Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.
All other trademarks are the property of their respective owners.
740 West New Circle Road
Lexington, Kentucky 40550
3065326-001
Edition notice
November 2011
The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL,
INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these
changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any
time.
For Lexmark technical support, visit support.lexmark.com.
For information on supplies and downloads, visit www.lexmark.com.
If you don't have access to the Internet, you can contact Lexmark by mail:
Lexmark International, Inc.
Bldg 004-2/CSC
740 New Circle Road NW
Lexington, KY 40550
References in this publication to products, programs, or services do not imply that the manufacturer intends to make these available in all
countries in which it operates. Any reference to a product, program, or service is not intended to state or imply that only that product,
program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any existing intellectual
property right may be used instead. Evaluation and verification of operation in conjunction with other products, programs, or services,
except those expressly designated by the manufacturer, are the user’s responsibility.
This software and any accompanying documentation provided under this agreement are commercial computer software and documentation
developed exclusively at private expense.
Trademarks
Lexmark, Lexmark with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the United States and/or
other countries.
All other trademarks are the property of their respective owners.
3
Contents
Overview and first steps...............................................................................5
Using this guide................................................................................................................................................... 5
Before configuring the device (required)..................................................................................................6
Verifying physical interfaces and installed firmware .......................................................................................... 6
Attaching a lock .................................................................................................................................................. 7
Encrypting the hard disk ..................................................................................................................................... 7
Disabling the USB buffer..................................................................................................................................... 8
Installing the minimum configuration..........................................................9
Configuring the device..............................................................................................................................9
Configuring disk wiping....................................................................................................................................... 9
Enabling the backup password (optional) .......................................................................................................... 9
Creating user accounts .....................................................................................................................................10
Controlling access to device functions..............................................................................................................12
Disabling home screen icons ............................................................................................................................ 14
Administering the device............................................................................15
Using the Embedded Web Server...........................................................................................................15
Settings for network-connected devices.................................................................................................15
Creating and modifying digital certificates ....................................................................................................... 15
Setting up IPSec ................................................................................................................................................ 17
Disabling the AppleTalk protocol ...................................................................................................................... 18
Shutting down port access................................................................................................................................18
Other settings and functions...................................................................................................................19
Network Time Protocol.....................................................................................................................................19
User access..............................................................................................................................................25
Creating user accounts through the EWS ......................................................................................................... 25
Configuring Common Access Card access ......................................................................................................... 30
4
Creating security templates using the EWS ...................................................................................................... 32
Controlling access to device functions....................................................................................................33
Configuring PKI Held Jobs .................................................................................................................................33
Controlling access to device functions using the EWS......................................................................................34
“Kerberos configuration file has not been uploaded” error message .............................................................. 38
Users are unable to authenticate .....................................................................................................................38
“The Domain Controller Issuing Certificate has not been installed” error message ........................................ 39
“The KDC did not respond within the required time” error message ..............................................................39
“User's Realm was not found in the Kerberos Configuration file” error message............................................39
“Realm on the card was not found in the Kerberos Configuration File” error message .................................. 40
LDAP lookups take a long time and then fail .................................................................................................... 41
LDAP lookups fail almost immediately .............................................................................................................41
Held Jobs/Print Release Lite issues.........................................................................................................42
“You are not authorized to use this feature” Held Jobs error message ........................................................... 42
“Unable to determine Windows User ID” error message................................................................................. 42
“There are no jobs available for [USER]” error message .................................................................................. 42
Jobs are printing out immediately ....................................................................................................................43
Appendix A: Using the touch screen...........................................................44
This guide describes how to configure a supported LexmarkTM multifunction printer (MFP) to reach Common Criteria
Evaluation Assurance Level 2 (EAL 2). It is critical that you carefully follow the instructions in this guide, as failure to do
so may result in a device that does not meet the requirements of the evaluation.
Using this guide
This guide is intended for use by Lexmark service providers, and network administrators responsible for the
management of security appliances and software in their network environment. A working knowledge of Lexmark
multifunction printers is required for effective use of this guide.
Some settings can be configured using either the Embedded Web Server (EWS), or the device touch screen. Where
applicable, instructions for both methods are included.
For information about physically setting up the MFP or using device features, see the User Guide that came with your
MFP. For information about using the MFP touch screen, see“Appendix A: Using the touch screen” on page 44.
Supported devices
This guide describes how to implement an evaluated configuration on the following models:
• Lexmark X548
• Lexmark XS548
• Lexmark X792
• Lexmark XS796
• Lexmark X925
• Lexmark XS925
• Lexmark X950
• Lexmark X952
• Lexmark X954
• Lexmark XS955
• Lexmark 6500e scanner with T650 printer
• Lexmark 6500e scanner with T652 printer
• Lexmark 6500e scanner with T654 printer
• Lexmark 6500e scanner with T656 printer
Note: If you are using a Lexmark 6500e scanner with a T650, T652, T654, or T656 printer, then you must complete
the setup and configuration steps in the Setup Guide that came with the scanner before following the instructions in
this guide.
6
Operating environment
The instructions provided in this guide are based on the following assumptions and objectives:
• The MFP is installed in a cooperative, nonhostile environment that is physically secure or monitored and provides
protection from unauthorized access to MFP external interfaces.
• The administration platform and local area network are physically and logically secure.
• Authorized administrators are trained and are capable of performing tasks related to the installation, configuration,
operation, and maintenance of the network environment including—but not limited to—operating systems,
network protocols, and security policies and procedures.
• Authorized administrators are trusted to use their access rights appropriately.
• Audit records exported from the MFP to another trusted location are accessible to authorized personnel for periodic
review and are secured from unauthorized access.
• The operating environment provides the ability to identify and authenticate users whose accounts are defined
externally (LDAP, Kerberos, etc.).
• When an administrator configures Network Time Protocol (NTP), the operating environment provides reliable time
stamps.
• MFP users are aware of and are trained to follow the security policies and procedures of their organization. Users
are authorized to use the MFP according to these policies and procedures.
Before configuring the device (required)
Before beginning configuration tasks, you must:
• Verify that no optional interfaces are installed
• Verify the firmware
• Attach a lock to the MFP
• Encrypt the hard disk
Verifying physical interfaces and installed firmware
1 Inspect the MFP to verify that only one network interface is installed. There should be no optional network, parallel,
or serial interfaces.
Note: USB ports that perform document processing functions are disabled at the factory.
2 Turn the MFP on using the power switch.
3 From the home screen, touch > Reports > Menu Settings Page. Several pages of device information will print.
4 In the Installed Features section, verify that no Download Emulator (DLE) option cards have been installed.
5 If you find additional interfaces, or if a DLE card has been installed, then contact your Lexmark representative before
proceeding.
6 To verify the firmware version, under Device Information, locate Base =, and Network =.
7 Contact your Lexmark representative to verify that the Base and Network values are correct and up‑to‑date.
7
Attaching a lock
Once a lock is attached, the metal plate and system board cannot be removed, and the security jumper cannot be
accessed without causing visible damage to the device.
Note: If you are using a Lexmark 6500e scanner with a T650, T652, T654, or T656 printer, then you must attach a
lock to both the scanner and the printer.
1 Verify that the MFP case is closed.
2 Locate the security slot, and then attach a lock. It is the same type of security slot found on most laptop computers
and can normally be found on the back of the MFP near an outside edge.
The following illustrations show the most common security slot locations:
Encrypting the hard disk
Hard disk encryption helps prevent the loss of sensitive data in the event your MFP—or its hard disk—is stolen.
1 Turn off the MFP using the power switch.
2 Simultaneously press and hold the 2 and 6 keys on the numeric keypad while turning the device back on. It takes
approximately a minute to boot into the Configuration menu.
Once the MFP is ready, the touch screen displays a list of functions instead of standard home screen icons such as
Copy and Fax.
8
3 Verify that the MFP is in Configuration mode by locating the Exit Config Menu icon in the lower right corner of the
touch screen.
4 Scroll through the configuration menus to locate the Disk Encryption menu selection.
5 Touch Disk Encryption > Enable.
Warning: Enabling disk encryption will erase the contents of the hard disk.
6 The following message appears: Contents will be lost. Continue?
• Touch Yes to proceed with disk wiping and encryption. A status bar will indicate the progress of the encryption
task. Disk encryption can take several hours to complete.
After the disk has been encrypted, the MFP will return to the Enable/Disable screen.
Warning: Do not turn off the device during the encryption process. Doing so may result in loss of data.
7 Touch Back, and then touch Exit Config Menu.
The MFP will undergo a power‑on reset, and then return to normal operating mode.
