Lexmark 47B1001, 47B1000 User Manual

Common Criteria
Installation Supplement and Administrator Guide
November 2011 www.lexmark.com
Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries. All other trademarks are the property of their respective owners.
© 2011 Lexmark International, Inc.
All rights reserved.
740 West New Circle Road Lexington, Kentucky 40550
3065326-001
Edition notice
November 2011 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL,
INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time.
For Lexmark technical support, visit support.lexmark.com. For information on supplies and downloads, visit www.lexmark.com. If you don't have access to the Internet, you can contact Lexmark by mail: Lexmark International, Inc.
Bldg 004-2/CSC 740 New Circle Road NW Lexington, KY 40550
References in this publication to products, programs, or services do not imply that the manufacturer intends to make these available in all countries in which it operates. Any reference to a product, program, or service is not intended to state or imply that only that product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any existing intellectual property right may be used instead. Evaluation and verification of operation in conjunction with other products, programs, or services, except those expressly designated by the manufacturer, are the user’s responsibility.
© 2011 Lexmark International, Inc. All rights reserved.
UNITED STATES GOVERNMENT RIGHTS
This software and any accompanying documentation provided under this agreement are commercial computer software and documentation developed exclusively at private expense.
Trademarks
Lexmark, Lexmark with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.
All other trademarks are the property of their respective owners.
3

Contents

Overview and first steps...............................................................................5
Overview...................................................................................................................................................5
Using this guide................................................................................................................................................... 5
Supported devices ..............................................................................................................................................5
Operating environment ...................................................................................................................................... 6
Before configuring the device (required)..................................................................................................6
Verifying physical interfaces and installed firmware .......................................................................................... 6
Attaching a lock .................................................................................................................................................. 7
Encrypting the hard disk ..................................................................................................................................... 7
Disabling the USB buffer..................................................................................................................................... 8
Installing the minimum configuration..........................................................9
Configuring the device..............................................................................................................................9
Configuration checklist ....................................................................................................................................... 9
Configuring disk wiping....................................................................................................................................... 9
Enabling the backup password (optional) .......................................................................................................... 9
Creating user accounts .....................................................................................................................................10
Creating security templates.............................................................................................................................. 11
Controlling access to device functions..............................................................................................................12
Disabling home screen icons ............................................................................................................................ 14
Administering the device............................................................................15
Using the Embedded Web Server...........................................................................................................15
Settings for network-connected devices.................................................................................................15
Creating and modifying digital certificates ....................................................................................................... 15
Setting up IPSec ................................................................................................................................................ 17
Disabling the AppleTalk protocol ...................................................................................................................... 18
Shutting down port access................................................................................................................................18
Other settings and functions...................................................................................................................19
Network Time Protocol.....................................................................................................................................19
Kerberos....................................................................................................................... ..................................... 19
Security audit logging ....................................................................................................................................... 20
E-mail ................................................................................................................................................................22
Fax.....................................................................................................................................................................24
Configuring security reset jumper behavior ..................................................................................................... 25
User access..............................................................................................................................................25
Creating user accounts through the EWS ......................................................................................................... 25
Configuring LDAP+GSSAPI.................................................................................................................................27
Configuring Common Access Card access ......................................................................................................... 30
4
Creating security templates using the EWS ...................................................................................................... 32
Controlling access to device functions....................................................................................................33
Configuring PKI Held Jobs .................................................................................................................................33
Controlling access to device functions using the EWS......................................................................................34
Troubleshooting.........................................................................................37
Login issues.............................................................................................................................................37
“Unsupported USB Device” error message ......................................................................................................37
The printer home screen fails to return to a locked state when not in use .....................................................37
Login screen does not appear when a Smart Card is inserted.......................................................................... 37
“The KDC and MFP clocks are different beyond an acceptable range; check the MFP's date and
time” error message..................................................................................................................................... 38
“Kerberos configuration file has not been uploaded” error message .............................................................. 38
Users are unable to authenticate .....................................................................................................................38
“The Domain Controller Issuing Certificate has not been installed” error message ........................................ 39
“The KDC did not respond within the required time” error message ..............................................................39
“User's Realm was not found in the Kerberos Configuration file” error message............................................39
“Realm on the card was not found in the Kerberos Configuration File” error message .................................. 40
“Client [NAME] unknown” error message ........................................................................................................40
Login does not respond at “Getting User Info” ................................................................................................40
User is logged out almost immediately after logging in ................................................................................... 40
LDAP issues..............................................................................................................................................41
LDAP lookups take a long time and then fail .................................................................................................... 41
LDAP lookups fail almost immediately .............................................................................................................41
Held Jobs/Print Release Lite issues.........................................................................................................42
“You are not authorized to use this feature” Held Jobs error message ........................................................... 42
“Unable to determine Windows User ID” error message................................................................................. 42
“There are no jobs available for [USER]” error message .................................................................................. 42
Jobs are printing out immediately ....................................................................................................................43
Appendix A: Using the touch screen...........................................................44
Appendix B: Acronyms...............................................................................46
Appendix C: Description of access controls.................................................47
Appendix D: Using Common Access Cards..................................................50
Notices.......................................................................................................51
Index..........................................................................................................54
5

