Instruction d'utilisation Lexmark X792DE

Instruction d'utilisation pour le dispositif Lexmark X792DE

Dispositif: Lexmark X792DE
Catégorie: Imprimante
Fabricant: Lexmark
Dimension: 0.6 MB
Date d'addition: 1/20/2014
Nombre des pages: 56
Imprimez l'instruction

Téléchargez

Comment utiliser?

Notre objectif consiste à vous assurer le plus rapide accès au contenu de l'instruction d'utilisation du dispositif Lexmark X792DE. En utilisant l'aperçu en ligne vous pouvez parcourir le sommaire et passer à la page où vous trouverez la résolution de votre problème avec Lexmark X792DE.

Pour votre confort

Si regarder l'instruction Lexmark X792DE directement sur la page n'est pas confortable pour vous, vous pouvez profiter de deux solutions possibles:

  • Exploration au mode de plein écran - pour analyser l'instruction d'une manière commode (sans l'avoir téléchargée sur votre ordinateur) vous pouvez utiliser le mode d'exploration en plein écran. Pour démarrer l'exploration de l'instruction Lexmark X792DE en plein écran, utilisez le bouton Plein écran.
  • Téléchargement sur l'ordinateur - vous pouvez aussi télécharger l'instruction Lexmark X792DE sur votre ordinateur et la sauvegarder dans vos ressources. Si vous n'avez pas envie de gaspiller votre espace disque, vous pouvez toujours télécharger cette instruction du ManualsBase dans l'avenir.
Lexmark X792DE Manuel d'utilisation - Online PDF
Advertisement
« Page 1 of 56 »
Advertisement
Version imprimée

Beaucoup de gens préfèrent de lire les documents dans la version imprimée et non pas sur l'écran. L'option d'impression de l'instruction est aussi prévue et vous pouvez en profiter en cliquant le lien ci-dessus - Imprimez l'instruction. Il n'est pas nécessaire d'imprimer toute l'instruction Lexmark X792DE - on peut choisir des pages. Economisez le papier.

Résumés

Vous trouverez ci-dessous les annonces des contenus qui se trouvent sur les pages suivantes de l'instruction de Lexmark X792DE. Si vous voulez parcourir rapidement le contenu des pages suivantes de l'instruction, vous pouvez en profiter.

Résumés du contenu
Résumé du contenu de la page N° 1

Common Criteria
Installation Supplement and Administrator Guide
November 2011 www.lexmark.com
Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries. 3065326-001
All other trademarks are the property of their respective owners.
© 2011 Lexmark International, Inc.
All rights reserved.
740 West New Circle Road
Lexington, Kentucky 40550

Résumé du contenu de la page N° 2

Edition notice November 2011 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not appl

Résumé du contenu de la page N° 3

3 Contents Overview and first steps...............................................................................5 Overview...................................................................................................................................................5 Using this guide...................................................................................................................................................5 Supported devices ...........................................

Résumé du contenu de la page N° 4

4 Creating security templates using the EWS ......................................................................................................32 Controlling access to device functions....................................................................................................33 Configuring PKI Held Jobs .................................................................................................................................33 Controlling access to device functions using the EW

Résumé du contenu de la page N° 5

5 Overview and first steps Overview TM This guide describes how to configure a supported Lexmark multifunction printer (MFP) to reach Common Criteria Evaluation Assurance Level 2 (EAL 2). It is critical that you carefully follow the instructions in this guide, as failure to do so may result in a device that does not meet the requirements of the evaluation. Using this guide This guide is intended for use by Lexmark service providers, and network administrators responsible for the management of s

Résumé du contenu de la page N° 6

6 Operating environment The instructions provided in this guide are based on the following assumptions and objectives: � The MFP is installed in a cooperative, nonhostile environment that is physically secure or monitored and provides protection from unauthorized access to MFP external interfaces. � The administration platform and local area network are physically and logically secure. � Authorized administrators are trained and are capable of performing tasks related to the installation, confi

Résumé du contenu de la page N° 7

7 Attaching a lock Once a lock is attached, the metal plate and system board cannot be removed, and the security jumper cannot be accessed without causing visible damage to the device. Note: If you are using a Lexmark 6500e scanner with a T650, T652, T654, or T656 printer, then you must attach a lock to both the scanner and the printer. 1 Verify that the MFP case is closed. 2 Locate the security slot, and then attach a lock. It is the same type of security slot found on most laptop computers an

Résumé du contenu de la page N° 8

8 3 Verify that the MFP is in Configuration mode by locating the Exit Config Menu icon in the lower right corner of the touch screen. 4 Scroll through the configuration menus to locate the Disk Encryption menu selection. 5 Touch Disk Encryption > Enable. Warning: Enabling disk encryption will erase the contents of the hard disk. 6 The following message appears: Contents will be lost. Continue? � Touch Yes to proceed with disk wiping and encryption. A status bar will indicate the progress of the

Résumé du contenu de la page N° 9

9 Installing the minimum configuration You can achieve an evaluated configuration on a non-networked (standalone) device in just a few steps. For this configuration, all tasks are performed at the device, using the touch screen. Configuring the device Configuration checklist This checklist outlines the steps required to implement an evaluated configuration on a standalone device. For information about additional configuration options, see “Administering the device” on page 15. After completing

Résumé du contenu de la page N° 10

10 3 Retype the password, and then touch Done to save the new password and return to the Edit Backup Password screen. 4 Set Use Backup Password to On. 5 Touch Submit. Creating user accounts Creating internal (device) accounts for use with the evaluated configuration involves not only assigning a user ID and password to each user, but also segmenting users into groups. When configuring security templates, you will select one or more of these groups, and then you will apply a security template to

Résumé du contenu de la page N° 11

11 Group name Type of user group would be selected for Authenticated_Users � Administrators permitted to access all device functions � Administrators permitted to use device functions and access the Reports menu � Administrators permitted to use device functions and access the Security menu � Non ‑administrators (all other users) Step 2: Creating accounts 1 From the home screen, touch > Security > Edit Security Setups > Edit Building Blocks > Internal Accounts > General Settings. 2 On the Gene

Résumé du contenu de la page N° 12

12 3 Type a unique name to identify the template. Use a descriptive name, such as ”Administrator_Only” or “Authenticated_Users,” and then touch Done. 4 On the Authentication Setup screen, select the internal accounts building block, and then touch Done. 5 On the Authorization Setup screen, select the internal accounts building block, and then touch Done. 6 Select one or more groups to be included in the template, and then touch Done to save your changes and return to the Edit Security Templates

Résumé du contenu de la page N° 13

13 Access control Level of protection Paper Menu at the Device Authenticated users only Paper Menu Remotely Authenticated users only Reports Menu at the Device Administrator access only Reports Menu Remotely Administrator access only Settings Menu at the Device Administrator access only Settings Menu Remotely Administrator access only Network/Ports Menu at the Device Administrator access only Network/Ports Menu Remotely Administrator access only Manage Shortcuts at the Device Authenticated user

Résumé du contenu de la page N° 14

14 Access control Level of protection Held Jobs Access Disabled Use Profiles Authenticated users only Change Language from Home Screen Authenticated users only Cancel Jobs at the Device Administrator access only PictBridge Printing Not applicable—USB port disabled Solution 1 Authenticated users only Note: When eSF applications are configured, Solution 1 controls access to Held Jobs. Solutions 2 ‑10 Administrator access only New Solutions Administrator access only Disabling home screen icons The

Résumé du contenu de la page N° 15

15 Administering the device This chapter describes how to configure additional settings and functions that may be available on your device. Using the Embedded Web Server Many settings can be configured using either the Embedded Web Server (EWS) or the touch screen. Accessing the EWS 1 Type the device IP address or host name in the address field of your Web browser using the secure version of the page (with the address beginning “https://”). 2 Use the navigation menu on the left to access config

