Lexmark MS610dn Administrator's Manual page 3

Embedded web server-security: administrator's guide
Hide thumbs Also See for MS610dn:
Table of Contents

Advertisement

Contents
Configuring the TCP/IP port access setting.......................................................................................................32
Configuring IPsec settings.................................................................................................................................32
Enabling the security reset jumper...................................................................................................................33
Securing the hard disk and other installed memory...............................................................................33
Statement of Volatility......................................................................................................................................33
Erasing volatile memory ...................................................................................................................................34
Erasing non-volatile memory............................................................................................................................34
Configuring Out of Service Erase ......................................................................................................................35
Completely erasing printer hard disk memory .................................................................................................36
Configuring printer hard disk encryption..........................................................................................................36
Scenarios.................................................................................................................................................38
Scenario: Printer in a public place ....................................................................................................................38
Scenario: Standalone or small office ................................................................................................................39
Scenario: Network running Active Directory ....................................................................................................39
Appendix....................................................................................................41
Notices.......................................................................................................46
Glossary of Security Terms.........................................................................50
Index..........................................................................................................51
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents