Manual do usuário Lexmark X792DE

Manual para o dispositivo Lexmark X792DE

Dispositivo: Lexmark X792DE
Categoria: Impressora
Fabricante: Lexmark
Tamanho: 0.6 MB
Data de adição: 1/20/2014
Número de páginas: 56
Imprimir o manual

Baixar

Como usar?

Nosso objetivo é fornecer-lhe o mais rapidamente possível o acesso ao conteúdo contido no manual de instruções para Lexmark X792DE. Usando a pré-visualização online, você pode visualizar rapidamente o índice e ir para a página onde você vai encontrar a solução para seu problema com Lexmark X792DE.

Para sua conveniência

Se a consulta dos manuais Lexmark X792DE diretamente no site não for conveniente para você, você tem duas soluções possíveis:

  • Visualização em tela cheia - Para visualizar facilmente o manual do usuário (sem baixá-lo para seu computador), você pode usar o modo de tela cheia. Para começar a visualização do manual Lexmark X792DE no modo de tela cheia, use o botão Tela cheia.
  • Download para seu computador - você também pode baixar o manual Lexmark X792DE em seu computador e mantê-lo em suas coleções. No entanto, se você não quer perder espaço no seu dispositivo, você sempre pode baixá-lo no futuro a partir de ManualsBase.
Lexmark X792DE Manual de instruções - Online PDF
Advertisement
« Page 1 of 56 »
Advertisement
Versão para impressão

Muitas pessoas preferem ler os documentos não na tela, mas na versão impressa. A opção de imprimir o manual também foi fornecida, você pode usá-la clicando na hiperligação acima - Imprimir o manual. Você não precisa imprimir o manual inteiro Lexmark X792DE, apenas as páginas selecionadas. Respeite o papel.

Resumos

Abaixo você encontrará previews do conteúdo contido nas páginas subseqüentes do manual para Lexmark X792DE. Se você deseja visualizar rapidamente o conteúdo das páginas subseqüentes, você pode usá-los.

Resumos do conteúdo
Resumo do conteúdo contido na página número 1

Common Criteria
Installation Supplement and Administrator Guide
November 2011 www.lexmark.com
Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries. 3065326-001
All other trademarks are the property of their respective owners.
© 2011 Lexmark International, Inc.
All rights reserved.
740 West New Circle Road
Lexington, Kentucky 40550

Resumo do conteúdo contido na página número 2

Edition notice November 2011 The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not appl

Resumo do conteúdo contido na página número 3

3 Contents Overview and first steps...............................................................................5 Overview...................................................................................................................................................5 Using this guide...................................................................................................................................................5 Supported devices ...........................................

Resumo do conteúdo contido na página número 4

4 Creating security templates using the EWS ......................................................................................................32 Controlling access to device functions....................................................................................................33 Configuring PKI Held Jobs .................................................................................................................................33 Controlling access to device functions using the EW

Resumo do conteúdo contido na página número 5

5 Overview and first steps Overview TM This guide describes how to configure a supported Lexmark multifunction printer (MFP) to reach Common Criteria Evaluation Assurance Level 2 (EAL 2). It is critical that you carefully follow the instructions in this guide, as failure to do so may result in a device that does not meet the requirements of the evaluation. Using this guide This guide is intended for use by Lexmark service providers, and network administrators responsible for the management of s

Resumo do conteúdo contido na página número 6

6 Operating environment The instructions provided in this guide are based on the following assumptions and objectives: � The MFP is installed in a cooperative, nonhostile environment that is physically secure or monitored and provides protection from unauthorized access to MFP external interfaces. � The administration platform and local area network are physically and logically secure. � Authorized administrators are trained and are capable of performing tasks related to the installation, confi