Overview and first steps

Overview

This guide describes how to configure a supported LexmarkTM multifunction printer (MFP) to reach Common Criteria Evaluation Assurance Level 2 (EAL 2). It is critical that you carefully follow the instructions in this guide, as failure to do
so may result in a device that does not meet the requirements of the evaluation.

Using this guide

This guide is intended for use by Lexmark service providers, and network administrators responsible for the management of security appliances and software in their network environment. A working knowledge of Lexmark multifunction printers is required for effective use of this guide.
Some settings can be configured using either the Embedded Web Server (EWS), or the device touch screen. Where applicable, instructions for both methods are included.
For information about physically setting up the MFP or using device features, see the User Guide that came with your MFP. For information about using the MFP touch screen, see“Appendix A: Using the touch screen” on page 44.

Supported devices

This guide describes how to implement an evaluated configuration on the following models:
Lexmark X548
Lexmark XS548
Lexmark X792
Lexmark XS796
Lexmark X925
Lexmark XS925
Lexmark X950
Lexmark X952
Lexmark X954
Lexmark XS955
Lexmark 6500e scanner with T650 printer
Lexmark 6500e scanner with T652 printer
Lexmark 6500e scanner with T654 printer
Lexmark 6500e scanner with T656 printer
Note: If you are using a Lexmark 6500e scanner with a T650, T652, T654, or T656 printer, then you must complete the setup and configuration steps in the Setup Guide that came with the scanner before following the instructions in this guide.
6

Operating environment

The instructions provided in this guide are based on the following assumptions and objectives:
The MFP is installed in a cooperative, nonhostile environment that is physically secure or monitored and provides
protection from unauthorized access to MFP external interfaces.
The administration platform and local area network are physically and logically secure.
Authorized administrators are trained and are capable of performing tasks related to the installation, configuration,
operation, and maintenance of the network environment including—but not limited to—operating systems, network protocols, and security policies and procedures.
Authorized administrators are trusted to use their access rights appropriately.
Audit records exported from the MFP to another trusted location are accessible to authorized personnel for periodic
review and are secured from unauthorized access.
The operating environment provides the ability to identify and authenticate users whose accounts are defined
externally (LDAP, Kerberos, etc.).
When an administrator configures Network Time Protocol (NTP), the operating environment provides reliable time
stamps.
MFP users are aware of and are trained to follow the security policies and procedures of their organization. Users
are authorized to use the MFP according to these policies and procedures.

Before configuring the device (required)

Before beginning configuration tasks, you must:
Verify that no optional interfaces are installed
Verify the firmware
Attach a lock to the MFP
Encrypt the hard disk

Verifying physical interfaces and installed firmware

1 Inspect the MFP to verify that only one network interface is installed. There should be no optional network, parallel,
or serial interfaces.
Note: USB ports that perform document processing functions are disabled at the factory.
2 Turn the MFP on using the power switch.
3 From the home screen, touch > Reports > Menu Settings Page. Several pages of device information will print.
4 In the Installed Features section, verify that no Download Emulator (DLE) option cards have been installed.
5 If you find additional interfaces, or if a DLE card has been installed, then contact your Lexmark representative before
proceeding.
6 To verify the firmware version, under Device Information, locate Base =, and Network =.
7 Contact your Lexmark representative to verify that the Base and Network values are correct and uptodate.
7

