed while confidential print jobs
reside in the printer memory or printer hard disk, then the expiration time for those
print jobs does not change to the new default value.
•If the printer is turned off, then all confidential jobs held in the printer memory are
deleted.
Repeat Job Expiration
Off
1 hour
4 hours
24 hours
1 week
Set a limit on how long the printer stores print jobs.
Verify Job Expiration
Off
1 hour
4 hours
24 hours
1 week
Set a limit on how long the printer stores print jobs needing verification.
Reserve Job Expiration
Off
1 hour
4 hours
24 hours
1 week
Set a limit on how long the printer stores print jobs for printing at a later time.
Note: Off is the factory default setting.
3Click Submit to save the changes, or click Reset Form to restore the default settings.
Enabling and disabling USB devices
Note: This is available only in select printer models.
1From the Embedded Web Server, click Settings > Security > Schedule USB Devices.
2From the Disable Devices menu, select to disable printing from any USB device or from flash drives only.
Note: All scheduled “Disable” actions will be affected by this setting.
3Click Submit.
4Enable or disable the use of USB devices on certain days or during certain hours. To create a schedule:
aFrom the Action menu, select Enable or Disable to specify which action should occur at the specified time.
bFrom the Time menu, select the hour at which the selected action should begin (example: “06:00,” to start at
6:00 AM).
Using security features in the Embedded Web Server 26

cFrom the Day(s) menu, select which day or days the schedule should run (example: “Weekdays (Mon‑Fri)”).
dClick Add to save the action to the schedule.
Notes:
•Use of USB devices is enabled by default.
•For each “Disable” schedule entry, you must also create an “Enable” schedule entry to reactivate use of the
USB devices.
Erasing temporary data files from the hard disk
On certain devices, administrators can use “Erase Temporary Data Files” to remove residual confidential material from
the device and free up memory space. This setting uses random data patterns to securely overwrite files stored on the
hard drive that have been marked for deletion. Overwriting can be accomplished with a single pass—for a quick wipe
—or with multiple passes for greater security. Multiple pass wiping is compliant with the DoD 5220.22‑M standard for
securely erasing data from a hard disk.
Note: Not all printers have a hard disk installed. If you do not see “Erase Temporary Data Files” in the main Security
menu, then it is not supported on your device.
1From the Embedded Web Server, click Settings > Security > Erase Temporary Data Files.
Note: Wiping Mode can only be set to Auto.
2Modify the following settings:
•Single Pass—To overwrite the printer hard disk in a single pass with a repeating bit pattern. This is the factory
default setting.
•Multi–Pass—To overwrite the printer hard disk with random bit patterns several times, followed by a verification
pass. A secure overwrite is compliant with the DoD 5220.22M standard for securely erasing data from a hard
disk. Highly confidential information should be wiped using this method.
3Click Submit to save the changes.
Configuring security audit log settings
Note: This is available only in select printer models.
The security audit log allows administrators to monitor security‑related events on a device including, among others,
user authorization failures, successful administrator authentication, or Kerberos files being uploaded to a device. By
default, security logs are stored on the device, but may also be transmitted to a network syslog server for further
processing or storage.
1From the Embedded Web Server, click Settings > Security > Security Audit Log.
2Select Enable Audit to activate security audit logging (syslog).
3Type the IP address or host name of the Remote Syslog Server, and then select the Enable Remote Syslog check
box to transmit log events to a network syslog server.
Note: The Enable Remote Syslog check box is unavailable until an IP address or host name is entered.
4Enter the Remote Syslog Port number used on the destination server. The default value is 514.
Using security features in the Embedded Web Server 27

5From the Remote Syslog Method menu, select one of the following:
•Normal UDP—To send log messages and events using a lower‑priority transmission protocol.
•Stunnel—If implemented on the destination server.
6From the Remote Syslog Facility menu, select a facility code for events to be logged to on the destination server.
All events sent from the device will be tagged with the same facility code to aid in sorting and filtering by network
monitoring or intrusion detection software.
Note: Steps 4 through 6 are valid only if Remote Syslog is enabled.
7From the “Severity of events to log” menu, select the priority level cutoff (0–7) for logging messages and events.
Note: The highest severity is 0, and the lowest is 7. The selected severity level and anything higher will be
logged. For example, if level 4 ‑ Warning is selected, then severity levels 0–4 will be logged.
8Select Remote Syslog non‑logged events to send all events regardless of severity to the remote server.
9In the “Admin's e‑mail address” field, type one or more e-mail addresses (separated by commas) to automatically
notify administrators of certain log events, and then select from the following options:
•E‑mail log cleared alert—This indicates when the Delete Log button is clicked.
•E‑mail log wrapped alert—This indicates when the log becomes full and begins to overwrite the oldest entries.
•Log full behavior—This provides a drop list with two options:
–“Wrap over oldest entries”
–“E‑mail log then delete all entries”
•E‑mail % full alert—This indicates when log storage space reaches a certain percentage of capacity.
•% full alert level (1‑99%)—This sets how full the log must be before an alert is triggered.
•E‑mail log exported alert—This indicates when the log file is exported.
•E‑mail log settings changed alert—This indicates when the log settings are changed.
•Log line endings—This sets how the log file terminates the end of each line. Select a line ending option from
the drop‑down menu.
•Digitally sign exports—This adds a digital signature to each exported log file.
Note: To use e-mail alerts, click Submit to save the changes, and then follow the Setup E-mail Server link to
configure SMTP settings.
10 Click Submit to save the changes, or Reset Form to restore the default settings.
E-mail server setup
1From the Security Audit Log main screen, click Setup E-mail Server.
2Under SMTP Setup, type the IP address or host name of the Primary SMTP Gateway the device will use for sending
e-mail.
3Enter the Primary SMTP Gateway Port number of the destination server. The default value is 25.
4If you are using a secondary or backup SMTP server, then type the IP address/host name and SMTP port for that
server.
5For SMTP Timeout, enter the number of seconds (5–30) the device will wait for a response from the SMTP server
before timing out. The default value is 30 seconds.
6To receive responses to messages sent from the printer (in case of failed or bounced messages), type the Reply
Address.
Using security features in the Embedded Web Server 28