Disabling the USB buffer
Disabling the USB buffer disables the USB host port on the back of the device.
1 From the home screen, touch > Network/Ports > Standard USB.
2 Set USB Buffer to Disabled.
3 Touch Submit.
9
Installing the minimum configuration
You can achieve an evaluated configuration on a non-networked (standalone) device in just a few steps. For this
configuration, all tasks are performed at the device, using the touch screen.
Configuring the device
Configuration checklist
This checklist outlines the steps required to implement an evaluated configuration on a standalone device. For
information about additional configuration options, see “Administering the device” on page 15.
After completing the pre‑configuration tasks found in “Before configuring the device (required)” on page 6, continue
with this section to configure the settings needed to achieve the evaluated configuration for a standalone device:
1 Set up disk wiping.
2 Create user accounts.
3 Create security templates.
4 Restrict access to device functions.
5 Disable home screen icons.
Configuring disk wiping
Disk wiping is used to remove residual confidential material from the device. Disk wiping uses random data patterns
to securely overwrite files stored on the hard drive that have been marked for deletion. Multi‑pass wiping is compliant
with the DoD 5220.22‑M standard for securely erasing data from a hard disk.
1 From the home screen, touch > Security > Disk Wiping.
2 Set Wiping Mode to Auto.
3 Set Automatic Method to Multi‑pass.
4 Touch Submit.
Enabling the backup password (optional)
Warning: Using a backup password is strongly discouraged because it can degrade the overall security of your device.
Note: The backup password should:
• Contain a minimum of 8 characters.
• Contain at least one lowercase letter, one uppercase letter, and one non‑alphabetic character.
• Not be a dictionary word or a variation of the user ID.
1 From the home screen, touch > Security > Edit Security Setups > Edit Backup Password > Password.
2 Type the password you want to use, and then touch Done.
10
3 Retype the password, and then touch Done to save the new password and return to the Edit Backup Password
screen.
4 Set Use Backup Password to On.
5 Touch Submit.
Creating user accounts
Creating internal (device) accounts for use with the evaluated configuration involves not only assigning a user ID and
password to each user, but also segmenting users into groups. When configuring security templates, you will select
one or more of these groups, and then you will apply a security template to each device function to control access to
that function. The MFP supports a maximum of 250 user accounts and 32 user groups.
Step 1: Defining groups
1
From the home screen, touch > Security > Edit Security Setups > Edit Building Blocks > Internal Accounts >
General Settings > Groups for Internal Accounts.
2 On the Groups for Internal Accounts screen, touch Add Entry.
3 For the Name, type Administrator_Only.
4 Touch Done to save this group and return to the Groups for Internal Accounts screen.
5 Touch Add Entry.
6 For the Name, type Authenticated_Users.
7 Touch Done to save this group.
Note: If there is a need to grant access to some administrative functions while restricting others, then you can create
additional groups, such as “Administrator_Reports” or “Administrator_Security.”
Scenario 1: Using two groups
Group nameType of user group would be selected for
Administrator_OnlyAdministrators permitted to access all device functions
Authenticated_Users
• Administrators
• Non‑administrators (all other users)
Scenario 2: Using multiple groups
Group nameType of user group would be selected for
Administrator_OnlyAdministrators permitted to access all device functions
Administrator_Reports
Administrator_Security
• Administrators permitted to access all device functions
• Administrators permitted to use device functions and access the Reports
menu
• Administrators permitted to access all device functions
• Administrators permitted to use device functions and access the
Security menu
11
Group nameType of user group would be selected for
Authenticated_Users
• Administrators permitted to access all device functions
• Administrators permitted to use device functions and access the Reports
menu
• Administrators permitted to use device functions and access the
Security menu
• Non‑administrators (all other users)
Step 2: Creating accounts
1
From the home screen, touch > Security > Edit Security Setups > Edit Building Blocks > Internal Accounts >
General Settings.
2 On the General Settings screen, set Required User Credentials to User ID and password, and then touch Submit.
The MFP will return to the Internal Accounts screen.
3 Select Manage Internal Accounts > Add Entry.
4 Type the user's account name (example: “Jack Smith”), and then touch Done.
5 Type a user ID for the account (example: “jsmith”), and then touch Done.
6 Type a password for the account, and then touch Done. Passwords must:
• Contain a minimum of 8 characters.
• Contain at least one lowercase letter, one uppercase letter, and one non‑alphabetic character.