Attaching a lock

Once a lock is attached, the metal plate and system board cannot be removed, and the security jumper cannot be accessed without causing visible damage to the device.
Note: If you are using a Lexmark 6500e scanner with a T650, T652, T654, or T656 printer, then you must attach a lock to both the scanner and the printer.
1 Verify that the MFP case is closed.
2 Locate the security slot, and then attach a lock. It is the same type of security slot found on most laptop computers
and can normally be found on the back of the MFP near an outside edge.
The following illustrations show the most common security slot locations:

Encrypting the hard disk

Hard disk encryption helps prevent the loss of sensitive data in the event your MFP—or its hard disk—is stolen.
1 Turn off the MFP using the power switch.
2 Simultaneously press and hold the 2 and 6 keys on the numeric keypad while turning the device back on. It takes
approximately a minute to boot into the Configuration menu.
Once the MFP is ready, the touch screen displays a list of functions instead of standard home screen icons such as Copy and Fax.
8
3 Verify that the MFP is in Configuration mode by locating the Exit Config Menu icon in the lower right corner of the
touch screen.
4 Scroll through the configuration menus to locate the Disk Encryption menu selection.
5 Touch Disk Encryption > Enable.
Warning: Enabling disk encryption will erase the contents of the hard disk.
6 The following message appears: Contents will be lost. Continue?
Touch Yes to proceed with disk wiping and encryption. A status bar will indicate the progress of the encryption
task. Disk encryption can take several hours to complete. After the disk has been encrypted, the MFP will return to the Enable/Disable screen.
Warning: Do not turn off the device during the encryption process. Doing so may result in loss of data.
7 Touch Back, and then touch Exit Config Menu.
The MFP will undergo a poweron reset, and then return to normal operating mode.

Disabling the USB buffer

Disabling the USB buffer disables the USB host port on the back of the device.
1 From the home screen, touch > Network/Ports > Standard USB.
2 Set USB Buffer to Disabled.
3 Touch Submit.
9

Installing the minimum configuration

You can achieve an evaluated configuration on a non-networked (standalone) device in just a few steps. For this configuration, all tasks are performed at the device, using the touch screen.

Configuring the device

Configuration checklist

This checklist outlines the steps required to implement an evaluated configuration on a standalone device. For information about additional configuration options, see “Administering the device” on page 15.
After completing the preconfiguration tasks found in “Before configuring the device (required)” on page 6, continue with this section to configure the settings needed to achieve the evaluated configuration for a standalone device:
1 Set up disk wiping.
2 Create user accounts.
3 Create security templates.
4 Restrict access to device functions.
5 Disable home screen icons.

Configuring disk wiping

Disk wiping is used to remove residual confidential material from the device. Disk wiping uses random data patterns to securely overwrite files stored on the hard drive that have been marked for deletion. Multipass wiping is compliant with the DoD 5220.22M standard for securely erasing data from a hard disk.
1 From the home screen, touch > Security > Disk Wiping.
2 Set Wiping Mode to Auto.
3 Set Automatic Method to Multipass.
4 Touch Submit.

Enabling the backup password (optional)

Warning: Using a backup password is strongly discouraged because it can degrade the overall security of your device.
Note: The backup password should:
Contain a minimum of 8 characters.
Contain at least one lowercase letter, one uppercase letter, and one nonalphabetic character.
Not be a dictionary word or a variation of the user ID.
1 From the home screen, touch > Security > Edit Security Setups > Edit Backup Password > Password.
2 Type the password you want to use, and then touch Done.
10
3 Retype the password, and then touch Done to save the new password and return to the Edit Backup Password
screen.
4 Set Use Backup Password to On.
5 Touch Submit.