7From the Use SSL/TLS list, select Disabled, Negotiate, or Required to specify whether e-mail will be sent using an
encrypted link.
8If your SMTP server requires user credentials, then select an authentication method from the SMTP Server
Authentication list. The default setting is “No authentication required.”
9From the Device‑Initiated E‑mail list, select None for no authentication, or Use Device SMTP Credentials if
authentication is required.
10 From the User‑Initiated E‑mail list, select None for no authentication, or Use Device SMTP Credentials if
authentication is required.
11 If the device must provide credentials in order to send e-mail, then enter the information appropriate for your
network under Device Credentials.
12 Click Submit to save the changes, or Reset Form to restore the default settings.
Viewing or deleting the security audit log
•To view or save a text file of the current syslog, click Export Log.
•To delete the current syslog, click Delete Log.
Connecting the printer to a wireless network using the Embedded Web Server
Before you begin, make sure that:
•Your printer is connected temporarily to an Ethernet network.
•A wireless network adapter is installed in your printer and working properly. For more information, see the
instruction sheet that came with your wireless network adapter.
1Open a Web browser, and then type the printer IP address in the address field.
Notes:
•View the printer IP address in the TCP/IP section in the Network/Ports menu. The IP address appears as four
sets of numbers separated by periods, such as 123.123.123.123.
•If you are using a proxy server, then temporarily disable it to load the Web page correctly.
2Click Settings > Network/Ports > Wireless.
3Modify the settings to match the settings of your access point (wireless router).
Note: Make sure to enter the correct SSID.
4Click Submit.
5Turn off the printer, and then disconnect the Ethernet cable. Then wait for at least five seconds, and then turn the
printer back on.
6To verify if your printer is connected to the network, print a network setup page. Then in the Network Card [x]
section, see if the status is “Connected”.
For more information, see the “Verifying printer setup” section of the User’s Guide.
Configuring 802.1X authentication
Note: This is available only in select printer models.
Using security features in the Embedded Web Server 29

Though normally associated with wireless devices and connectivity, 802.1X authentication supports both wired and
wireless environments. 802.1X is located within the wireless menu when wireless is enabled on the device.
The following network authentication mechanisms can be included in the 802.1X protocol negotiation:
•EAP‑MD5
•EAP‑TLS
•EAP‑TTLS with the following methods:
–CHAP
–MSCHAP
–MSCHAPv2
–PAP
•EAP_MSCHAPV2
•PEAP
•LEAP
EAP Type Needs on MFP or Printer
EAP‑MD5 Device login name and password
EAP‑TLS Device login name and password, CA certificate, signed device certificate
EAP‑TTLS Device login name and password, CA certificate
PEAP (TLS) Device login name and password, CA certificate, signed device certificate
LEAP Device login name and password
Note: It is important to make sure that all of the devices participating in the 802.1X process support the same EAP
authentication type.
1From the Embedded Web Server, click Settings > Security > 802.1x.
2Under 802.1x Authentication, do the following:
aSelect the Active check box to enable 802.1X authentication.
bType the login name and password the printer uses to log in to the authentication server.
cSelect the Validate Server Certificate check box to require verification of the security certificate on the
authenticating server.
Notes:
•If you are using digital certificates to establish a secure connection to the authentication server, then you
must configure them on the printer before changing 802.1X authentication settings. For more
information on configuring digital certificates, see “Managing certificates and other settings” on page 22.
•Server certificate validation is integral to TLS (Transport Layer Security), PEAP (Protected Extensible
Authentication Protocol), and TTLS (Tunneled Transport Security Layer).
dSelect the Enable Event Logging check box to log 802.1Xauthentication‑related activity.
Warning—Potential Damage: To reduce FLASH part wear, only use this feature when necessary.
eFrom the 802.1x Device Certificate list, select the digital certificate you want to use. If only one certificate has
been installed, then default will be the only choice listed.
3Under Allowable Authentication Mechanisms, select the authentication protocols the printer recognizes by clicking
the check box next to each applicable protocol.
Using security features in the Embedded Web Server 30

4From the TTLS Authentication Method list, select the authentication method to accept through the secure tunnel
created between the authentication server and the printer.
5Click Submit to save the changes, or Reset Form to restore the default settings.
Note: Changes made to settings marked with an asterisk (*) cause the print server to reset.
Setting up SNMP
Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-connected
devices for conditions that warrant administrative attention. The Embedded Web Server allows administrators to
configure settings for SNMP versions 1 through 3.
SNMP Version 1, 2c
1From the Embedded Web Server, click Settings > Security > SNMP.
2Under SNMP Version 1, 2c, select Enabled.
3To allow SNMP variables to be set, select Allow SNMP Set.
4Type a name to be used for the SNMP Community identifier. The default community name is “public.”
5To facilitate the automatic installation of device drivers and other printing applications, select Enable PPM Mib
(Printer Port Monitor MIB).
6Click Submit to save the changes, or click Reset Form to restore the default values.
SNMP Version 3
1From the Embedded Web Server, click Settings > Security > SNMP.
2Under SNMP Version 3, select Enabled.
3To allow remote installation and configuration changes as well as device monitoring, type a user name in the
SNMPPv3 Read/Write User field and a password in the SNMPPv3 Read/Write Password field.
4To allow device monitoring only, type a user name in the SNMPPv3 Read Only User field and a password in the
SNMPPv3 Read Only Password field.
5From the SNMPv3 Minimum Authentication Level list, select “No Authentication, No Privacy,” “Authentication,
No Privacy,” or “Authentication, Privacy.”
6From the SNMPv3 Authentication Hash list, select MD5 or SHA1.
7From the SNMPv3 Privacy Algorithm list, select DES, AES‑128, AES‑192, or AES‑256.
8Click Submit to save the changes or click Reset Form to restore the default values.
Setting SNMP Traps
After configuring SNMP Version 1, 2c or SNMP Version 3, you can further customize which alerts are sent to the network
management system by designating SNMP “traps,” or events that trigger an alert message.
1From the Embedded Web Server, click Settings > Security > SNMP.
2Click Set SNMP Traps.
3From the IP Address list, click one of the blank IP address entries (shown as 0.0.0.0).
Using security features in the Embedded Web Server 31

