Contents
Overview...................................................................................................................................................................................5
Using this guide..................................................................................................................................................................................5
Supported devices.............................................................................................................................................................................5
Operating environment...................................................................................................................................................................5
Attaching a lock..................................................................................................................................................................................6
Encrypting the hard disk.................................................................................................................................................................7
Disabling the USB Buffer.................................................................................................................................................................8
Configuring the device........................................................................................................................................................9
Configuration checklist....................................................................................................................................................................9
Configuring disk wiping..................................................................................................................................................................9
Creating user accounts..................................................................................................................................................................10
Creating security templates.........................................................................................................................................................12
Disabling home screen icons......................................................................................................................................................14
Using the Embedded Web Server.................................................................................................................................15
Setting up IPSec...............................................................................................................................................................................18
Disabling non-IP network protocols.........................................................................................................................................19
Shutting down port access..........................................................................................................................................................20
Other settings and functions...........................................................................................................................................20
Network Time Protocol..................................................................................................................................................................20
Kerberos..............................................................................................................................................................................................21
Security audit logging...................................................................................................................................................................22
E-mail...................................................................................................................................................................................................24
Fax.........................................................................................................................................................................................................26
User access.............................................................................................................................................................................27
Configuring LDAP+GSSAPI..........................................................................................................................................................29