Creating user accounts

Creating internal (device) accounts for use with the evaluated configuration involves not only assigning a user ID and password to each user, but also segmenting users into groups. When configuring security templates, you will select one or more of these groups, and then you will apply a security template to each device function to control access to that function. The MFP supports a maximum of 250 user accounts and 32 user groups.
Step 1: Defining groups
1
From the home screen, touch > Security > Edit Security Setups > Edit Building Blocks > Internal Accounts > General Settings > Groups for Internal Accounts.
2 On the Groups for Internal Accounts screen, touch Add Entry.
3 For the Name, type Administrator_Only.
4 Touch Done to save this group and return to the Groups for Internal Accounts screen.
5 Touch Add Entry.
6 For the Name, type Authenticated_Users.
7 Touch Done to save this group.
Note: If there is a need to grant access to some administrative functions while restricting others, then you can create
additional groups, such as “Administrator_Reports” or “Administrator_Security.”
Scenario 1: Using two groups
Group name Type of user group would be selected for
Administrator_Only Administrators permitted to access all device functions
Authenticated_Users
Administrators
Nonadministrators (all other users)
Scenario 2: Using multiple groups
Group name Type of user group would be selected for
Administrator_Only Administrators permitted to access all device functions
Administrator_Reports
Administrator_Security
Administrators permitted to access all device functions
Administrators permitted to use device functions and access the Reports
menu
Administrators permitted to access all device functions
Administrators permitted to use device functions and access the
Security menu
11
Group name Type of user group would be selected for
Authenticated_Users
Administrators permitted to access all device functions
Administrators permitted to use device functions and access the Reports
menu
Administrators permitted to use device functions and access the
Security menu
Non‑administrators (all other users)
Step 2: Creating accounts
1
From the home screen, touch > Security > Edit Security Setups > Edit Building Blocks > Internal Accounts > General Settings.
2 On the General Settings screen, set Required User Credentials to User ID and password, and then touch Submit.
The MFP will return to the Internal Accounts screen.
3 Select Manage Internal Accounts > Add Entry.
4 Type the user's account name (example: “Jack Smith”), and then touch Done.
5 Type a user ID for the account (example: “jsmith”), and then touch Done.
6 Type a password for the account, and then touch Done. Passwords must:
Contain a minimum of 8 characters.
Contain at least one lowercase letter, one uppercase letter, and one nonalphabetic character.
Not be dictionary words or a variation of the user ID.
7 Retype the password, and then touch Done.
8 Type the user's e-mail address (example: “jsmith@company.com”), and then touch Done.
9 From the Set Groups screen, add one or more groups, as follows:
For users who should have administrator privileges, select the Authenticated_Users group and one or more
Administrator groups as needed. If you have created multiple groups to grant access to specific device functions, then select all groups in which the administrator should be included.
For all other users, add only the Authenticated_Users group.
10 After selecting the appropriate group or groups, touch Done to save the account and return to the Manage Internal
Accounts screen, where the user should now be listed.
11 Repeat the steps as needed to add more users.

Creating security templates

A security template is assigned to each device function to control which users are permitted to access that function. At a minimum, you must create two security templates: one for "Administrator_Only" and one for "Authenticated_Users." If there is a need to grant access to some administrative functions while restricting others, then you can create additional security templates, such as “Administrator_Reports” or “Administrator_Security.” Each template will be populated with groups containing users authorized to access the functions protected by that template.
1 From the home screen, touch > Security > Edit Security Setups > Edit Security Templates.
2 Touch Add Entry.
12
3 Type a unique name to identify the template. Use a descriptive name, such as ”Administrator_Only” or
“Authenticated_Users,” and then touch Done.
4 On the Authentication Setup screen, select the internal accounts building block, and then touch Done.
5 On the Authorization Setup screen, select the internal accounts building block, and then touch Done.
6 Select one or more groups to be included in the template, and then touch Done to save your changes and return
to the Edit Security Templates screen.
Modifying or deleting an existing security template
Note: You can delete a security template only if it is not in use; however, security templates currently in use can be
modified.
From the home screen, touch
> Security > Edit Security Setups > Edit Security Templates.
To remove all security templates, touch Delete List.
To remove an individual security template, select it from the list, and then touch Delete Entry.
To modify an individual security template, select it from the list, and then touch Open Entry.