4Under Trap Destination, enter the IP address of the network management server or monitoring station, and then
click the check box next to each condition that should generate an alert.
5Click Submit to save the changes, or click Reset Form to clear all fields.
Configuring the TCP/IP port access setting
Note: This is available only in select printer models.
This feature allows you to set access settings on the different TCP/IP ports of the device.
1From the Embedded Web Server, click Settings > Security > TCP/IP Port Access.
Note: The page displays a list of TCP/IP ports. All ports, except TCP 10000 (Telnet), are enabled by default.
2Click the check box of the TCP/IP port to change its access setting.
3Click Submit to save the changes, or click Reset Form to restore the default settings.
Configuring IPsec settings
Note: This is available only in select printer models.
1From the Embedded Web Server, click Settings > Network/Ports > IPSec.
2From the IPSec menu page, configure the following settings:
Setting Description
IPSec Enable
On
Off
To enable or disable the IP security settings of your printer.
Note: On is the factory default setting.
Connections
Pre‑Shared Key Authenticated Connections
Host 1
Host 2
Host 3
Host 4
Host 5
Host 6
Host 7
Host 8
Host 9
Host 10
Certificate Authenticated Connections
Host 1
Host 2
Host 3
Host 4
Host 5
To configure the authenticated connections of your printer.
•For Hosts 1–10, the following settings can be configured:
–Address—You can type a maximum of 45 bytes of characters.
–Key—You can type a maximum of 256 bytes of characters.
•For Hosts 1–5, the following setting can be configured:
–Address[/subnet]—You can type a maximum of 59 bytes of
characters.
* This is the factory default setting.
Using security features in the Embedded Web Server 32

Setting Description
Settings
DH Group
Encryption
Authentication
Certificate Validation
Validate Peer Certificate
On*
Off
Select Device Certificate
To specify the encryption and authentication methods of your printer,
select an option for each setting.
* This is the factory default setting.
3Click Submit to save the changes, or click Reset Form to restore the default values.
Enabling the security reset jumper
Note: This is available only in select printer models.
The security reset jumper is a hardware jumper located on the motherboard. Administrators can use the Embedded
Web Server to specify the effect of using this jumper.
1From the Embedded Web Server, click Settings > Security > Miscellaneous Security Settings.
2From the Security Reset Jumper list, select one of the following:
•No Effect—This removes access to all security menus and should be used with caution.
•Access controls = “No security”—This removes security only from the function access controls.
•Reset factory security defaults—This restores all security settings to the default values.
3Click Submit to save the changes, or Reset Form to restore the default settings.
Warning—Potential Damage: If No Effect is selected and the password (or other applicable credential) is lost, then
you will not be able to access the security menus. To replace the device RIP card (motherboard) and regain access to
the security menus, a service call will be required.
Securing the hard disk and other installed memory
Statement of Volatility
Your printer contains various types of memory that are capable of storing device and network settings, information
from embedded solutions, and user data. The types of memory—along with the types of data stored by each—are
described as follows:
•Volatile memory—Your device utilizes standard random access memory (RAM) to temporarily buffer user data
during simple print and copy jobs.
•Non‑volatile memory—Your device may utilize two forms of non-volatile memory: EEPROM and NAND (flash
memory). Both types are used to store the operating system, device settings, network information, scanner and
bookmark settings, and embedded solutions.
Using security features in the Embedded Web Server 33

•Hard disk memory—Some devices have a hard disk drive installed. The printer hard disk is designed for
device‑specific functionality and cannot be used for long term storage for data that is not print‑related. The hard
disk does not provide the capability for users to extract information, create folders, create disk or network file
shares, or FTP information directly from a client device. The hard disk can retain buffered user data from complex
scan, print, copy, and fax jobs, as well as form data, and font data.
You may want to erase the contents of the memory devices installed in your printer when:
•The printer is being decommissioned.
•The printer hard drive is being replaced.
•The printer is being moved to a different department or location.
•The printer is being serviced by someone from outside your organization.
•The printer is being removed from your premises for service.
Disposing of a hard drive
Note: Not all printers have a hard disk installed.
In high‑security environments, it may be necessary to take additional steps to ensure that confidential data stored on
the printer hard disk cannot be accessed once the printer or its hard disk is removed from your premises. While most
data can be erased electronically, you may want to consider one or more of the following actions before disposing of
a printer or hard disk:
•Degaussing—This flushes the hard drive with a magnetic field that erases stored data.
•Crushing—This physically compresses the hard disk to break component parts and render them unreadable.
•Milling—This physically shreds the hard disk into small metal bits.
Note: While most data can be erased electronically, the only way to guarantee that all data is completely erased is to
physically destroy each memory device on which data could have been stored.
Erasing volatile memory
The volatile memory (RAM) installed on your printer requires a power source to retain information. To erase the
buffered data, simply turn off the device.
Erasing non‑volatile memory
There are several methods available for erasing data stored in non‑volatile memory, depending on the type of memory
device installed and the type of data stored by that device.
•Individual settings—You can erase individual printer settings using the printer control panel or the printer
Embedded Web Server. For more information, see the User’s Guide.
•Device and network settings—You can erase device and network settings and restore factory defaults by resetting
the NVRAM using the printer Config menu.
•Security settings—You can restore factory defaults or erase security settings by selecting a behavior for the Security
Reset Jumper in the Embedded Web Server, and then moving a hardware jumper located on the motherboard.
Using security features in the Embedded Web Server 34

