Operation In Fips Mode; Initial Setup - Lexmark 10G0149 - PrintCryption Card Encryption Module Manual

Fips 140-2 non-proprietary security policy
Hide thumbs Also See for 10G0149 - PrintCryption Card Encryption Module:
Table of Contents

Advertisement

O
PERATION IN FIPS MODE
The PrintCryption meets Level 1 requirements for FIPS 140-2. The sections
below describe how to place and keep the module in FIPS-approved mode of
operation.

Initial Setup

The DLE card containing PrintCryption module may be factory installed or user-
installed. Lexmark provides an Installation sheet, a driver CD with publications,
and license agreement for the module in the option kit.
Installation procedure of the module is as follows.
1. Print a menu settings page from an AIO:
1. Print a menu settings page from a printer:
2. Turn off the printer and install the card. Please refer to the printer's
3. Turn the printer on.
© Copyright 2006 Lexmark International Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
a. Press Menu and then select Reports.
b. Press Menu Settings Page to print the page.
Note: This Page is needed for later use.
c. Configure the printer onto the TCP/IP network per installation
requirements. If the printer is behind a firewall, it must allow IP
ports 9150 and 9152 to pass through.
a. Press Menus until Utilities menu appears, and then press Select.
b. Press Menu until Print menu appears, and then press Select to
print the page.
Note: This Page is needed for later use.
c. Configure the printer onto the TCP/IP network per installation
requirements. If the printer is behind a firewall, it must allow IP
ports 9150 and 9152 to pass through.
documentation for further instructions on installing the card.
a. If the printer displays the message 41 – Unsupported Firmware
Card, then the installed card is not compatible for the printer. Turn
off the printer and remove the card.
Page 12 of 17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Printcryption

Table of Contents