Résumé du contenu de la page N° 16

16 � Country/Region—Type the country or region where the company or organization issuing the certificate is located (2 ‑character maximum). � Province Name—Type the province where the company or organization issuing the certificate is located. � City Name—Type the city where the company or organization issuing the certificate is located. � Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, enter an IP address using the format IP:255.255.255.255. Le

Résumé du contenu de la page N° 17

17 The contents of the file should be in the following format: -----BEGIN CERTIFICATE----- MIIE1jCCA76gAwIBAgIQY6sV0KL3tIhBtlr4gHG85zANBgkqhkiG9w0BAQUFADBs … l3DTbPe0mnIbTq0iWqKEaVne1vvaDt52iSpEQyevwgUcHD16rFy+sOnCaQ== -----END CERTIFICATE----- � Download Signing Request—Download or save the signing request as a .csr file. � Install Signed Certificate—Upload a previously signed certificate. Installing a CA certificate A Certificate Authority (CA) certificate is required if you will be using the

Résumé du contenu de la page N° 18

18 Disabling the AppleTalk protocol IP is the only network protocol permitted under this evaluation. The AppleTalk protocol must be disabled. Using the EWS Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15. 1 From the Embedded Web Server, click Settings > Network/Ports > AppleTalk. 2 Verify that the Activate check box is cleared, and then click Submit. Using the touch screen 1 From the home screen, touch > Network/Ports > Standard Network > STD NET S

Résumé du contenu de la page N° 19

19 3 Click Submit. Other settings and functions Network Time Protocol Use Network Time Protocol (NTP) to automatically sync MFP date and time settings with a trusted clock so that Kerberos requests and audit log events will be accurately time ‑stamped. Note: If your network uses DHCP, then verify that NTP settings are not automatically provided by the DHCP server before manually configuring NTP settings. Using the EWS 1 From the Embedded Web Server, click Settings > Security > Set Date and Time

Résumé du contenu de la page N° 20

20 3 Under Simple Kerberos Setup, for KDC Address, type the IP address or host name of the KDC (Key Distribution Center) IP. 4 For KDC Port, type the number of the port used by the Kerberos server. 5 For Realm, type the realm used by the Kerberos server. Note: The Realm entry must be typed in all uppercase letters. 6 Click Submit to save the information as a krb5.conf file. Note: Because only one krb5.conf file is used, uploading or submitting Simple Kerberos settings will overwrite the configu


Instructions pareilles
# Instruction d'utilisation Catégorie Téléchargez
1 Lexmark 031 Manuel d'utilisation Imprimante 35
2 Lexmark 036 Manuel d'utilisation Imprimante 4
3 Lexmark 037 Manuel d'utilisation Imprimante 2
4 Lexmark 096 Manuel d'utilisation Imprimante 1
5 Lexmark 1000 Manuel d'utilisation Imprimante 20
6 Lexmark 0A1 Manuel d'utilisation Imprimante 0
7 Lexmark 0A5 Manuel d'utilisation Imprimante 0
8 Lexmark 032 Manuel d'utilisation Imprimante 0
9 Lexmark 101 Manuel d'utilisation Imprimante 0
10 Lexmark 035 Manuel d'utilisation Imprimante 0
11 Lexmark 1020 Manuel d'utilisation Imprimante 19
12 Lexmark 102 Manuel d'utilisation Imprimante 0
13 Lexmark 10E Manuel d'utilisation Imprimante 13
14 Lexmark 110 Manuel d'utilisation Imprimante 0
15 Lexmark 1361760 Manuel d'utilisation Imprimante 0
16 Sony DPP-M55 Manuel d'utilisation Imprimante 0
17 Sony LPR-1000MD Manuel d'utilisation Imprimante 1
18 Sony iP1200 Manuel d'utilisation Imprimante 1
19 Sony Digital Photo DPP-EX7 Manuel d'utilisation Imprimante 15
20 Sony DPPFP75 Manuel d'utilisation Imprimante 14