Lexmark 47B1000 Printer User Manual


 
Contents
Overview and first steps...............................................................................5
Overview...................................................................................................................................................5
Using this guide...................................................................................................................................................5
Supported devices ..............................................................................................................................................5
Operating environment ......................................................................................................................................6
Before configuring the device (required)..................................................................................................6
Verifying physical interfaces and installed firmware..........................................................................................6
Attaching a lock ..................................................................................................................................................7
Encrypting the hard disk .....................................................................................................................................7
Disabling the USB buffer.....................................................................................................................................8
Installing the minimum configuration..........................................................9
Configuring the device..............................................................................................................................9
Configuration checklist .......................................................................................................................................9
Configuring disk wiping.......................................................................................................................................9
Enabling the backup password (optional) ..........................................................................................................9
Creating user accounts .....................................................................................................................................10
Creating security templates..............................................................................................................................11
Controlling access to device functions..............................................................................................................12
Disabling home screen icons ............................................................................................................................14
Administering the device............................................................................15
Using the Embedded Web Server...........................................................................................................15
Settings for network-connected devices.................................................................................................15
Creating and modifying digital certificates .......................................................................................................15
Setting up IPSec ................................................................................................................................................17
Disabling the AppleTalk protocol......................................................................................................................18
Shutting down port access................................................................................................................................18
Other settings and functions...................................................................................................................19
Network Time Protocol.....................................................................................................................................19
Kerberos............................................................................................................................................................19
Security audit logging .......................................................................................................................................20
E-mail................................................................................................................................................................22
Fax.....................................................................................................................................................................24
Configuring security reset jumper behavior .....................................................................................................25
User access..............................................................................................................................................25
Creating user accounts through the EWS .........................................................................................................25
Configuring LDAP+GSSAPI.................................................................................................................................27
Configuring Common Access Card access.........................................................................................................30
3