Controlling access to device functions

Access to device functions can be restricted by applying security templates to individual functions. For a list of access controls and what they do, see “Access controls” on page 47.
1 From the home screen, touch > Security > Edit Security Setups > Edit Access Controls.
2 Select the appropriate level of protection for each function, as specified in the following table. It may be necessary
to scroll through several screens to set all access controls.
3 After assigning an appropriate security template to all functions, touch Submit.
Levels of protection include:
Administrator access only—This can be an internal account or a security template, as long as it provides
administratoronly authentication and authorization.
Authenticated users only—This can be an internal account or a security template, as long as it provides access to
authenticated users only. These access controls must not be set to No Security.
Disabled—This disables access to a function for all users and administrators.
Not applicable—The function has been disabled by another setting. No change is required, although it is
recommended that you set these access controls to Administrator access only or Disabled.
Access controls and required levels of protection
Access control Level of protection
Security Menu at the Device Administrator access only
Security Menu Remotely Administrator access only
Service Engineer Menus at the Device Administrator access only
Service Engineer Menus Remotely Administrator access only
Configuration Menu Disabled
13
Access control Level of protection
Paper Menu at the Device Authenticated users only
Paper Menu Remotely Authenticated users only
Reports Menu at the Device Administrator access only
Reports Menu Remotely Administrator access only
Settings Menu at the Device Administrator access only
Settings Menu Remotely Administrator access only
Network/Ports Menu at the Device Administrator access only
Network/Ports Menu Remotely Administrator access only
Manage Shortcuts at the Device Authenticated users only
Manage Shortcuts Remotely Authenticated users only
Supplies Menu at the Device Authenticated users only
Supplies Menu Remotely Authenticated users only
Option Card Configuration at the Device Administrator access only
Option Card Configuration Remotely Administrator access only
Web Import/Export Settings Disabled
Solutions Configuration Administrator access only
Remote Management Administrator access only
Firmware Updates Disabled
PJL Device Setting Changes Disabled
Operator Panel Lock Authenticated users only
Address Book Authenticated users only
Create Profiles Disabled
Create Bookmarks at the Device Disabled
Create Bookmarks Remotely Disabled
Flash Drive Print Not applicable—USB port disabled
Flash Drive Color Printing Not applicable—USB port disabled
Flash Drive Scan Not applicable—USB port disabled
Copy Function Authenticated users only
Copy Color Printing Authenticated users only
Color Dropout Authenticated users only
Email Function Authenticated users only
Fax Function Authenticated users only
Release Held Faxes Administrator access only
FTP Function Disabled
14
Access control Level of protection
Held Jobs Access Disabled
Use Profiles Authenticated users only
Change Language from Home Screen Authenticated users only
Cancel Jobs at the Device Administrator access only
PictBridge Printing Not applicable—USB port disabled
Solution 1 Authenticated users only
Note: When eSF applications are configured, Solution 1 controls access to Held Jobs.
Solutions 210 Administrator access only
New Solutions Administrator access only

Disabling home screen icons

The final step is to remove unneeded icons from the MFP home screen.
1 From the home screen, touch > Settings > General Settings.
2 Touch Home screen customization.
3 Set FTP, FTP shortcuts, and USB Drive to Do not display.
Note: If other functions (such as Fax) are not available to users, then you can also disable the icons for those
functions.
4 Touch Submit.
15

Administering the device

This chapter describes how to configure additional settings and functions that may be available on your device.

Using the Embedded Web Server

Many settings can be configured using either the Embedded Web Server (EWS) or the touch screen.
Accessing the EWS
1 Type the device IP address or host name in the address field of your Web browser using the secure version of the
page (with the address beginning “https://”).
2 Use the navigation menu on the left to access configuration and report menus.
Note: If the device IP address or host name is not readily apparent, then you can find it by printing a network
setup page.
Printing a network setup page
From the home screen, touch > Reports > Network Setup Page. After the network setup page prints, the MFP will return to the home screen.

Settings for network-connected devices

After attaching the MFP to a network, you will need to configure additional settings. This section covers the basic settings required for a network-connected device.

