Contents
Devices covered in this guide.......................................................................4
Simple
‑
security devices.............................................................................................................................4
Advanced
‑
security devices........................................................................................................................4
Managing authentication and authorization methods..................................5
Understanding the basics..........................................................................................................................5
Simple-security device access controls.....................................................................................................8
Limiting access using basic security setup...............................................................................................10
Advanced-security building blocks..........................................................................................................10
Using a security template to control function access.............................................................................20
Managing certificates and other settings....................................................24
Installing a Certificate Authority certificate on the device......................................................................24
Configuring the device for certificate information..................................................................................24
Managing devices remotely........................................................................28
Using HTTPS for device management.....................................................................................................28
Setting a backup password......................................................................................................................28
Setting up SNMP......................................................................................................................................29
Configuring security audit log settings....................................................................................................30
Updating firmware..................................................................................................................................31
Managing other access functions...............................................................33
Configuring confidential printing............................................................................................................33
Setting login restrictions..........................................................................................................................34
Enabling and disabling USB host ports....................................................................................................34
Enabling the security reset jumper.........................................................................................................35
Enabling holding faxes.............................................................................................................................36
Enabling Operator Panel Lock.................................................................................................................36
Securing network connections....................................................................38
Configuring 802.1X authentication.........................................................................................................38
Configuring IP security settings...............................................................................................................39
Configuring the TCP/IP port access setting.............................................................................................41
Setting the restricted server list..............................................................................................................41
Contents
2