•Fax data—If your printer does not contain a hard disk, or if you have chosen NAND for fax storage, then you can
erase fax settings and data by resetting the NVRAM using the printer Config menu.
Note: If your printer has a hard disk that has been partitioned for fax storage, then you must reformat that
partition to erase fax data and settings.
•Embedded solutions—You can erase information and settings associated with embedded solutions by uninstalling
the solutions, or by restoring factory defaults using the printer Config menu.
Configuring Out of Service Erase
Notes:
•This menu appears only when basic or advanced security is enabled on the device and the “Security Menu
Remotely” access control is activated.
•This menu allows you to selectively clear all settings, apps, and pending job or fax data stored in the device,
erase all contents on the hard disk, or both. Selecting both will restore the device to the original factory default
settings, which includes network settings.
1From the Embedded Web Server, click Settings > Security > Restore Factory Defaults > Out of Service Erase.
Warning—Potential Damage: Do not turn off the printer.
2Click the Erase Printer Memory check box if you want to clear all settings, apps, and job data.
3Click the Erase Hard Disk check box if you want to erase all the contents of the hard disk, and then select either of
the following:
•Single Pass Erase—This lets you erase the content on the printer hard disk in a single pass with a repeating bit
pattern.
•Multiple Pass Erase—This lets you erase the content on the printer hard disk with random bit patterns several
times, followed by a verification pass. A secure erase is compliant with the DoD 5220.22‑M standard for securely
erasing data from a hard disk. Highly confidential information should be erased using this method.
Notes:
•You must satisfy the security FAC (Function Access Control) applied in the security template first in order to
access this setting.
•Single Pass Erase is the factory default setting.
4Click the confirmation check box in order for the Erase button to become available.
5Click Erase.
Using security features in the Embedded Web Server 35

Completely erasing printer hard disk memory
Notes:
•Some printer models may not have a printer hard disk installed.
•Access to the configuration menu might be restricted or disabled by the Configuration Menu function access
control. For more information, see “Appendix D: Access controls” on page 43.
Configuring Disk Wiping in the printer menus enables you to remove confidential material left by scan, print, copy, and
fax jobs, by securely overwriting files that have been marked for deletion.
For information on erasing the remaining job information stored on the hard disk memory using the Embedded Web
Server, see “Erasing temporary data files from the hard disk” on page 27.
Using the printer control panel
1Turn off the printer using the power switch.
2Simultaneously press and hold the 2 and 6 keys on the numeric keypad while turning the device back on. It takes
approximately a minute to boot into the Configuration menu.
Once the MFP is ready, the touch screen shows a list of functions instead of standard home screen icons such as
Copy and Fax.
3Release the buttons when the screen with the progress bar appears. The printer undergoes a power-on reset, and
then the Configuration menu appears.
4Touch Wipe Disk, and then touch either of the following:
•Wipe disk (fast)—Overwrite the disk with all zeroes in a single pass.
•Wipe disk (secure)—Overwrite the disk with random bit patterns several times, followed by a verification pass.
A secure overwrite is compliant with the DoD 5220.22‑M standard for securely erasing data from a hard disk.
Highly confidential information should be wiped using this method.
5Touch Yes to proceed with disk wiping.
Notes:
•A status bar indicates the progress of the disk wiping task.
•Disk wiping can take from several minutes to more than an hour, during which the printer is unavailable for
other user tasks.
6Touch Back > Exit Config Menu.
The printer undergoes a power‑on reset and then returns to normal operating mode.
Configuring printer hard disk encryption
Enable hard disk encryption to prevent loss of sensitive data in the event the printer or its hard disk is stolen.
Note: Some printer models may not have a printer hard disk installed.
Using the Embedded Web Server
1Open a Web browser, and then type the printer IP address in the address field.
Using security features in the Embedded Web Server 36

Notes:
•View the printer IP address on the printer home screen. The IP address appears as four sets of numbers
separated by periods, such as 123.123.123.123.
•If you are using a proxy server, then temporarily disable it to load the Web page correctly.
2Click Settings > Security > Disk Encryption.
Note: Disk Encryption appears in the Security Menu only when a formatted, non‑defective printer hard disk is
installed.
3From the Disk Encryption menu, select either of the following:
•Disable—Use this to disable disk encryption.
•Enable—Use this to enable disk encryption.
Notes:
–Disable is the factory default setting.
–Changing this setting will cause the printer to undergo a power‑on reset.
Warning—Potential Damage: Changing the setting for disk encryption will erase the contents of the hard
disk.
4Click Submit to proceed with disk wiping and encryption.
Note: Encryption takes approximately two minutes.
Warning—Potential Damage: Do not turn off the printer during the encryption process.
5Click Refresh to return to the Embedded Web Server.
Using the printer control panel
1Turn off the printer.
2Hold down 2 and 6 while turning the printer on. Release the buttons only when the screen with the progress bar
appears.
The printer performs a power-on sequence, and then the Configuration menu appears. When the printer is fully
turned on, a list of functions appears on the printer display.
3Touch Disk Encryption > Enable.
4Touch Yes to proceed with disk encryption.
Notes:
•Do not turn off the printer during the encryption process. Doing so may result in loss of data.
•Encryption takes approximately two minutes.
•A status bar will indicate the progress of the disk wiping task. After the disk has been encrypted, the printer
will return to the Enable/Disable screen.
5Touch Back > Exit Config Menu.
The printer will perform a power‑on reset, and then return to normal operating mode.
Using security features in the Embedded Web Server 37

Scenarios
Scenario: Printer in a public place
If your printer is located in a public space such as a lobby, and you want to prevent the general public from using it,
then a password or PIN can provide simple protection right at the device. Administrators can assign a single password
or PIN for all authorized users of the device, or separate codes to protect individual functions. The key to remember is
that anyone who knows a password or PIN can access any functions protected by that code.
Step 1: Create a password or PIN
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click either PIN or Password, and then configure it.
For some printer models, you can set your PIN and password through Panel PIN Protect and Web page Password
Protect. For more information, see “Creating a PIN through Panel PIN Protect” on page 10 and “Creating a password
through Web Page Password Protect” on page 9.
3Click Submit to save the changes.
For more information on configuring a PIN or password, see the relevant section or sections under “Configuring building
blocks” on page 8.
Step 2: Create a security template
Note: This is available only in select printer models.
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Security Template.
3Under Manage Security Templates, click Add a Security Template.
4In the Security Template Name field, type a unique name containing up to 128 characters. It can be helpful to use
a descriptive name, such as ”Administrator_Only” or “Common_Functions_Template.”
5From the Authentication Setup menu list, select the PIN or password created in Step 1.
6Click Save Template.
Step 3: Assign security templates to access controls
Note: This is available only in select printer models.
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Access Controls.
3If necessary, click Expand All or click a specific folder to view a list of available functions.
4From the drop‑down menu next to the name of each function you want to protect, select the security template
created in Step 2.
5Click Submit to save the changes, or Reset Form to cancel all changes.
In order to gain access to any function controlled by this security template, users are required to enter the
appropriate PIN or password.
Using security features in the Embedded Web Server 38