Creating and modifying digital certificates

Certificates are needed for domain controller verification and for SSL support in LDAP. Each certificate must be in a separate PEM (.cer) file.
Setting certificate defaults
The values entered here will be present in all new certificates generated in the Certificate Management task.
1 From the Embedded Web Server, click Settings > Security > Certificate Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click Set Certificate Defaults.
3 Enter values in the appropriate fields:
Common Name—Type a name for the device.
Note: Leave this field blank if you want to use the device host name as the Common Name.
Organization Name—Type the name of the company or organization issuing the certificate.
Unit Name—Type the name of the unit within the company or organization issuing the certificate.
16
Country/Region—Type the country or region where the company or organization issuing the certificate is
located (2character maximum).
Province Name—Type the province where the company or organization issuing the certificate is located.
City Name—Type the city where the company or organization issuing the certificate is located.
Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, enter
an IP address using the format IP:255.255.255.255. Leave this field blank if you want to use the IPv4 address.
4 Click Submit.
Note: All fields accept a maximum of 128 characters, except where noted.
Creating a new certificate
1
From the Embedded Web Server, click Settings > Security > Certificate Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click Device Certificate Management > New.
3 Enter values in the appropriate fields:
Friendly Name—Type a name for the certificate (64character maximum).
Common Name—Type a name for the device.
Note: Leave this field blank if you want to use the device host name as the Common Name.
Organization Name—Type the name of the company or organization issuing the certificate.
Unit Name—Type the name of the unit within the company or organization issuing the certificate.
Country/Region—Type the country or region where the company or organization issuing the certificate is
located (2character maximum).
Province Name—Type the province where the company or organization issuing the certificate is located.
City Name—Type the city where the company or organization issuing the certificate is located.
Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, enter
an IP address using the format IP:255.255.255.255 or a DNS address using the format DNS:ldap.company.com. Leave this field blank if you want to use the IPv4 address.
4 Click Generate New Certificate.
Note: All fields accept a maximum of 128 characters, except where noted.
Viewing, downloading, and deleting a certificate
1
From the Embedded Web Server, click Settings > Security > Certificate Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click Device Certificate Management.
3 Select a certificate from the list.
The details of the certificate are displayed in the Device Certificate Management window.
4 Do any of the following:
Delete—Remove a previously stored certificate.
Download To File—Download or save the certificate as a PEM (.cer) file.
17
The contents of the file should be in the following format:
-----BEGIN CERTIFICATE----­MIIE1jCCA76gAwIBAgIQY6sV0KL3tIhBtlr4gHG85zANBgkqhkiG9w0BAQUFADBs … l3DTbPe0mnIbTq0iWqKEaVne1vvaDt52iSpEQyevwgUcHD16rFy+sOnCaQ==
-----END CERTIFICATE-----
Download Signing Request—Download or save the signing request as a .csr file.
Install Signed Certificate—Upload a previously signed certificate.
Installing a CA certificate
A Certificate Authority (CA) certificate is required if you will be using the PKI Authentication application.
1 From the Embedded Web Server, click Settings > Security > Certificate Management > Certificate Authority
Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click New.
3 Click Browse to locate the Certificate Authority Source file, and then click Submit.
Note: The Certificate Authority Source file must be in PEM (.cer) format.
4 Reboot the MFP by turning it off and back on using the power switch.

Setting up IPSec

IPSec encrypts IP packets as they are transmitted over the network between devices. It does not handle authentication or restrict access.
1 From the Embedded Web Server, click Settings > Security > IPSec.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Select the IPSec Enable check box, and then click Submit. Your browser will return to the Security page.
3 Click IPSec.
4 In the Settings section, click Encryption, and then select 3DES from the Proposed Encryption Method dropdown
menu.
5 In the Settings section, click Certificate Validation, and then select the Validate Peer Certificate check box.
6 In the Connections section, click either PreShared Key Authenticated Connections or Certificate Authenticated
Connections, and then click one of the numbered Host fields.
7 Type the IP address of the client device you want to connect to the MFP. If you are using Pre
Authentication, then also type the key.
Note: If you are using PSK Authentication, then retain the key to use later when configuring client devices.
Shared Key (PSK)
8 Configure IPSec as needed on client devices that will connect to the MFP.
9 Click Submit.
Loading...
+ 39 hidden pages