• Not be dictionary words or a variation of the user ID.
7 Retype the password, and then touch Done.
8 Type the user's e-mail address (example: “jsmith@company.com”), and then touch Done.
9 From the Set Groups screen, add one or more groups, as follows:
• For users who should have administrator privileges, select the Authenticated_Users group and one or more
Administrator groups as needed. If you have created multiple groups to grant access to specific device functions,
then select all groups in which the administrator should be included.
• For all other users, add only the Authenticated_Users group.
10 After selecting the appropriate group or groups, touch Done to save the account and return to the Manage Internal
Accounts screen, where the user should now be listed.
11 Repeat the steps as needed to add more users.
Creating security templates
A security template is assigned to each device function to control which users are permitted to access that function.
At a minimum, you must create two security templates: one for "Administrator_Only" and one for
"Authenticated_Users." If there is a need to grant access to some administrative functions while restricting others, then
you can create additional security templates, such as “Administrator_Reports” or “Administrator_Security.” Each
template will be populated with groups containing users authorized to access the functions protected by that template.
1 From the home screen, touch > Security > Edit Security Setups > Edit Security Templates.
2 Touch Add Entry.
12
3 Type a unique name to identify the template. Use a descriptive name, such as ”Administrator_Only” or
“Authenticated_Users,” and then touch Done.
4 On the Authentication Setup screen, select the internal accounts building block, and then touch Done.
5 On the Authorization Setup screen, select the internal accounts building block, and then touch Done.
6 Select one or more groups to be included in the template, and then touch Done to save your changes and return
to the Edit Security Templates screen.
Modifying or deleting an existing security template
Note: You can delete a security template only if it is not in use; however, security templates currently in use can be
• To remove all security templates, touch Delete List.
• To remove an individual security template, select it from the list, and then touch Delete Entry.
• To modify an individual security template, select it from the list, and then touch Open Entry.
Controlling access to device functions
Access to device functions can be restricted by applying security templates to individual functions. For a list of access
controls and what they do, see “Access controls” on page 47.
1 From the home screen, touch > Security > Edit Security Setups > Edit Access Controls.
2 Select the appropriate level of protection for each function, as specified in the following table. It may be necessary
to scroll through several screens to set all access controls.
3 After assigning an appropriate security template to all functions, touch Submit.
Levels of protection include:
• Administrator access only—This can be an internal account or a security template, as long as it provides
administrator‑only authentication and authorization.
• Authenticated users only—This can be an internal account or a security template, as long as it provides access to
authenticated users only. These access controls must not be set to No Security.
• Disabled—This disables access to a function for all users and administrators.
• Not applicable—The function has been disabled by another setting. No change is required, although it is
recommended that you set these access controls to Administrator access only or Disabled.
Access controls and required levels of protection
Access controlLevel of protection
Security Menu at the DeviceAdministrator access only
Security Menu RemotelyAdministrator access only
Service Engineer Menus at the DeviceAdministrator access only
Service Engineer Menus RemotelyAdministrator access only
Configuration MenuDisabled
13
Access controlLevel of protection
Paper Menu at the DeviceAuthenticated users only
Paper Menu RemotelyAuthenticated users only
Reports Menu at the DeviceAdministrator access only
Reports Menu RemotelyAdministrator access only
Settings Menu at the DeviceAdministrator access only
Settings Menu RemotelyAdministrator access only
Network/Ports Menu at the DeviceAdministrator access only
Network/Ports Menu RemotelyAdministrator access only
Manage Shortcuts at the DeviceAuthenticated users only
Manage Shortcuts RemotelyAuthenticated users only
Supplies Menu at the DeviceAuthenticated users only
Supplies Menu RemotelyAuthenticated users only
Option Card Configuration at the Device Administrator access only
Option Card Configuration RemotelyAdministrator access only
Web Import/Export SettingsDisabled
Solutions ConfigurationAdministrator access only
Remote ManagementAdministrator access only
Firmware UpdatesDisabled
PJL Device Setting ChangesDisabled
Operator Panel LockAuthenticated users only
Address BookAuthenticated users only
Create ProfilesDisabled
Create Bookmarks at the DeviceDisabled
Create Bookmarks RemotelyDisabled
Flash Drive PrintNot applicable—USB port disabled
Flash Drive Color PrintingNot applicable—USB port disabled
Flash Drive ScanNot applicable—USB port disabled
Copy FunctionAuthenticated users only
Copy Color PrintingAuthenticated users only
Color DropoutAuthenticated users only
E‑mail FunctionAuthenticated users only
Fax FunctionAuthenticated users only
Release Held FaxesAdministrator access only
FTP FunctionDisabled
14
Access controlLevel of protection
Held Jobs AccessDisabled
Use ProfilesAuthenticated users only
Change Language from Home ScreenAuthenticated users only
Cancel Jobs at the DeviceAdministrator access only
PictBridge PrintingNot applicable—USB port disabled
Solution 1Authenticated users only
Note: When eSF applications are configured, Solution 1 controls access to Held
Jobs.