Scenario: Standalone or small office
Note: This is available only in select printer models.
If your printer is not connected to a network, or you do not use an authentication server to grant users access to devices,
then internal accounts can be created and stored within the Embedded Web Server for authentication, authorization,
or both.
Step 1: Set up individual user accounts
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Internal Accounts, and then configure it.
For more information on configuring individual user accounts, see “Setting up internal accounts” on page 10.
Step 2: Create a security template
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Security Template.
3Under Manage Security Templates, click Add a Security Template.
4In the Security Templates Name field, type a unique name containing up to 128 characters. It can be helpful to use
a descriptive name, such as ”Administrator_Only” or “Common_Functions_Template.”
5From the Authentication Setup menu, select a method for authenticating users. This list will be populated with the
authentication building blocks which have been configured on the device.
6To use authorization, click Add authorization, and then select a building block from the Authorization Setup menu.
This list will be populated with the authorization building blocks available on the device.
Note: Certain building blocks (such as PINs and passwords) do not support separate authorization.
7To use groups, click Modify Groups, and then select one or more groups to include in the security template. Hold
down the Ctrl key to select multiple groups.
8Click Save Template.
Step 3: Assign security templates to access controls
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Access Controls.
3If necessary, click Expand All or click a specific folder to view a list of available functions.
4For each function you want to protect, select a security template from the drop‑down menu next to the name of
that function.
5Click Submit to save the changes, or Reset Form to cancel all changes.
Users will now be required to enter the appropriate credentials in order to gain access to any function controlled
by a security template.
Scenario: Network running Active Directory
Note: This is available only in select printer models.
Using security features in the Embedded Web Server 39

On networks running Active Directory, administrators can use the LDAP+GSSAPI capabilities of the Embedded Web
Server to take advantage of authentication and authorization services already deployed on the network. User
credentials and group designations can be pulled from the existing network, making access to the printer as seamless
as other network services.
Before configuring the Embedded Web Server to integrate with Active Directory, you need to know the following:
•Domain Name
•User ID (for the domain)
•Password (for the User ID)
For more information, see “Connecting your printer to an Active Directory domain” on page 11.
Create a security template
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Security Template.
3Under Manage Security Templates, click Add a Security Template.
4In the Security Template Name field, type a unique name containing up to 128 characters. It can be helpful to use
a descriptive name, such as ”Administrator_Only” or “Common_Functions_Template.”
5From the Authentication Setup list, select the name given to your Authentication client application or building block
setup.
6Click Add authorization, and then select the name given to your Authentication client application or building block
setup.
7To use groups, click Modify Groups, and then select one or more of the groups listed in your Active Directory Group
Names list. Hold down the Ctrl key to select multiple groups.
8Click Save Template.
Assign security templates to access controls
1From the Embedded Web Server, click Settings > Security > Security Setup.
2Under Advanced Security Setup, click Access Controls.
3For each function you want to protect, select the newly created security template from the drop‑down menu next
to the name of that function.
4Click Submit to save the changes, or Reset Form to cancel all changes.
Users are required to enter the appropriate credentials in order to gain access to any function controlled by the
security template.
Using security features in the Embedded Web Server 40

Appendix
Appendix A: CA file creation
Note: This example of generation of a CA file for the Certificate Authority assumes usage of a Windows Certificate
Authority server.
1Point the browser window to the CA. Make sure to use the URL, http//<CA’s address>/CertSrv, where CA’s
address is the IP address or host name of the CA server.
Note: Before the CA Web page opens, a Windows login window may pop up and request user credentials to
verify that you have access to the CA Web page.
2Click Download a CA certificate, certificate chain, or CRL.
3Click Base 64 encoded, and then click Download CA Certificate.
Note: DER encoding is not supported.
4Save the certificate that is offered in a file. The file name is arbitrary, but the extension should be “.pem”.
Appendix B: CA‑Signed Device Certificate creation
Note: This example of generation of a CA file for the Certificate Authority assumes usage of a Windows Certificate
Authority server.
1Point the browser window to the CA. Make sure to use the URL, http//<CA’s address>/CertSrv, where CA’s
address is the IP address or host name of the CA server.
2Click Request a certificate.
3Click advanced certificate request.
4Click Submit a certificate request by using a base‑64‑encoded.
5Paste the (.csr prompted) information copied from the device into the Saved Request field, and then select a Web
Server‑type certificate template.
6Click Submit.
Note: The server takes a moment or two to process the request, and then presents a dialog window.
7Select Base 64 encoded, and then click Download Certificate.
Note: DER encoding is not supported.
8Save the certificate that is offered in a file. The file name is arbitrary, but the extension should be “.pem”.
Appendix C: Automatic Certificate Enrollment Application
This application, after installation, will automatically create a device certificate signing request and pass the signing
request on to the Certificate authority (CA) for approval. It will then retrieve the CA signed device certificate, and then
install the certificate. The previous manual process is replaced by a simple process with only limited initial setup
required.
Appendix 41

For this application to function, the device must be joined to an Active Directory environment and a Certificate
Enrollment Web Services (Server Role) application needs to be installed on the customer’s network.
Note: The example usage instructions given below assume the Certificate Enrollment Web Services is installed on a
Windows 2008 R2 server.
1Open a Web browser, and then type the IP address or host name of the printer in the address field.
2From the Embedded Web Server, click Settings > Security > Certificate Management > Device Certificate
Management.
3Click Advanced Management to use the Automatic Certificate Enrollment application, and then click Request new
Certificate.
Note: The screen may refresh for 10 to 15 seconds. At this time, the device is contacting the Certificate
Enrollment Web Service on the server and capturing the certificate templates that are available to the device.
4From the “Device Certificate Management > Advanced > Templates” page, select any of the following displayed
template options to use when requesting a certificate:
•IPSec—If you want to install a device certificate that is used for IPSec negotiations.
•Web Server—If you want to secure any SSL/TLS connections such as the EWS or LDAP over SSL.
•RAS and IAS Server—If you want to install a device certificate that is used for 802.1X negotiations.
5Click Request Certificate. From this screen, you will customize the certificate for this device.
Note: If you want to view the template details first, then click View instead of Request Certificate.
6Modify the settings from the Request Certificate Web page, but only when necessary.
Notes:
•The fields that are filled in with the data and the selected check boxes are the template defaults that were
pulled from the CA. You can change them if you choose, but remember that the default templates are
generally configured with the appropriate settings by the CA administrator and changing some settings may
cause the request to be denied.
•The “Collapse/Expand Subject Name” fields link is used to change any of the device information that is used
to create or generate a certificate. This includes the same information as the Set Certificate Defaults link
under Certificate Management.
7Click Submit to send the Certificate Signing Request (CSR) to the CA.
Note: The screen may refresh for 10 to 15 seconds. At this time, the device is contacting the Certificate
Enrollment Web Service requesting the CA signed certificate be generated.
8If successful, you will return to the “Device Certificate Management > Advanced” Web page and the new CA‑signed
device certificate with the specified name will be included in the list of certificates. If not, an error message is
displayed.
Note: If a template is specified at the server to require CA administrator approval, then a separate table of
pending certificates is displayed and a message indicating that a request is pending admin approval will be
displayed on the Device Certificate Management screen where the certificate is listed. The certificate is not valid
until approved. Once approval is granted, the message will disappear and the certificate(s) will be displayed in
the installed certificates table.
The link with the certificate name can be selected if you would like to see the information associated with the new
certificate. The “Renew” link is used to renew the certificate when the current CA certificate is about to expire (default
of 2 years).
Appendix 42

To specify that certificates that are about to expire are automatically renewed, in the Configure tab on the “Settings >
Apps > App Management” Web page for the Automatic Enrollment application, select the check box for Automatically
Update Certificates, specify the number of days before expiration for the Auto Renewal Threshold setting, and then
click Apply.
Appendix D: Access controls
Note: Depending on the device type and installed options, some access controls (referred to on some devices as
Function Access Controls) may not be available for your printer.
Administrative Menus
Function access control What it does
Configuration Menu This protects access to the Configuration Menu.
Manage Shortcuts at the Device This protects access to the Manage Shortcuts section of the Settings menu from the
printer control panel.
Manage Shortcuts Remotely This protects access to the Manage Shortcuts section of the Settings menu from the
Embedded Web Server.
Network/Ports Menu at the Device This protects access to the Network/Ports section of the Settings menu from the
printer control panel.
Network/Ports Menu Remotely This protects access to the Network/Ports section of the Settings menu from the
Embedded Web Server.
Option Card Configuration at the
Device
This controls access to the Option Card Configuration section of the Settings menu
from the printer control panel. This applies only when an Option Card with
configuration options is installed on the device.
Option Card Configuration Remotely This controls access to the Option Card Configuration section of the Settings menu
from the Embedded Web Server. This applies only when an Option Card with
configuration options is installed on the device.
Paper Menu at the Device This protects access to the Paper menu from the printer control panel.
Paper Menu Remotely This protects access to the Paper menu from the Embedded Web Server.
Reports Menu at the Device This protects access to the Reports menu from the printer control panel.
Reports Menu Remotely This protects access to the Reports menu from the Embedded Web Server.
Security Menu at the Device This protects access to the Security menu from the printer control panel.
Security Menu Remotely This protects access to the Security menu from the Embedded Web Server.
Service Engineer Menus at the Device This protects access to the Service Engineer menu from the printer control panel.
Service Engineer Menus Remotely This protects access to the Service Engineer menu from the Embedded Web Server.
Settings Menu at the Device This protects access to the General and Print Settings sections of the Settings menu
from the printer control panel.
Settings Menu Remotely This protects access to the General and Print Settings sections of the Settings menu
from the Embedded Web Server.
Appendix 43

Management
Function access control What it does
Firmware Updates This controls the ability to update firmware from any source other than a flash drive.
Firmware files that are received through FTP, the Embedded Web Server, etc., will
be ignored (flushed) when this function is protected.
Operator Panel Lock This protects access to the locking function of the printer control panel. If this is
enabled, then users with appropriate credentials can lock and unlock the printer
touch screen. In a locked state, the touch screen displays only the "Unlock Device"
icon, and no further operations can be performed at the device until appropriate
credentials are entered. Once unlocked, the touch screen will remain in an unlocked
state even if the user logs out of the device. To enable the control panel lock, the
user must select the "Lock Device" icon, and then enter the appropriate credentials.
PJL Device Setting Changes When disabled, all device settings changes requested by incoming print jobs are
ignored.
Remote Management This controls access to printer settings and functions by remote management tools.
When protected, no printer configuration settings can be altered except through a
secured communication channel.
Apps Configuration This controls access to the configuration of any installed applications.
Web Import/Export Settings This controls the ability to import and export printer settings files (UCF files) from
the Embedded Web Server.
Configuration Files Import/Export This controls the ability to import and export settings and security configuration files.
Internet Printing Protocol (IPP) This controls the ability to use the IPP.
Function Access
Function access control What it does
Address Book This controls the ability to perform address book searches in the Scan to Fax and Scan
to E‑mail functions.
Cancel Jobs at the Device This controls the ability to cancel jobs from the printer control panel.
Change Language from Home Screen This controls access to the Change Language feature from the printer control panel.
Color Dropout This controls the ability to use the Color Dropout feature for scan and copy functions.
Copy Color Printing This controls the ability to perform color copy functions. Users who are denied will
have their copy jobs printed in black and white.
Copy Function This controls the ability to use the Copy function.
Create Bookmarks at the Device This controls the ability to create new bookmarks from the printer control panel.
Create Bookmarks Remotely This controls the ability to create new bookmarks from the Bookmark Setup section
of the Settings menu on the Embedded Web Server.
Create Profiles This controls the ability to create new profiles.
E‑mail Function This controls access to the Scan to E‑mail function.
Fax Function This controls access to the Scan to Fax function.
Flash Drive Color Printing This controls the ability to print color from a flash drive. Users who are denied will
have their print jobs printed in black and white.
Appendix 44

Function access control What it does
Allow Flash Drive Access This controls the ability to access the flash drive.
Flash Drive Print This controls the ability to print from a flash drive.
Flash Drive Scan This controls the ability to scan documents to a flash drive.
FTP Function This controls access to the Scan to FTP function.
Held Jobs Access This protects access to the Held Jobs function.
PictBridge Printing This controls the ability for some devices to print from an attached
PictBridge‑enabled digital camera.
Note: Selected devices only.
Release Held Faxes This controls the ability to release (print) held faxes.
Use Profiles This controls access to profiles, such as scanning shortcuts, workflows, and eSF
applications.
Device Applications
Function access control What it does
New Apps This controls the initial security profile of each application‑specific access control
installed on the printer.
App 1–10 The App 1 through App 10 access controls can be assigned to installed eSF applications
and profiles created by LDSS. The access control for each application is assigned in
the creation or configuration of the application or profile.
Notes:
•Depending on the applications you have installed, additional application‑specific access controls may be listed
below apps 1–10. Use these additional access controls if they are available for your installed applications. If no
additional solution‑specific access controls are available, then assign one of the ten numbered access controls to
each application you want to protect.
•Some applications may be included with printers as default configurations and appear as function access control
selections.
Appendix 45

Notices
Edition notice
October 2013
The following paragraph does not apply to any country where such provisions are inconsistent with local law: THIS
PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some
states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may
not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the
information herein; these changes will be incorporated in later editions. Improvements or changes in the products or
the programs described may be made at any time.
GOVERNMENT END USERS
The Software Program and any related documentation are "Commercial Items," as that term is defined in 48 C.F.R.
2.101, "Computer Software" and "Commercial Computer Software Documentation," as such terms are used in 48 C.F.R.
12.212 or 48 C.F.R. 227.7202, as applicable. Consistent with 48 C.F.R. 12.212 or 48 C.F.R. 227.7202-1 through 227.7207-4,
as applicable, the Commercial Computer Software and Commercial Software Documentation are licensed to the U.S.
Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other end users
pursuant to the terms and conditions herein.
GifEncoder
GifEncoder - writes out an image as a GIF. Transparency handling and variable bit size courtesy of Jack Palevich. Copyright
(C) 1996 by Jef Poskanzer * <jef@acme.com>. All rights reserved. Redistribution and use in source and binary forms,
with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source
code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in
binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR
AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Visit the ACME Labs Java page for up-to-date versions of this and other fine Java utilities:
http://www.acme.com/java/
ZXing 1.7
This project consists of contributions from several people, recognized here for convenience, in alphabetical order.
Notices 46

Agustín Delgado (Servinform S.A.), Aitor Almeida (University of Deusto), Alasdair Mackintosh (Google), Alexander
Martin (Haase & Martin GmbH), Andreas Pillath, Andrew Walbran (Google), Andrey Sitnik, Androida.hu /
http://www.androida.hu/, Antonio Manuel Benjumea (Servinform S.A.), Brian Brown (Google), Chang Hyun Park,
Christian Brunschen (Google), crowdin.net, Daniel Switkin (Google), Dave MacLachlan (Google), David Phillip Oster
(Google), David Albert (Bug Labs), David Olivier, Diego Pierotto, drejc83, Eduardo Castillejo (University of Deusto),
Emanuele Aina, Eric Kobrin (Velocitude), Erik Barbara, Fred Lin (Anobiit), gcstang, Hannes Erven, hypest (Barcorama
project), Isaac Potoczny-Jones, Jeff Breidenbach (Google), John Connolly (Bug Labs), Jonas Petersson (Prisjakt), Joseph
Wain (Google), Juho Mikkonen, jwicks, Kevin O'Sullivan (SITA), Kevin Xue (NetDragon Websoft Inc., China), Lachezar
Dobrev, Luiz Silva, Luka Finžgar, Marcelo, Mateusz Jędrasik, Matrix44, Matthew Schulkind (Google), Matt York
(LifeMarks), Mohamad Fairol, Morgan Courbet, Nikolaos Ftylitakis, Pablo Orduña (University of Deusto), Paul
Hackenberger, Ralf Kistner, Randy Shen (Acer), Rasmus Schrøder Sørensen, Richard Hřivňák, Romain Pechayre, Roman
Nurik (Google), Ryan Alford, Sanford Squires, Sean Owen (Google), Shiyuan Guo / 郭世元, Simon Flannery (Ericsson),
Steven Parkes, Suraj Supekar, Sven Klinkhamer, Thomas Gerbet, Vince Francis (LifeMarks), Wolfgang Jung, Yakov
Okshtein (Google)
Apache License Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
1Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1
through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are
under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct
or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership
of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to software source
code, documentation source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form,
including but not limited to compiled object code, generated documentation, and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License,
as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix
below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the
Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole,
an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications
or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in
the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright
owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written
communication sent to the Licensor or its representatives, including but not limited to communication on electronic
mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the
Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously
marked or otherwise designated in writing by the copyright owner as "Not a Contribution."
Notices 47

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been
received by Licensor and subsequently incorporated within the Work.
2Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to
You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce,
prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such
Derivative Works in Source or Object form.
3Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You
a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent
license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license
applies only to those patent claims licensable by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was
submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit)
alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent
infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the
date such litigation is filed.
4Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium,
with or without modifications, and in Source or Object form, provided that You meet the following conditions:
a(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
b(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
c(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent,
trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain
to any part of the Derivative Works; and
d(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You
distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding
those notices that do not pertain to any part of the Derivative Works, in at least one of the following places:
within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation,
if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and
wherever such third-party notices normally appear. The contents of the NOTICE file are for informational
purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works
that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such
additional attribution notices cannot be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license
terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works
as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions
stated in this License.
5Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for
inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any
additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of
any separate license agreement you may have executed with Licensor regarding such Contributions.
6Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product
names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work
and reproducing the content of the NOTICE file.
7Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and
each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-
INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for
determining the appropriateness of using or redistributing the Work and assume any risks associated with Your
exercise of permissions under this License.
Notices 48

8Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or
otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing,
shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential
damages of any character arising as a result of this License or out of the use or inability to use the Work (including
but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all
other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.
9Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may
choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations
and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own
behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify,
defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor
by reason of your accepting any such warranty or additional liability.
END OF TERMS AND CONDITIONS
APPENDIX: How to apply the Apache License to your work.
To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets
"[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the
appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose
be included on the same "printed page" as the copyright notice for easier identification within third-party archives.
Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the
License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the
specific language governing permissions and limitations under the License.
Notices 49

Glossary of Security Terms
Access Controls Settings that control whether individual device menus, functions, and settings
are available, and to whom. Also referred to as Function Access Controls on some
devices.
Authentication A method for securely identifying a user.
Authorization A method for specifying which functions are available to a user.
Building Block Authentication and Authorization tools used in the Embedded Web Server. They
include: password, PIN, Internal accounts, LDAP, LDAP+GSSAPI, Kerberos 5.
Group A collection of users sharing common characteristics.
Security Template A profile created and stored in the Embedded Web Server, used with Access
Controls to manage device functions.
Glossary of Security Terms 50

Index
Numerics
802.1x authentication 29
A
access controls
list of 43
managing with PIN or
password 20
managing with security
templates 20
understanding 7
Active Directory
printer, connecting 11
advanced security setup
password 8
Appendix A
CA file creation 41
Appendix A: CA file creation 41
Appendix B
CA‑Signed Device Certificate
creation 41
Appendix B: CA‑Signed Device
Certificate creation 41
Appendix C
Automatic Certification
Enrollment Application 41
Appendix C: Automatic Certification
Enrollment Application 41
authenticating
using Kerberos 17
using LDAP 13
using LDAP+GSSAPI 15
authentication
understanding 5
authorization
understanding 5
Automatic Certification Enrollment
Application
Appendix C 41
B
backup password
creating 19
using 19
basic security
applying basic security setup 8
authentication type 8
limiting access 8
modifying or removing access 8
building blocks
adding to security templates 20
internal accounts 10
Kerberos 5 17
LDAP 13
LDAP+GSSAPI 15
C
CA Cert Monitor Setup
configuring 19
CA certificate monitor 19
CA file creation
Appendix A 41
CA‑Signed Device Certificate
creation
Appendix B 41
certificate
creating 24
deleting 24
downloading 24
viewing 24
Certificate Authority (CA) certificate
monitor
setting 19
Certificate Authority (CA)
certificates
downloading 19
Certificate Authority certificate
installing 22
certificate defaults
setting 25
certificate information
device, configuring 23
certificates
setting defaults 25
confidential printing
configuring 25
configuring
CA Cert Monitor Setup 19
IP security settings 32
Out of Service Erase 35
TCP/IP port access setting 32
configuring device
certificate information 23
Configuring Out of Service Erase 35
connecting to a wireless network
using the Embedded Web
Server 29
creating
certificate 24
creating a new certificate 24
creating internal accounts 10
D
deleting
certificate 24
device, configuring
certificate information 23
disk wiping 36
modifying 27
wiping mode 27
disposing of printer hard disk 33
downloading
certificate 24
Certificate Authority (CA)
certificates 19
E
encrypting the printer hard disk 36
Erase Temporary Data Files 27
erasing hard disk memory 36
erasing non‑volatile memory 34
erasing volatile memory 34
F
Function Access Controls 7
function access controls
list of 43
G
groups
understanding 7
H
hard disk
wiping 36
hard disk memory
erasing 36
Index 51

I
installing
Certificate Authority certificate 22
Installing a Certificate Authority
certificate on the device 22
internal accounts
creating 10
using 10
IP security settings
configuring 32
IPSec
IP security settings 32
K
Kerberos
configuring 17
LDAP+GSSAPI and 17
setting date and time for 17
L
LDAP
using 13
LDAP+GSSAPI
Kerberos and 17
using 15
lockout 20
login
failure 20
restrictions 20
M
memory
types installed on printer 33
menu, security
Erase Temporary Data Files 27
N
non‑volatile memory 33
erasing 34
O
Out of Service Erase
configuring 35
P
Panel PIN Protect 10
password
advanced security setup 8
creating or editing 8
password, creating
security 9
Web Page Password Protect 9
personal identification number
(PIN) 9, 10
PIN
advanced security setup 9
creating or editing 9, 10
Panel PIN Protect 10
printer hard disk
disposing of 33
encrypting 36
printer hard disk encryption 36
printer, connecting
Active Directory 11
S
scenario
Active Directory networks 39
assigning security templates 39
creating passwords and PINs 38
creating security templates 38
printer in a public place 38
standalone or small office 39
security
802.1x authentication 29
Active Directory domain 11
authentication 5
authorization 5
backup password 19
confidential printing 25
disk wiping 27
groups 7
internal accounts 10
Kerberos authentication 17
LDAP authentication 13
LDAP+GSSAPI authentication 15
login restrictions 20
password 8
PIN 9, 10
reset jumper on motherboard 33
security audit log 27
security templates 20
SNMP 31
USB devices 26
security audit log
configuring 27
security devices
advanced 4
simple 4
security menu
Erase Temporary Data Files 27
security reset jumper
enabling 33
security templates
understanding 7
using to control function
access 20
setting
Certificate Authority (CA)
certificate monitor 19
SNMP 31
statement of volatility 33
T
TCP/IP Port Access
configuring 32
U
USB devices
disabling 26
enabling 26
V
viewing
certificate 24
volatile memory 33
erasing 34
volatility
statement of 33
W
Web Page Password Protect 9
wiping mode
disk wiping 27
wiping the hard disk 36
wireless network setup
using the Embedded Web
Serve 29
Index 52