Resumo do conteúdo contido na página número 7

7 Attaching a lock Once a lock is attached, the metal plate and system board cannot be removed, and the security jumper cannot be accessed without causing visible damage to the device. Note: If you are using a Lexmark 6500e scanner with a T650, T652, T654, or T656 printer, then you must attach a lock to both the scanner and the printer. 1 Verify that the MFP case is closed. 2 Locate the security slot, and then attach a lock. It is the same type of security slot found on most laptop computers an

Resumo do conteúdo contido na página número 8

8 3 Verify that the MFP is in Configuration mode by locating the Exit Config Menu icon in the lower right corner of the touch screen. 4 Scroll through the configuration menus to locate the Disk Encryption menu selection. 5 Touch Disk Encryption > Enable. Warning: Enabling disk encryption will erase the contents of the hard disk. 6 The following message appears: Contents will be lost. Continue? � Touch Yes to proceed with disk wiping and encryption. A status bar will indicate the progress of the

Resumo do conteúdo contido na página número 9

9 Installing the minimum configuration You can achieve an evaluated configuration on a non-networked (standalone) device in just a few steps. For this configuration, all tasks are performed at the device, using the touch screen. Configuring the device Configuration checklist This checklist outlines the steps required to implement an evaluated configuration on a standalone device. For information about additional configuration options, see “Administering the device” on page 15. After completing

Resumo do conteúdo contido na página número 10

10 3 Retype the password, and then touch Done to save the new password and return to the Edit Backup Password screen. 4 Set Use Backup Password to On. 5 Touch Submit. Creating user accounts Creating internal (device) accounts for use with the evaluated configuration involves not only assigning a user ID and password to each user, but also segmenting users into groups. When configuring security templates, you will select one or more of these groups, and then you will apply a security template to

Resumo do conteúdo contido na página número 11

11 Group name Type of user group would be selected for Authenticated_Users � Administrators permitted to access all device functions � Administrators permitted to use device functions and access the Reports menu � Administrators permitted to use device functions and access the Security menu � Non ‑administrators (all other users) Step 2: Creating accounts 1 From the home screen, touch > Security > Edit Security Setups > Edit Building Blocks > Internal Accounts > General Settings. 2 On the Gene

Resumo do conteúdo contido na página número 12

12 3 Type a unique name to identify the template. Use a descriptive name, such as ”Administrator_Only” or “Authenticated_Users,” and then touch Done. 4 On the Authentication Setup screen, select the internal accounts building block, and then touch Done. 5 On the Authorization Setup screen, select the internal accounts building block, and then touch Done. 6 Select one or more groups to be included in the template, and then touch Done to save your changes and return to the Edit Security Templates

Resumo do conteúdo contido na página número 13

13 Access control Level of protection Paper Menu at the Device Authenticated users only Paper Menu Remotely Authenticated users only Reports Menu at the Device Administrator access only Reports Menu Remotely Administrator access only Settings Menu at the Device Administrator access only Settings Menu Remotely Administrator access only Network/Ports Menu at the Device Administrator access only Network/Ports Menu Remotely Administrator access only Manage Shortcuts at the Device Authenticated user

Resumo do conteúdo contido na página número 14

14 Access control Level of protection Held Jobs Access Disabled Use Profiles Authenticated users only Change Language from Home Screen Authenticated users only Cancel Jobs at the Device Administrator access only PictBridge Printing Not applicable—USB port disabled Solution 1 Authenticated users only Note: When eSF applications are configured, Solution 1 controls access to Held Jobs. Solutions 2 ‑10 Administrator access only New Solutions Administrator access only Disabling home screen icons The

Resumo do conteúdo contido na página número 15

15 Administering the device This chapter describes how to configure additional settings and functions that may be available on your device. Using the Embedded Web Server Many settings can be configured using either the Embedded Web Server (EWS) or the touch screen. Accessing the EWS 1 Type the device IP address or host name in the address field of your Web browser using the secure version of the page (with the address beginning “https://”). 2 Use the navigation menu on the left to access config

Resumo do conteúdo contido na página número 16

16 � Country/Region—Type the country or region where the company or organization issuing the certificate is located (2 ‑character maximum). � Province Name—Type the province where the company or organization issuing the certificate is located. � City Name—Type the city where the company or organization issuing the certificate is located. � Subject Alternate Name—Type the alternate name and prefix that conforms to RFC 2459. For example, enter an IP address using the format IP:255.255.255.255. Le

Resumo do conteúdo contido na página número 17

17 The contents of the file should be in the following format: -----BEGIN CERTIFICATE----- MIIE1jCCA76gAwIBAgIQY6sV0KL3tIhBtlr4gHG85zANBgkqhkiG9w0BAQUFADBs … l3DTbPe0mnIbTq0iWqKEaVne1vvaDt52iSpEQyevwgUcHD16rFy+sOnCaQ== -----END CERTIFICATE----- � Download Signing Request—Download or save the signing request as a .csr file. � Install Signed Certificate—Upload a previously signed certificate. Installing a CA certificate A Certificate Authority (CA) certificate is required if you will be using the

Resumo do conteúdo contido na página número 18

18 Disabling the AppleTalk protocol IP is the only network protocol permitted under this evaluation. The AppleTalk protocol must be disabled. Using the EWS Note: For information about accessing the EWS, see “Using the Embedded Web Server” on page 15. 1 From the Embedded Web Server, click Settings > Network/Ports > AppleTalk. 2 Verify that the Activate check box is cleared, and then click Submit. Using the touch screen 1 From the home screen, touch > Network/Ports > Standard Network > STD NET S

Resumo do conteúdo contido na página número 19

19 3 Click Submit. Other settings and functions Network Time Protocol Use Network Time Protocol (NTP) to automatically sync MFP date and time settings with a trusted clock so that Kerberos requests and audit log events will be accurately time ‑stamped. Note: If your network uses DHCP, then verify that NTP settings are not automatically provided by the DHCP server before manually configuring NTP settings. Using the EWS 1 From the Embedded Web Server, click Settings > Security > Set Date and Time

Resumo do conteúdo contido na página número 20

20 3 Under Simple Kerberos Setup, for KDC Address, type the IP address or host name of the KDC (Key Distribution Center) IP. 4 For KDC Port, type the number of the port used by the Kerberos server. 5 For Realm, type the realm used by the Kerberos server. Note: The Realm entry must be typed in all uppercase letters. 6 Click Submit to save the information as a krb5.conf file. Note: Because only one krb5.conf file is used, uploading or submitting Simple Kerberos settings will overwrite the configu


Manuais similares
# Manual do usuário Categoria Baixar
1 Lexmark 031 Manual de instruções Impressora 35
2 Lexmark 036 Manual de instruções Impressora 4
3 Lexmark 037 Manual de instruções Impressora 2
4 Lexmark 096 Manual de instruções Impressora 1
5 Lexmark 1000 Manual de instruções Impressora 20
6 Lexmark 0A1 Manual de instruções Impressora 0
7 Lexmark 0A5 Manual de instruções Impressora 0
8 Lexmark 032 Manual de instruções Impressora 0
9 Lexmark 101 Manual de instruções Impressora 0
10 Lexmark 035 Manual de instruções Impressora 0
11 Lexmark 1020 Manual de instruções Impressora 19
12 Lexmark 102 Manual de instruções Impressora 0
13 Lexmark 10E Manual de instruções Impressora 13
14 Lexmark 110 Manual de instruções Impressora 0
15 Lexmark 1361760 Manual de instruções Impressora 0
16 Sony DPP-M55 Manual de instruções Impressora 0
17 Sony LPR-1000MD Manual de instruções Impressora 1
18 Sony iP1200 Manual de instruções Impressora 1
19 Sony Digital Photo DPP-EX7 Manual de instruções Impressora 15
20 Sony DPPFP75 Manual de instruções Impressora 14