Solutions 2‑10Administrator access only
New SolutionsAdministrator access only
Disabling home screen icons
The final step is to remove unneeded icons from the MFP home screen.
1 From the home screen, touch > Settings > General Settings.
2 Touch Home screen customization.
3 Set FTP, FTP shortcuts, and USB Drive to Do not display.
Note: If other functions (such as Fax) are not available to users, then you can also disable the icons for those
functions.
4 Touch Submit.
15
Administering the device
This chapter describes how to configure additional settings and functions that may be available on your device.
Using the Embedded Web Server
Many settings can be configured using either the Embedded Web Server (EWS) or the touch screen.
Accessing the EWS
1 Type the device IP address or host name in the address field of your Web browser using the secure version of the
page (with the address beginning “https://”).
2 Use the navigation menu on the left to access configuration and report menus.
Note: If the device IP address or host name is not readily apparent, then you can find it by printing a network
setup page.
Printing a network setup page
From the home screen, touch > Reports > Network Setup Page.
After the network setup page prints, the MFP will return to the home screen.
Settings for network-connected devices
After attaching the MFP to a network, you will need to configure additional settings. This section covers the basic
settings required for a network-connected device.
Creating and modifying digital certificates
Certificates are needed for domain controller verification and for SSL support in LDAP. Each certificate must be in a
separate PEM (.cer) file.
Setting certificate defaults
The values entered here will be present in all new certificates generated in the Certificate Management task.
1 From the Embedded Web Server, click Settings > Security > Certificate Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click Set Certificate Defaults.
3 Enter values in the appropriate fields:
• Common Name—Type a name for the device.
Note: Leave this field blank if you want to use the device host name as the Common Name.
• Organization Name—Type the name of the company or organization issuing the certificate.
• Unit Name—Type the name of the unit within the company or organization issuing the certificate.
16
• Country/Region—Type the country or region where the company or organization issuing the certificate is
located (2‑character maximum).
• Province Name—Type the province where the company or organization issuing the certificate is located.
• City Name—Type the city where the company or organization issuing the certificate is located.
• Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, enter
an IP address using the format IP:255.255.255.255. Leave this field blank if you want to use the IPv4 address.
4 Click Submit.
Note: All fields accept a maximum of 128 characters, except where noted.
Creating a new certificate
1
From the Embedded Web Server, click Settings > Security > Certificate Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click Device Certificate Management > New.
3 Enter values in the appropriate fields:
• Friendly Name—Type a name for the certificate (64‑character maximum).
• Common Name—Type a name for the device.
Note: Leave this field blank if you want to use the device host name as the Common Name.
• Organization Name—Type the name of the company or organization issuing the certificate.
• Unit Name—Type the name of the unit within the company or organization issuing the certificate.
• Country/Region—Type the country or region where the company or organization issuing the certificate is
located (2‑character maximum).
• Province Name—Type the province where the company or organization issuing the certificate is located.
• City Name—Type the city where the company or organization issuing the certificate is located.
• Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, enter
an IP address using the format IP:255.255.255.255 or a DNS address using the format DNS:ldap.company.com.
Leave this field blank if you want to use the IPv4 address.
4 Click Generate New Certificate.
Note: All fields accept a maximum of 128 characters, except where noted.
Viewing, downloading, and deleting a certificate
1
From the Embedded Web Server, click Settings > Security > Certificate Management.
Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15.
2 Click Device Certificate Management.
3 Select a certificate from the list.
The details of the certificate are displayed in the Device Certificate Management window.
4 Do any of the following:
• Delete—Remove a previously stored certificate.
• Download To File—Download or save the certificate as a PEM (.cer) file.
17
The contents of the file should be in the following format: