HP 640n User's Guide Page 107

  • Download
  • Add to my manuals
  • Print
  • Page
    / 228
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 106
Table 4-16 Certificate configuration screens (continued)
Import an HP Jetdirect certificate and private key. When imported, the existing certificate and private key
are overwritten.
The file format must be PKCS#12 encoded (.pfx).
To import a certificate and private key, specify the name and path of the file that contains the certificate
and private key. Or, click Browse to browse your system for the file. Then enter the password that was
used to encrypt the private key.
Click Finish to complete the installation.
Export the HP Jetdirect certificate and private key screen. Export the installed HP Jetdirect certificate and private key to
a file.
To export a certificate and private key, enter a password to use to encrypt the private key. Enter the
password again to confirm it. Then click Save As to save the certificate and private key in a file on your
system. The file format is PKCS#12 encoded (.pfx).
Access Control
Use this tab to display the access control list (ACL) on the HP Jetdirect print server. An ACL (or host
access list) specifies individual host systems, or networks of host systems, that are allowed to access
the print server and the attached network device. You can add up to 10 entries. If the list is empty (no
hosts are listed), any supported system can access the print server.
NOTE: Not all print servers or devices support ACL, and support is limited to IPv4 networks. For
improved security and performance, use the IPsec/Firewall feature (if available) instead of ACL.
By default, hosts with HTTP connections (such as, the HP Embedded Web Server or IPP) can access
the print server regardless of access control list entries. To disable HTTP host access, clear the
Allow Web Server (HTTP) access check box at the bottom of the list.
CAUTION: You can lose communication with the HP Jetdirect print server if your system is not
properly specified in the list, or access via HTTP is disabled.
To use the access control list as a security feature, see
Security features (V.45.xx.nn.xx)
on page 121.
Specify host systems by their IPv4 address or network number. If the network contains subnets, you
can use an address mask to identify whether the IP address entry designates an individual host
system or a group of host systems.
Examples:
IP Address Mask Description
192.0.0.0 255.0.0.0 Allow all hosts with network number 192.
192.1.0.0 255.1.0.0 Allow all hosts on network 192, subnet 1.
192.168.1.2 Allow the host with IP address 192.168.1.2. The mask
255.255.255.255 is assumed and is not required.
To add an entry to the access control list, specify a host using the IP Address and Mask fields, select
the Save check box, and then click Apply.
To delete an entry from the list, clear the Save check box for that entry, and then click Apply.
ENWW Networking tab 97
Page view 106
1 2 ... 102 103 104 105 106 107 108 109 110 111 112 ... 227 228

Comments to this Manuals

No comments